I have a cople of questions about the daily insecurity output. I have an anoncvs server, and as detailed in the docs, I set it up without a password. Every day, I get an email telling me:
Checking the /etc/master.passwd file: Login anoncvs has no password. This is of course correct operation, and I appreciate the strong and valid argument that it is a good thing that I am told this. Certainly I would want to know if there were any other accounts with no password. However, as this is the only output from the security checks, it means that if I could block the output for the null-password check, for just this one account, then I would not normally get an insecurity report. This would mean that when I *did* get an insecurity report, it would mean that some other issue had arisen, and I should pay attention. As such, I ask is there a correct way to tell the system, for this one account, yes, I know, I'm okay with that, so that it will only email me if some other issue arises. If not, I will prefer to just keep having to read the same email every day, rather than reduce safety in some way. My other question is very similar. On a different server, every day I get a similar message: Checking the /etc/master.passwd file: Login si1entdave is off but still has a valid shell and alternate access files in home directory are still readable. Again, this is correct operation, and the system is as I would wish it. I have used vipw to stick a ! in my password hash field, so that the only ssh-enabled account can only be accessed using an ssh key, for better security. Once again, I would like to be able to specify in some way that yes, I know, only bother me when something I actually care about happens. As a workaround, is there a string I can put in the hash field that looks like a password hash, but cannot match any password? In both these things, I am looking to improve the Signal-to-Noise ratio of these emails, but I would rather keep the Noise than risk losing some Signal :-) Ta all, Si1entDave