You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Followup from the stretch goal in #4104, this ticket is to ensure that on Trusty on 0.12.0~rc2 an OSSEC alert is indeed sent containing a pointer to the Xenial upgrade guide at https://securedrop.org/xenial-upgrade.
See the test plan in #3546 for how to test this - note that the notification is sent on a weekly basis.
If the alert is not being sent for some reason, then the implementer of this ticket should investigate why and resolve. See #4116 for various ideas on how to do this.
The text was updated successfully, but these errors were encountered:
Following steps in #3546, I verified in Trusty staging VMs (with OSSEC enabled) that an OSSEC alert will be sent with the expected message:
gpg: encrypted with 4096-bit RSA key, ID 0xEECE0DDC6DCB11EF, created 2015-03-16
"Freedom of the Press Foundation <[email protected]>"
/etc/cron.weekly/update-notifier-common:
New release '16.04.5 LTS' available.
Visit https://securedrop.org/xenial-upgrade for more information
This is working as expected, so no further action is needed. Closing!
Followup from the stretch goal in #4104, this ticket is to ensure that on Trusty on 0.12.0~rc2 an OSSEC alert is indeed sent containing a pointer to the Xenial upgrade guide at https://securedrop.org/xenial-upgrade.
See the test plan in #3546 for how to test this - note that the notification is sent on a weekly basis.
If the alert is not being sent for some reason, then the implementer of this ticket should investigate why and resolve. See #4116 for various ideas on how to do this.
The text was updated successfully, but these errors were encountered: