Re: Identify multiple users doing reverse port FWD with their pubkeys

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 




When I connect to the server, I would like to know which pubkey as
open which reverse port.
See the man page of authorized_keys, and specifically the
"environment" there:

    environment="ID=user1" ssh-rsa ...

Also I guess you'd use "command=", and perhaps "restrict" or so.


The auth happens when the device opens the SSH connection, and if your
logging verbosity is high enough, the pubkey's fingerprint will be
written to the log. If you really need to identify *the pubkey*, you'll
have to grab the PID of the sshd process holding the reverse port (can
be gleaned from the output of "{netstat,ss} -natp") and then search
through the logs for the lines of when it got started.
An unpriviledged user can't filehandles of other users.
And grepping through logs isn't allowed for normal users as well -
especially not the authentication logs...


Whereas the *IP* of the device in question can be read on demand from
the same netstat/ss output, just look for the incoming SSH connection
held by the same PID ...
No. Just no. ;)
Look at $SSH_CLIENT and/or $SSH_CONNECTION for that kind of information.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux