Re: User Auditing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks all for the good suggestions. I'm giving Zbynek's solution a try
right now and understand the limitations  but it's better than what I have
at the moment.

On Thu, Sep 23, 2010 at 10:41 AM, Georgios Magklaras <georgios@xxxxxxxxxxxxx
> wrote:

>  Not only that, but you could also obfuscate the script. One user I dealt
> with that attempted to evade detection perlcc-ed system call wrapped
> commands into a binary file. Relying on the shell functionality for these
> kinds of things is not wise (IMHO) to get reliable data about who is doing
> what. Zbynek's recipe is great, simple, but it will not really catch easily
> folks that know how to cover their tracks.
>
> GM
>
>
> On 09/23/2010 04:29 PM, Marti, Robert wrote:
>
>> I haven't tried them, but do these track executing shell commands from
>> inside vim or other editors?  Or other ways of running commands? (write a
>> script, run it, delete the script)
>>
>> Rob Marti
>>
>>  -----Original Message-----
>>> From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-
>>> bounces@xxxxxxxxxx] On Behalf Of Zbynek Vymazal
>>> Sent: Thursday, September 23, 2010 9:20 AM
>>> To: General Red Hat Linux discussion list
>>> Subject: RE: User Auditing
>>>
>>> Hi Rob,
>>>
>>> I'm logging command history of every user to remote syslog server. It
>>> requires two steps on client side:
>>>
>>> 1) Add following function to /etc/profile:
>>>
>>> function history_to_syslog
>>> {
>>>    declare command
>>>    command=$(fc -ln -0)
>>>    logger -p local7.notice -t bash -i -- $USER : $command } trap
>>> history_to_syslog DEBUG
>>>
>>> 2) Configure local syslog to resend logs to remote syslog (/etc/syslog-
>>> ng/syslog-ng.conf):
>>>
>>> # Send local messages to central syslog server
>>>
>>> filter f_filter7   { facility(local7); };
>>> destination d_syslog_server { udp(xxx.xxx.xxx.xxx); }; log {
>>> source(s_sys);
>>> filter(f_filter7); destination(d_syslog_server); };
>>>
>>> Best regards,
>>>
>>> Zbynek Vymazal
>>>
>>> -----Original Message-----
>>> From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-
>>> bounces@xxxxxxxxxx] On Behalf Of Rob DeSanno
>>> Sent: Thursday, September 23, 2010 15:40
>>> To: General Red Hat Linux discussion list
>>> Subject: User Auditing
>>>
>>> This should be an easy question.
>>>
>>> I use Logwatch on all of my RHEL servers and would like for it to also
>>> report
>>> on all commands that any user had typed when logged in as well.
>>> Something along the lines of UID: Command to give me an idea of who was
>>> doing what at any given period of time.
>>>
>>> I tried using snoopy but that gave me much more than I was looking for.
>>> I'm
>>> now playing around with psacct and logger but was curious to know what
>>> everyone else out there uses to monitor user activity besides looking
>>> into
>>> everyone history file.
>>>
>>> Thanks in advance!
>>> ~Rob
>>> --
>>> redhat-list mailing list
>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>
>>> --
>>> redhat-list mailing list
>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>
>>
>
> --
> --
> George Magklaras
> Senior Systems Engineer/IT Manager
> Biotek Center, University of Oslo
> EMBnet TMPC Chair
>
> http://folk.uio.no/georgios
>
> Tel: +47 22840535
>
>
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux