Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
If I create a ssh/SFTP server, how would I monitor usage (current login's, transfers) and administer punishment if necessary (kicking, banning). Also any good chroot howto's would be helpful also. Thanks
Hmm well current logins can be seen using w or who, but I'm not sure about the transfers..well there are tools of course to see open files and so on, but is it really ethical to spy on what they're transferring? I mean, if you're an admin, it doesn't necessarily belong to you what the users transfer. ISPs work so they've said what you can do and cannont, and if they happen to get a clue you're doing something wrong, they do something about it, but they still have no right to spy on what you are exactly doing. In here one big company tried that and got busted.
Also, punishment is always a per-case thing, so you shouldn't automate that, but personally see what has been violated and act accordingly. And since you're running a server, you already know how to add and remove, lock and unlock user accounts..or if you don't, I suggest you don't try to run a server of any kind yet.
How-tos can be found using Google, easily. Even good how-tos can be found there. I doubt if you have even tried to search, if you're asking that here..
I did all that post in a sort of hurry, I should have given more details and thats my bad. But I think you've got the wrong impression. The "Server" I'm starting is my personal computer that I set up for my own access at first. Then I started giving a few friends accts so they may access a few files that friends would be interested in (Mp3s pron movies etc...). I don't feel that it's unethical to want to know what my computer and my internet connection is/are doing due to outside infulences. I'd also like to know so I can know whether or not any user has been compromised and is doing things unconducive to that actual user.
As far as the howto on chroot, you're sorta mistaken, tho I don't blame you for the response. I simply was trying to kill two birds with one stone. I have indeed looked it up on google, I just haven't done any yet. I threw it in as a last minute thing hoping that there could be something out there that I could have overlooked. Thats it...
Other than w and who and finger, I was hoping for some program, with or without GUI, that would provide me information that would be pertinent. Is there any such thing. Googles results are clouded. Thats why I post here, as a last resort. Or sometimes I'm just lazy... ehehhe.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.