Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
02-14-2006, 01:56 AM
|
#1
|
Member
Registered: Apr 2004
Location: ..where no life dwells..
Posts: 541
Rep:
|
log file access for 2nd root
Hi,
on a productive system I have a second root-user (remote-admin responsible for a few apps and daemons). via script I allow this user to connect via ssh.
The question is, is there a possibility to "monitor" what this user is doing? a logfile which files has been changed by this user would be fine!
..or any other ideas, how would you solve this?
cheers...
(System is SuSE 10)
|
|
|
02-14-2006, 03:57 AM
|
#2
|
Senior Member
Registered: May 2004
Location: Australia
Distribution: Gentoo
Posts: 3,545
Rep:
|
If you trust this user so much that you want a log of what they do, why give them root priviledges at all? Have a look into using sudo, it will allow you to choose what they can and can't do and it'll let you log what they do easily 
|
|
|
02-14-2006, 05:00 AM
|
#3
|
Member
Registered: Apr 2004
Location: ..where no life dwells..
Posts: 541
Original Poster
Rep:
|
hm, I thought about his, but it seems this would be a lot of work to find out all commands they should be allowed to do.....thought there might be an easy alternativ....
|
|
|
02-14-2006, 07:30 AM
|
#4
|
Moderator
Registered: May 2001
Posts: 29,417
|
If you trust this user so much that you want a log of what they do, why give them root priviledges at all?
I agree this is the major question, and you should solve that beforehand. If you find accounting at this level a necessity, then you must set up a policy wrt purpose, retention time, privacy issues, etc, etc, inform them of being watched. If you can explain why this is needed and they agree then any responsable admin should have no problem with it.
I'm sure I'm forgetting something, but this should somewhat cover it. This box should be properly hardened. Since there is not much you can do to stop a wheel group/root account user from altering/circumventing any methods you put into place, the first thing to do (after getting agreement) would be to set up remote syslogging. Correlating login times with absence of data means trouble. Of course they should not have access to that part of the infrastructure where the syslog server resides. After that set up a framework to extend logging which the GRSecurity kernel patch can provide. After that you should set up rootsh which can syslog the complete session. Note that parsing>reporting>taking action in relation to the above is something that only takes place *after* the event. Prevention by taking away capabilities and/or denying users access to certain commands using something like RBAC "is left as an excercise to the reader"...
thought there might be an easy alternative
This maybe sounds a bit harsh, but (with all due respect) "easy" implies dropping qualitatively good solutions for lame ones, preferably those that cost virtually no time or knowledge to implement. If there's a distinct need to monitor users then you should invest time to research and tinker. If you want things the "easy" way then please press ALT+F4 repeatedly until poweroff :-]
|
|
|
All times are GMT -5. The time now is 05:08 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|