LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-23-2003, 10:28 AM   #1
cyph3r7
Member
 
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238

Rep: Reputation: 30
user auditing tools


Hey all,

As usual I have an open ended bizarre question. I am looking for tools to validate/ track users who su. All I have found so far are high end tools from the likes of IBM either host based IDS or integrated access management. Basically my understanding of what is needed is that when a user logs in (via ssh or telnet) as themself, when they su to "root" there needs to be a way to "validate" the commands that are being run are by a specific user.

Example:

UserA logs in and su's to root, UserB also logs in and is su'ed to root. Both are issuing commands. The history log shows these commands but there is no way to say which user did what.

Anyone have any thoughts on this?
 
Old 12-23-2003, 11:39 AM   #2
Ciccio
Member
 
Registered: Nov 2002
Location: Paraguay
Distribution: Mandrake 10
Posts: 573

Rep: Reputation: 30
You shouldn't give your root password to any unnecesary user, for that you have the sudo (/etc/sudores), search in google. Sudo keeps a very good log.
 
Old 12-23-2003, 11:44 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,417
Blog Entries: 55

Rep: Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627
I agree. Easiest way to implement would be IMHO to deny them root access, give them a Bash shell that logs everything and give them only access to specific sudo commands to execute as root. Beware of command pitfalls tho, like anything that gives access to $EDITOR for instance.


All I have found so far are high end tools from the likes of IBM either host based IDS or integrated access management.
Please share?
 
Old 12-23-2003, 12:17 PM   #4
anon237
LQ Veteran
 
Registered: Sep 2003
Posts: 10,532

Rep: Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405
Stopping bash history logging is very easy to do, so don't count on those logs to be accurate.

I totally agree on using sudo.

Like unSpawn, I like to hear about those IBM tools as well :-)
 
Old 12-23-2003, 12:42 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,417
Blog Entries: 55

Rep: Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627
Stopping bash history logging is very easy to do
Sure, if you kill syslogd, that is, I'm talking about a somewhat modified Bash (see www.rootshell.be/~unspawn/packaging/bash.html).
 
Old 12-23-2003, 12:50 PM   #6
anon237
LQ Veteran
 
Registered: Sep 2003
Posts: 10,532

Rep: Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405
Even regular users can do it:

HISTORYSIZE=0



I just had a quick look at the bash link: Looks nice, am going to check it out right now.
 
Old 12-23-2003, 01:41 PM   #7
anon237
LQ Veteran
 
Registered: Sep 2003
Posts: 10,532

Rep: Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405Reputation: 2405
Just to be clear about this: My option does _not_ work if you use the bash version unSpawn is refering to.

@unSpawn: Very nice!
 
Old 12-23-2003, 02:02 PM   #8
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,417
Blog Entries: 55

Rep: Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627
HISTORYSIZE=0
...or "ln -sf /dev/null ~/.bash_history", never seen "mknod ~/.bash_history c 1 3" tho.


Just to be clear about this: My option does _not_ work if you use the bash version unSpawn is refering to. @unSpawn: Very nice!
Don't credit me, credit Antonomasia, he did ALL the work. I just made sure his patches aligned with my Bash version and rpm-ized it, IOW, I'm just the messenger for this.
 
Old 12-24-2003, 08:48 AM   #9
Ciccio
Member
 
Registered: Nov 2002
Location: Paraguay
Distribution: Mandrake 10
Posts: 573

Rep: Reputation: 30
No need for that kind of log, sudo records a log by user... all you need to do is a little work with sudoers, but that should take about half an hour and you don't compromise security in your system.

Anyway, when you su you start the root shell, and I don't like the idea of messing arround with root's shell...

http://www.courtesan.com/sudo/
 
Old 12-24-2003, 09:26 AM   #10
cyph3r7
Member
 
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238

Original Poster
Rep: Reputation: 30
hmmm very interesting......not sure what commands the users are trying to run, but this is a step in the right direction. looks like more research (google) is in order.

As for the tools, Symantic has host based IDS called Intruder Alert. not exactly designed for this issue but can be used to monitor log activity. NetForensics can also do the same thing "real time".

IBM's big tool in this space would be Tivoli Access Manager for Operation Systems. This will integrate with a user repository such as LDAP or Active Directory. Through a series of Access Control Lists and Defined Policies you can limit access to certain files or directories. It also has very verbose logging which would satisfy the non-repudiation aspect of any internal audit. But it is very pricey, to the tune of half a million or so for Enterprise level.


Thanks for the heads up all....and have a safe and happy holiday!
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
What is Auditing support? Beezer Linux - Newbie 2 08-03-2005 08:33 PM
difference in user account management tools for debian, red hat and caldera. carverj Linux - Newbie 1 04-05-2005 07:07 AM
Auditing Services dollaz Linux - General 1 02-17-2005 03:31 PM
Network Auditing.... againstms Linux - Software 0 11-22-2004 04:17 AM
User Interface Creation Tools Chryzmo Linux - Software 4 04-18-2004 09:12 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:50 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration