Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
12-23-2003, 10:28 AM
|
#1
|
Member
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238
Rep:
|
user auditing tools
Hey all,
As usual I have an open ended bizarre question. I am looking for tools to validate/ track users who su. All I have found so far are high end tools from the likes of IBM either host based IDS or integrated access management. Basically my understanding of what is needed is that when a user logs in (via ssh or telnet) as themself, when they su to "root" there needs to be a way to "validate" the commands that are being run are by a specific user.
Example:
UserA logs in and su's to root, UserB also logs in and is su'ed to root. Both are issuing commands. The history log shows these commands but there is no way to say which user did what.
Anyone have any thoughts on this?
|
|
|
12-23-2003, 11:39 AM
|
#2
|
Member
Registered: Nov 2002
Location: Paraguay
Distribution: Mandrake 10
Posts: 573
Rep:
|
You shouldn't give your root password to any unnecesary user, for that you have the sudo (/etc/sudores), search in google. Sudo keeps a very good log.
|
|
|
12-23-2003, 11:44 AM
|
#3
|
Moderator
Registered: May 2001
Posts: 29,417
|
I agree. Easiest way to implement would be IMHO to deny them root access, give them a Bash shell that logs everything and give them only access to specific sudo commands to execute as root. Beware of command pitfalls tho, like anything that gives access to $EDITOR for instance.
All I have found so far are high end tools from the likes of IBM either host based IDS or integrated access management.
Please share?
|
|
|
12-23-2003, 12:17 PM
|
#4
|
LQ Veteran
Registered: Sep 2003
Posts: 10,532
|
Stopping bash history logging is very easy to do, so don't count on those logs to be accurate.
I totally agree on using sudo.
Like unSpawn, I like to hear about those IBM tools as well :-)
|
|
|
12-23-2003, 12:42 PM
|
#5
|
Moderator
Registered: May 2001
Posts: 29,417
|
Stopping bash history logging is very easy to do
Sure, if you kill syslogd, that is, I'm talking about a somewhat modified Bash (see www.rootshell.be/~unspawn/packaging/bash.html).
|
|
|
12-23-2003, 12:50 PM
|
#6
|
LQ Veteran
Registered: Sep 2003
Posts: 10,532
|
Even regular users can do it:
HISTORYSIZE=0
I just had a quick look at the bash link: Looks nice, am going to check it out right now.
|
|
|
12-23-2003, 01:41 PM
|
#7
|
LQ Veteran
Registered: Sep 2003
Posts: 10,532
|
Just to be clear about this: My option does _not_ work if you use the bash version unSpawn is refering to.
@unSpawn: Very nice!
|
|
|
12-23-2003, 02:02 PM
|
#8
|
Moderator
Registered: May 2001
Posts: 29,417
|
HISTORYSIZE=0
...or "ln -sf /dev/null ~/.bash_history", never seen "mknod ~/.bash_history c 1 3" tho.
Just to be clear about this: My option does _not_ work if you use the bash version unSpawn is refering to. @unSpawn: Very nice!
Don't credit me, credit Antonomasia, he did ALL the work. I just made sure his patches aligned with my Bash version and rpm-ized it, IOW, I'm just the messenger for this.
|
|
|
12-24-2003, 08:48 AM
|
#9
|
Member
Registered: Nov 2002
Location: Paraguay
Distribution: Mandrake 10
Posts: 573
Rep:
|
No need for that kind of log, sudo records a log by user... all you need to do is a little work with sudoers, but that should take about half an hour and you don't compromise security in your system.
Anyway, when you su you start the root shell, and I don't like the idea of messing arround with root's shell...
http://www.courtesan.com/sudo/
|
|
|
12-24-2003, 09:26 AM
|
#10
|
Member
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238
Original Poster
Rep:
|
hmmm very interesting......not sure what commands the users are trying to run, but this is a step in the right direction. looks like more research (google) is in order.
As for the tools, Symantic has host based IDS called Intruder Alert. not exactly designed for this issue but can be used to monitor log activity. NetForensics can also do the same thing "real time".
IBM's big tool in this space would be Tivoli Access Manager for Operation Systems. This will integrate with a user repository such as LDAP or Active Directory. Through a series of Access Control Lists and Defined Policies you can limit access to certain files or directories. It also has very verbose logging which would satisfy the non-repudiation aspect of any internal audit. But it is very pricey, to the tune of half a million or so for Enterprise level.
Thanks for the heads up all....and have a safe and happy holiday!
|
|
|
All times are GMT -5. The time now is 05:50 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|