Viewing users' system access
|
History Book
In addition to the active connections, simple system archeology sheds light on activities from the past. By searching the file /var/log/auth.log , you can figure out which users have logged in and logged out. As the admin user, you can also see the last 10 activities using sshd . In Listing 11, you can see who logged in, who logged out, and any errors.
Listing 11
Examining auth.log
# grep sshd /var/log/auth.log | tail Aug 26 14:42:36 efho-mobil sshd[31609]: pam_unix(sshd:session): session closed for user test Aug 26 14:43:13 efho-mobil sshd[31087]: pam_unix(sshd:session): session closed for user test Aug 26 14:47:38 efho-mobil sshd[31091]: pam_unix(sshd:session): session closed for user test Aug 26 20:46:21 efho-mobil sshd[4165]: Server listening on 0.0.0.0 port 22. Aug 26 20:46:21 efho-mobil sshd[4165]: Server listening on :: port 22. Aug 26 20:46:31 efho-mobil sshd[4165]: Received signal 15; terminating. Aug 26 20:46:31 efho-mobil sshd[4531]: Server listening on 0.0.0.0 port 22. Aug 26 20:46:31 efho-mobil sshd[4531]: Server listening on :: port 22. Aug 27 14:07:53 efho-mobil sshd[730]: Accepted password for test from ::1 port 40402 ssh2 Aug 27 14:07:53 efho-mobil sshd[730]: pam_unix(sshd:session): session opened for user test by (uid=0)
The last tool (installed by default on Ubuntu) provides an overview of the last user sessions. It parses the /etc/log/wtmp file and provides all the activities associated with the login and logout time in reverse order (i.e., the most recent events appear at the top). Listing 12 shows an excerpt from the logged activities where the login, the terminal, the computer of origin, and the time of use are displayed. Currently logged-in users can be identified by the words still logged in in the last column.
Listing 12
Excerpt of Logged Activities
# last frank pts/9 :0.0 Wed Aug 27 14:09 still logged in test pts/7 localhost Wed Aug 27 14:07 still logged in frank pts/1 :0 Tue Aug 26 20:46 still logged in frank tty7 :0 Tue Aug 26 20:46 still logged in reboot system boot 3.2.0-4-686-pae Tue Aug 26 20:46 - 16:18 (19:32) test pts/17 192.168.102.21 Tue Aug 26 14:32 - 14:47 (00:14)
The lastlog command (included by default on Ubuntu) shows you which authorized users have logged in. It scans the /etc/log/lastlog file and sorts the output with the user data in /etc/passwd . Listing 13 shows the login names, the terminal, the source IP address, and the last time the user logged in.
Listing 13
Output from lastlog
01 # Username Port from last 02 root tty5 Tu Jun 10 16:34:26 +0200 2014 03 www-data **Never yet logged in** 04 frank pts/10 localhost Mo Aug 25 16:31:09 +0200 2014 05 kurs pts/3 172.31.150.110 Di Sep 14 14:09:25 +0200 2010 06 #
Conclusion
The tools presented here can give you a clear overview of which users have been on or not been on the systems you manage. You can also obtain insight into the current state of the system and look back at who accessed the system in the past.
Further information about the users can be obtained by using the finger , cfinger , or pinky tools. Gnome enthusiasts can find information in the gnome-nettool program, which uses a nice graphical interface.
Acknowledgements
The author thanks Wolfram Eifler and Axel Beckert for their input and comments for this article.
Infos
- Mosh mobile shell: http://mosh.mit.edu/
- "Persistence: SSH over unreliable connections" by Axel Beckert, Linux Magazine , Issue 144, 2012: http://www.linux-magazine.com/Issues/2012/144/Mosh-and-AutoSSH/%28language%29/eng-US
- whowatch, http://sourceforge.net/projects/whowatch/
- Netstat: http://linux.die.net/man/8/netstat
- ss: Display Linux TCP/UDP Network and Socket Information: http://www.cyberciti.biz/tips/linux-investigate-sockets-network-connections.html
« Previous 1 2 3 Next »
Buy this article as PDF
Pages: 5
(incl. VAT)