<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: auditing logins over ssh in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882542#M82483</link>
    <description>Mustafa,&lt;BR /&gt;&lt;BR /&gt;if you connect via SSH, it looks like you'll see a NETWORK login under the TCPIP$SSH user, followed by a Detached Process login with your username (on a FTA device).&lt;BR /&gt;&lt;BR /&gt;I simply tested this with:&lt;BR /&gt;&lt;BR /&gt;$ SET AUDIT/ALARM/ENABLE=LOGIN=ALL&lt;BR /&gt;$ REPLY/ENABLE&lt;BR /&gt;$ SSH local-host-name&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
    <pubDate>Wed, 18 Oct 2006 11:51:44 GMT</pubDate>
    <dc:creator>Volker Halle</dc:creator>
    <dc:date>2006-10-18T11:51:44Z</dc:date>
    <item>
      <title>auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882541#M82482</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I have enabled auditing remote logins, by&lt;BR /&gt;&lt;BR /&gt;set audit /audit /enable=login=remote&lt;BR /&gt;&lt;BR /&gt;By this configuration, I can easily audit user accounts who are connecting over telnet. However,  When I connect using ssh, I can not see the connection (that is my username and ip) in the audit file. The command for audit is:&lt;BR /&gt;&lt;BR /&gt;anal /audit /since=18-oct-2006 /event=login sys$manager:security.audit$journal&lt;BR /&gt;&lt;BR /&gt;Is there any way to learn the username who is authenticated by ssh in auditing or in another log file...</description>
      <pubDate>Wed, 18 Oct 2006 11:37:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882541#M82482</guid>
      <dc:creator>mustafa_12</dc:creator>
      <dc:date>2006-10-18T11:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882542#M82483</link>
      <description>Mustafa,&lt;BR /&gt;&lt;BR /&gt;if you connect via SSH, it looks like you'll see a NETWORK login under the TCPIP$SSH user, followed by a Detached Process login with your username (on a FTA device).&lt;BR /&gt;&lt;BR /&gt;I simply tested this with:&lt;BR /&gt;&lt;BR /&gt;$ SET AUDIT/ALARM/ENABLE=LOGIN=ALL&lt;BR /&gt;$ REPLY/ENABLE&lt;BR /&gt;$ SSH local-host-name&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Wed, 18 Oct 2006 11:51:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882542#M82483</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2006-10-18T11:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882543#M82484</link>
      <description>Volker,&lt;BR /&gt;&lt;BR /&gt;You are right. But what about the IP, I can not see the coming IP of the connected user in the audit output. However, the IP is logged in the operator log. What I want is to monitor all the tokens in one place.</description>
      <pubDate>Wed, 18 Oct 2006 12:10:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882543#M82484</guid>
      <dc:creator>mustafa_12</dc:creator>
      <dc:date>2006-10-18T12:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882544#M82485</link>
      <description>Mustafa,&lt;BR /&gt;&lt;BR /&gt;the remote IP address is logged in the Network Login audit event under the TCPIP$SSH user.&lt;BR /&gt;&lt;BR /&gt;This clearly is an TCPIP SSH integration problem, as this 'tool' is somehow plugged into OpenVMS, but not cleanly integrated.&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Wed, 18 Oct 2006 12:21:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882544#M82485</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2006-10-18T12:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882545#M82486</link>
      <description>Mustafa.&lt;BR /&gt;&lt;BR /&gt;You can also check the TCPIP$SSH_RUN.LOG files at the TCPIP$SSH account default directory; the user and the IP, together to the connection time, are logged in that file.&lt;BR /&gt;&lt;BR /&gt;Regards.&lt;BR /&gt;&lt;BR /&gt;Ana</description>
      <pubDate>Thu, 19 Oct 2006 02:10:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882545#M82486</guid>
      <dc:creator>Ana M. García Olivencia</dc:creator>
      <dc:date>2006-10-19T02:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882546#M82487</link>
      <description>Yes, that's right, it's seen with /full qualifier. Thanks for your fast replies. &lt;BR /&gt;&lt;BR /&gt;But I still wonder to monitor all these tokens in one record. I have looked at the sshd log file (tcpip show service ssh /full), but there is no such a file (TCPIP$SSH_DEVICE:[TCPIP$SSH]TCPIP$SSH_RUN.LOG).&lt;BR /&gt;How can I enable logging to this log file?</description>
      <pubDate>Thu, 19 Oct 2006 08:13:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882546#M82487</guid>
      <dc:creator>mustafa_12</dc:creator>
      <dc:date>2006-10-19T08:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882547#M82488</link>
      <description>Mustafa.&lt;BR /&gt;&lt;BR /&gt;You must execute the following command:&lt;BR /&gt;&lt;BR /&gt;UCX&amp;gt;SET SERVICE SSH/LOG=FILE=TCPIP$SSH_DEVICE:[TCPIP$SSH]TCPIP$SSH_RUN.LOG&lt;BR /&gt;&lt;BR /&gt;and you must shutdown and start the service in order to activate the change:&lt;BR /&gt;&lt;BR /&gt;$@SYS$MANAGER:TCPIP$SSH_SHUTDOWN&lt;BR /&gt;$@SYS$MANAGER:TCPIP$SSH_STARTUP&lt;BR /&gt;&lt;BR /&gt;Ana&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 23 Oct 2006 06:00:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882547#M82488</guid>
      <dc:creator>Ana M. García Olivencia</dc:creator>
      <dc:date>2006-10-23T06:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882548#M82489</link>
      <description>Dear Ana,&lt;BR /&gt;&lt;BR /&gt;I had done what you recommend before, but I do not understand why there is no log file. Where is my mistake if any?&lt;BR /&gt;&lt;BR /&gt;My conf is:&lt;BR /&gt;&lt;BR /&gt;MYPROMPT&amp;gt;tcpip show serv ssh /full&lt;BR /&gt; &lt;BR /&gt;Service: SSH&lt;BR /&gt;                           State:     Enabled&lt;BR /&gt;Port:               22     Protocol:  TCP             Address:  0.0.0.0&lt;BR /&gt;Inactivity:          5     User_name: TCPIP$SSH       Process:  TCPIP$SSH&lt;BR /&gt;Limit:           10000     Active:        1           Peak:         1&lt;BR /&gt; &lt;BR /&gt;File:         TCPIP$SYSTEM:TCPIP$SSH_RUN.COM&lt;BR /&gt;Flags:        Listen&lt;BR /&gt; &lt;BR /&gt;Socket Opts:  Rcheck Scheck&lt;BR /&gt; Receive:            0     Send:               0&lt;BR /&gt; &lt;BR /&gt;Log Opts:     Acpt Actv Dactv Conn Error Exit Logi Logo Mdfy Rjct TimO Addr&lt;BR /&gt; File:        TCPIP$SSH_DEVICE:[TCPIP$SSH]SSHD.LOG&lt;BR /&gt; &lt;BR /&gt;Security&lt;BR /&gt; Reject msg:  TCPIP SSH Connection refused&lt;BR /&gt;....&lt;BR /&gt;.....&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;MYPROMPT&amp;gt;set def TCPIP$SSH_DEVICE:[TCPIP$SSH]&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;MYPROMPT&amp;gt;dir&lt;BR /&gt;&lt;BR /&gt;Directory SYS$SYSDEVICE:[TCPIP$SSH]&lt;BR /&gt;&lt;BR /&gt;LOGIN.COM;1         SHOSTS.EQUIV;1      SSH2.DIR;1          &lt;BR /&gt;&lt;BR /&gt;Total of 3 files.&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Oct 2006 06:59:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882548#M82489</guid>
      <dc:creator>mustafa_12</dc:creator>
      <dc:date>2006-10-24T06:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882549#M82490</link>
      <description>Mustafa.&lt;BR /&gt;&lt;BR /&gt;You are right. Regardless the log file name you define in the ssh service, it doesn't take it into account. The only difference between your system and mine is that, although not having TCPIP$SSH_RUN.LOG (the 'official' log file name), whenever I shutdown and start the service, a new version of that file is created (I have done some tests deleting my current TCPIP$SSH_RUN.LOG files and seen that the first version of this file is created and the information logged, although I had defined  a different log file name).&lt;BR /&gt;&lt;BR /&gt;I have checked the TCPIP$SYSTEM:TCPIP$SSH_RUN.COM file to see any references to the log file and it seems that it checks for the presence of  TCPIP$SSH_RUN.LOG file as a log file, but it's not clear what it does when this file is not at that directory (although in the practice it is created).&lt;BR /&gt;&lt;BR /&gt;I have discovered (from the SYS$MANAGER:TCPIP$CONFIG.COM file) that the syntax to define the log file is slightly different as I told you. It should be:&lt;BR /&gt;&lt;BR /&gt;$UCX SET SERVICE SSH/LOG=(FILE:TCPIP$SSH_DEVICE:[TCPIP$SSH]SSHD.LOG,ALL)&lt;BR /&gt;&lt;BR /&gt;I have tested with this definition and no changes from the previous tests.&lt;BR /&gt;&lt;BR /&gt;I don't know why your system doesn't create, at least, the default log file TCPIP$SSH_RUN.LOG. Perhaps:&lt;BR /&gt;&lt;BR /&gt;  * A file protection problem? -enable security alarms whenever starting the service-.&lt;BR /&gt;&lt;BR /&gt;  * A TCPIP version problem?. My version is:&lt;BR /&gt; HP TCP/IP Services for OpenVMS Alpha Version V5.4 - ECO 6 on a AlphaServer 4000 5/400 4MB running OpenVMS V7.3-2  &lt;BR /&gt;&lt;BR /&gt;If I find more information I'll let you knos.&lt;BR /&gt;&lt;BR /&gt;Regards.&lt;BR /&gt;&lt;BR /&gt;Ana&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2006 04:33:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882549#M82490</guid>
      <dc:creator>Ana M. García Olivencia</dc:creator>
      <dc:date>2006-10-25T04:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882550#M82491</link>
      <description>Ana,&lt;BR /&gt;&lt;BR /&gt;I do not think that it is a file protection error. If I look at the protection of the ssh home directory:&lt;BR /&gt;&lt;BR /&gt;dir /own /prot sys$sysdevice:[000000]tcpip$ssh.dir&lt;BR /&gt;&lt;BR /&gt;Although I do not suppose, the version may be the problem. But I am not sure. It is VMS 7.3-2 TCPIP V5.4 ECO5. I do not have the chance to test but people using this level may comment&lt;BR /&gt;&lt;BR /&gt;Thank you very much...</description>
      <pubDate>Sat, 28 Oct 2006 07:25:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882550#M82491</guid>
      <dc:creator>mustafa_12</dc:creator>
      <dc:date>2006-10-28T07:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: auditing logins over ssh</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882551#M82492</link>
      <description>There is a value (IntrusionIdentLocalUser) in [TCPIP$SSH.SSH2]SSHD2_CONFIG. which allows you to change between Username and IP.&lt;BR /&gt;&lt;BR /&gt;This is the help listed:&lt;BR /&gt;# V5.5-06&lt;BR /&gt;# If "yes" then the local user name is used in the intrusion record in place of&lt;BR /&gt;# SSH_xxxxxxxx where 'xxxxxxxx' is HEX IP address of remote host. This makes for&lt;BR /&gt;# more unique intrusion records and prevents the case of one intruder on a&lt;BR /&gt;# remote host locking out all users from that host. This field is especially&lt;BR /&gt;# useful in environments where multiple client hosts appear to be from the same&lt;BR /&gt;# remote IP address.&lt;BR /&gt;#&lt;BR /&gt;# If "no" then SSH_xxxxxxxx is used in the intrusion record.&lt;BR /&gt;#&lt;BR /&gt;# Default is "yes".&lt;BR /&gt;#&lt;BR /&gt;# This field is experimental. It may not work for public key and host based&lt;BR /&gt;# authentication.&lt;BR /&gt;#&lt;BR /&gt;# This field is not currently used for SSH logins from the TCP/IP Services for&lt;BR /&gt;# OpenVMS SSH client.&lt;BR /&gt;</description>
      <pubDate>Sat, 17 Mar 2007 00:13:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/auditing-logins-over-ssh/m-p/3882551#M82492</guid>
      <dc:creator>JCG</dc:creator>
      <dc:date>2007-03-17T00:13:17Z</dc:date>
    </item>
  </channel>
</rss>

