Actually, your protection is that the only people with access to the logs are
your three admins, they are protected from everyone else :-)
But I was really explining this for the other poster because if he is thinking
that adding the bash history to the logs creates this sort of risk, he's missed
the possibility I outlined below.
David Lang
On Tue, 9 Apr 2013, Josh Bitto wrote:
The reason this works for me is not because of the scenario's you have
outlined, but because command line interaction with production servers are only
limited to admins (3 people). Where I'm coming from is more of an audit trail.
I want to know (if by some miracle) that if a server is broken into I can see
what commands were put in and what was done. That's it....I do see the points
of view on it. If I had regular users that needed access to the command line or
what not, then yeah I could see that being an issue.
----------------------------------------------------------------
This is a good point, but you are missing the fact that you are already logging
passwords.
You are logging failed login attempts, right?
I guarantee you that at some point a user will get out of sync with the login
prompt and type their password into the userid field, and therefor you will
have that user's password in the logs (usually followed almost immediatly by
the userid as the user realizes their mistake and logs in correctly)
So you really need to be protecting your log data and/or implement something
better than simple password authentication.
David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE
THAT.