Re: Logging Password change attempts

2014-11-01 Thread Craig R. Skinner
On 2014-10-31 Fri 11:52 AM |, Alexander Hall wrote: However, for the purpose of indicating password changes, this is pretty useless anyway, since: - You can change to the same password - logger(1) is available for anyone to use (AFAIK) $ while sleep $((3600*24*7)); do logger I changed

Re: Logging Password change attempts

2014-11-01 Thread Alexander Hall
On November 1, 2014 12:49:51 PM CET, skin...@britvault.co.uk wrote: On 2014-10-31 Fri 11:52 AM |, Alexander Hall wrote: However, for the purpose of indicating password changes, this is pretty useless anyway, since: - You can change to the same password - logger(1) is available for anyone

Re: Logging Password change attempts

2014-11-01 Thread Stuart Henderson
On 2014-10-31, David Coppa dco...@gmail.com wrote: Or you can log every command issued on the system... Your management would be very happy! ;) ;) http://pastebin.com/FZw4rT3T That adds an easy DoS on a machine with serial console ;)

Re: Logging Password change attempts

2014-10-31 Thread Stuart Henderson
On 2014-10-30, Vijay Sankar vsan...@foretell.ca wrote: Unfortunately that won't work because the objective is to just log any (successful or failed) attempts to change passwords. I would probably try to abuse passwordcheck in login.conf to do this..

Re: Logging Password change attempts

2014-10-31 Thread Vijay Sankar
Quoting Stuart Henderson s...@spacehopper.org: On 2014-10-30, Vijay Sankar vsan...@foretell.ca wrote: Unfortunately that won't work because the objective is to just log any (successful or failed) attempts to change passwords. I would probably try to abuse passwordcheck in login.conf to do

Re: Logging Password change attempts

2014-10-31 Thread David Coppa
On Thu, Oct 30, 2014 at 3:07 PM, Vijay Sankar vsan...@foretell.ca wrote: Quoting trondd tro...@gmail.com: The second problem I have is that when I change password, out of habit, I do a passwd instead of mypasswd. Why not call the script passwd and put it in the path ahead of the real one?

Re: Logging Password change attempts

2014-10-31 Thread Alexander Hall
On Fri, Oct 31, 2014 at 08:44:02AM +, Stuart Henderson wrote: On 2014-10-30, Vijay Sankar vsan...@foretell.ca wrote: Unfortunately that won't work because the objective is to just log any (successful or failed) attempts to change passwords. I would probably try to abuse passwordcheck

Re: Logging Password change attempts

2014-10-31 Thread Vijay Sankar
Quoting David Coppa dco...@gmail.com: On Thu, Oct 30, 2014 at 3:07 PM, Vijay Sankar vsan...@foretell.ca wrote: Quoting trondd tro...@gmail.com: The second problem I have is that when I change password, out of habit, I do a passwd instead of mypasswd. Why not call the script passwd and

Re: Logging Password change attempts

2014-10-31 Thread David Coppa
On Fri, Oct 31, 2014 at 12:05 PM, Vijay Sankar vsan...@foretell.ca wrote: Hi David, Thank you very much!! I am going to try the passwordcheck idea suggested by Stuart since that allows me to keep using -stable. But will definitely try your very interesting diff for sure. Not mine at all.

Logging Password change attempts

2014-10-30 Thread Vijay Sankar
I have been using a simple script # mypasswd.sh /usr/bin/passwd -l if [[ $? != 0 ]]; then /usr/bin/logger Unsuccessful attempt to change password else /usr/bin/logger Changed login password fi to get syslog entries whenever I change my password. I looked for a better way but

Re: Logging Password change attempts

2014-10-30 Thread Alexander Hall
On October 30, 2014 1:26:25 PM CET, Vijay Sankar vsan...@foretell.ca wrote: I have been using a simple script # mypasswd.sh /usr/bin/passwd -l if [[ $? != 0 ]]; then /usr/bin/logger Unsuccessful attempt to change password else /usr/bin/logger Changed login password fi to get

Re: Logging Password change attempts

2014-10-30 Thread Vijay Sankar
Quoting Alexander Hall alexan...@beard.se: On October 30, 2014 1:26:25 PM CET, Vijay Sankar vsan...@foretell.ca wrote: I have been using a simple script # mypasswd.sh /usr/bin/passwd -l if [[ $? != 0 ]]; then /usr/bin/logger Unsuccessful attempt to change password else

Re: Logging Password change attempts

2014-10-30 Thread trondd
The second problem I have is that when I change password, out of habit, I do a passwd instead of mypasswd. Why not call the script passwd and put it in the path ahead of the real one? What is the goal? Are there users on the system trying to brute force change a password? Or are you just

Re: Logging Password change attempts

2014-10-30 Thread Vijay Sankar
Quoting trondd tro...@gmail.com: The second problem I have is that when I change password, out of habit, I do a passwd instead of mypasswd. Why not call the script passwd and put it in the path ahead of the real one? What is the goal? Are there users on the system trying to brute force

Re: Logging Password change attempts

2014-10-30 Thread trondd
Also check passwd(5), master.passwd holds expiration and last change information (I don't have in enabled anywhere, so I am not sure what it looks like) that maybe you could generate a report from if you are enforcing password expiry that way. Tim.

Re: Logging Password change attempts

2014-10-30 Thread Vijay Sankar
Quoting trondd tro...@gmail.com: Also check passwd(5), master.passwd holds expiration and last change information (I don't have in enabled anywhere, so I am not sure what it looks like) that maybe you could generate a report from if you are enforcing password expiry that way. Tim.

Re: Logging Password change attempts

2014-10-30 Thread trondd
Only other thing I could think of is monitoring the right file access or system calls or the like and logging that. But the script is probably the simplest and if anyone circumvents the script by calling passwd directly, it only means their password is newer than expected, which isn't as much of

Re: Logging Password change attempts

2014-10-30 Thread Alan McKay
Take the original passwd command and rename it to passwd.orig and rename your script into its place (without the .sh ending) and have your script call passwd.orig. Still not perfect since someone who knows the difference can still call the orig directly. The alternative would be to dig into the

Re: Logging Password change attempts

2014-10-30 Thread Stuart McMurray
A setuid wrapper around passwd would prevent normal (non-root, non-sudo) users from running passwd directly: -r-sr-xr-x 1 auditor bin 10240 Oct 30 11:47 passwd -r-x-- 1 auditor bin 28376 Oct 30 11:46 passwd.orig The only catch is it can't be a shell script, which adds another (trivial)

Re: Logging Password change attempts

2014-10-30 Thread Peter J. Philipp
On 10/30/14 13:56, Vijay Sankar wrote: Quoting Alexander Hall alexan...@beard.se: On October 30, 2014 1:26:25 PM CET, Vijay Sankar vsan...@foretell.ca wrote: I have been using a simple script # mypasswd.sh /usr/bin/passwd -l if [[ $? != 0 ]]; then /usr/bin/logger Unsuccessful

Re: Logging Password change attempts

2014-10-30 Thread Peter J. Philipp
On 10/30/14 17:19, Peter J. Philipp wrote: I think I found something and Vijay found it but is being modest. Let me show you: your script didn't work for me with /bin/sh so I modified it, and changed the logger's to echos so that I don't pollute my logs. I have found a small race in your

Re: Logging Password change attempts

2014-10-30 Thread Jan Stary
On Oct 30 10:39:29, tro...@gmail.com wrote: Also check passwd(5), master.passwd holds expiration and last change information No, that's something else: The change field is the number in seconds, GMT, from the Epoch, until the password for the account must be changed. This field may