Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reports should say what the user attempted #378

Open
jidanni opened this issue May 20, 2024 · 2 comments
Open

Reports should say what the user attempted #378

jidanni opened this issue May 20, 2024 · 2 comments

Comments

@jidanni
Copy link

jidanni commented May 20, 2024

This lacks one critical detail,

From: Dan Jacobson <[email protected]>
Subject: *** SECURITY information for jidanni5.jidanni.org ***
To: [email protected]
Date: Mon, 20 May 2024 18:19:32 +0800

jidanni5.jidanni.org : May 20 18:19:32 : jidanni : user NOT in sudoers ; TTY=pts/0 ; PWD=/home/jidanni ; USER=root ; COMMAND=/usr/bin/w

i.e., what did the user do?

It should say that "user attempted run the command "w" using sudo, and entered a password, but then was discovered not to be on the sudoers list.

I mean one day one of these reports will end up in a court of law, so what happened needs to be real clear! Even if it was just little old me testing sudo.

Might as well also fold it to fit on one screen.

And maybe remove the blanks before the semicolons, as in English.

@millert
Copy link
Collaborator

millert commented Jun 5, 2024

Currently the email messages just contain the same info that was logged via syslog. In your example the user tried to run /usr/bin/w as root. If you know how to read the sudo syslog entries, you know how to read the email it sends too.

@jidanni
Copy link
Author

jidanni commented Jun 9, 2024

Which means both syslog and the email equally do not describe the incident adequately.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants