• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

listing history of commands used by other users

 
Ranch Hand
Posts: 41
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi
I have a problem .Someone logged as root has deleted an important file on the server.Many users were logged in as root in the system.I want to know who has deleted it.I have the ips from where all the root users have logged from.But now I want to know who has executed the rm command from his Shell.History command gives the list only upto 1000 .....how can I know the list commands executed by root from an another shell or is it that even though many users log on as root at the same time have a common .bash_history file ....I just want to track the shell from where it has been executed...please help me in this regard.,..
Thanks
Bye
Ravi
 
High Plains Drifter
Posts: 7289
Netbeans IDE VI Editor
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
You can't trace back a user command to its shell instance in plain installations of Unix. Even with system accounting or some kind of security auditing turned on, I don't think you could do this.

Asking 'which root user executed this command' is like asking 'which Ravi Shankar is a world-famous sitar player?' You know there's more than one Ravi Shankar, but you would need to have information beyond the name available to distinguish among them.
 
Rancher
Posts: 43081
77
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Many users were logged in as root in the system.



Multiple people log in as root routinely? My advice, which admittedly doesn't help with the question at hand: If the data on these systems is valuable at all, then run, don't walk, to hire people who have more experience in security than the ones that are in charge now.
 
Stop it! You're embarassing me! And you are embarrassing this tiny ad!
a bit of art, as a gift, that will fit in a stocking
https://gardener-gift.com
reply
    Bookmark Topic Watch Topic
  • New Topic