Solved

SU logging

Posted on 2006-10-23
5
638 Views
Last Modified: 2013-12-04
I am trying to find out who logged into our system and rebooted the system... The entry in the /var/adm/sulog file is:

SU 10/21 03:27 + console root-daemon

Which appears that someone walked up to the console and logged into root (right before it rebooted).

Here are my questions:

Is there any other way that the above entry would appear other that what I assume?
Is there a way to log the enties (or commands) that was entered by root? (other than using sudo).
Are there any other logs available to help research this issue?

FYI... We are running Sun Solaris 2.6
0
Comment
Question by:rlburris
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 14

Assisted Solution

by:chris_calabrese
chris_calabrese earned 200 total points
ID: 17791864
Actually that line says that a process running as root and associated with the console su'd to daemon. This was probably executed by one of the shutdown scripts.

To look for people logging into the console as root, check the output of 'last root'. You may also need to check sudo logs if you use sudo, or for logins to shutdown (a special user with no password that some vendors add for your "convenience")
0
 
LVL 38

Accepted Solution

by:
yuzh earned 300 total points
ID: 17793008
"root-daemon" could be from your startup script or shultdown script. (some services
in your box is might need to run as user daemon.

To find out who was shult it down, can be very hard if you have a lot of people know
the root password.

You can type in:
who -b
to find out the boot up time, and have a look at /var/adm/messages file to look at
what time the box was shultdown, then use "last" + "grep" to find out who was login
in the system
eg:
last | grep "Tue Oct 24"

then
last root

To find out if you can identify who was login as root, or have a look at the sulog
to see who su as root to shultdown the system.

You should use "sudo" instead of give the root passwod out.

you can download sudo binary package from:
http://sunfreeware.com

BTW, Solaris 6 is very out (no longer support by Sun), consider to upgrade your OS to Solaris 9 or 10. if you have a very old Sun box (cann't run Solaris 9/10), at least
upgrade the OS to Solaris 8.(Free OS download, CD images)

    http://www.sun.com/software/solaris/binaries_program.xml
    http://www.sun.com/software/solaris/9/
    http://www.sun.com/software/solaris/8/



0
 

Author Comment

by:rlburris
ID: 17793231
Yuzh,
      Thanks for your input... unfortunately I don't have the option to upgrade the Solaris version. When I went to the "sunfreeware" site, the download file has an extension of ".gz"... Is that a different compression utility other than the standard Unix "compress"?
0
 
LVL 38

Expert Comment

by:yuzh
ID: 17793788
You need to download gzip-1.3.5.10 from the same site and use pkgadd to install it.
(it will install in /usr/local/bin)

then you can run:
/usr/local/bin/gunzip filename.gz

file

That's another reason to upgrade the OS. Solaris 8 or newer has a lot more tools
then the older version, gzip is included in Solaris 8 or newer.

You can find a lot of tools for Solaris from the same site, eg gcc complier etc.
in the worst case, you can downlaod the sudo source code and complie it for your box.

Why not upgrade your OS, what type of Sun box you have?  
most of your application run on Solaris 6 should still work for Solaris 8.

0
 

Author Comment

by:rlburris
ID: 17793964
Yuzh,
       I am running a proprietary software (Interactive Voice Response) that runs only on 2.6... The next generation does run on Solaris 10, but my customer is not ready to upgrade yet.

Thanks!
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question