How do I set up an email alert when a ssh login is successful?












51















Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



I'm using Ubuntu 12.04 running xfce










share|improve this question





























    51















    Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



    I'm using Ubuntu 12.04 running xfce










    share|improve this question



























      51












      51








      51


      39






      Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



      I'm using Ubuntu 12.04 running xfce










      share|improve this question
















      Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



      I'm using Ubuntu 12.04 running xfce







      bash ssh






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Sep 18 '12 at 1:05









      Jorge Castro

      36.3k105422617




      36.3k105422617










      asked Aug 24 '12 at 14:10









      Rick TRick T

      77221122




      77221122






















          10 Answers
          10






          active

          oldest

          votes


















          45















          Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




          Modify or create /etc/ssh/sshrc with the following contents:



          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

          logger -t ssh-wrapper $USER login from $ip
          echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




          This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



          Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



          Note: works with port forwarding, but with -N option not.






          share|improve this answer


























          • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

            – gertvdijk
            Jan 5 '13 at 15:58











          • does this also work when we are using gmail as the smtp server ?

            – user155073
            May 3 '13 at 6:38











          • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

            – Fritz
            Apr 16 '14 at 11:38








          • 2





            @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

            – Fritz
            Jan 26 '17 at 11:32











          • @Fritz Awesome, thanks for explaining.

            – mchid
            Jan 29 '17 at 17:02



















          63















          Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




          Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



          First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



          Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



          #!/bin/sh

          # Change these two lines:
          sender="sender-address@example.com"
          recepient="notify-address@example.org"

          if [ "$PAM_TYPE" != "close_session" ]; then
          host="`hostname`"
          subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
          # Message to send, e.g. the current environment variables.
          message="`env`"
          echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
          fi


          Once you have that, you can add the following line to /etc/pam.d/sshd:



          session optional pam_exec.so seteuid /path/to/login-notify.sh


          For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



          For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






          share|improve this answer





















          • 1





            It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

            – FelikZ
            Aug 29 '14 at 13:43






          • 1





            Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

            – Nicolas BADIA
            Mar 11 '15 at 8:11






          • 1





            You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

            – texasflood
            Oct 4 '15 at 13:55






          • 2





            Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

            – RedGiant
            Jan 18 '17 at 17:12






          • 2





            /etc/pam.d/login <- for tty logins

            – Fernando André
            Sep 29 '18 at 3:10



















          9














          We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



           check file ssh_logins with path /var/log/auth.log  
          # Ignore login's from whitelist ip addresses
          ignore match "100.100.100.1"
          # Else, alert
          if match "Accepted publickey" then alert


          Note: The mailserver configuration, email format etc. should be set in monitrc file



          Update:
          Wrote a more detailed blog post on this






          share|improve this answer

































            6














            Put the following in /etc/profile:



            if [ -n "$SSH_CLIENT" ]; then 
            TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
            TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
            echo $TEXT|mail -s "ssh login" you@your.domain
            fi


            How the script works



            /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



            Next, we then build the text of the message:





            • $(date) will be replaced by the output of the date command


            • ${USER} will be replaced by the user’s login name


            • $(hostname -f) will be replaced by the full hostname of the system being logged into


            The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



            Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






            share|improve this answer

































              2














              In this other question you probably have what you are looking for.
              Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






              share|improve this answer

































                1














                I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                #!/bin/sh

                # this script is triggered on SSH login and sends an email with details of the login
                # such as user, IP, hostname, and environment variables

                # script should be placed somewhere on the server, eg /etc/ssh
                # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                # Script settings
                MAILGUN_API_KEY=
                MAILGUN_DOMAIN=
                SENDER_NAME=
                SENDER_EMAIL_ADDRESS=
                RECIPIENT_EMAIL_ADDRESS=

                if [ "$PAM_TYPE" != "close_session" ]; then
                host=$(hostname)
                ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                # Message to send, e.g. the current environment variables.
                subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                message=$(env)
                curl -s --user '$MAILGUN_API_KEY'
                https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                -F to=$RECIPIENT_EMAIL_ADDRESS
                -F subject="$subject"
                -F text="${subject} ${message}"
                fi





                share|improve this answer































                  1














                  This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                  SUBNET="192.168.0"

                  IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                  CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                  if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                  msg="This message comes from same subnet! User $USER just logged in from $IP"
                  echo $msg|mail -s "$msg" root
                  else
                  msg="This message comes from different subnet! User $USER just logged in from $IP"
                  echo $msg|mail -s "$msg" root
                  fi

                  logger -t ssh-wrapper $USER login from $IP





                  share|improve this answer































                    1














                    Mailgun adaptation of @Fritz answer



                    After posting I noticed @pacharanero also writes about mailgun, but I don't
                    understand what they are doing with dig, so I'll post my solution as well.



                    If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                    One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                    This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                    #!/bin/bash
                    if [ "$PAM_TYPE" != "close_session" ]; then
                    APK='api:your-mailgun-api-key-goes-here'
                    FROM='Login Alert <mailgun@mg.mydomain.com>'
                    TO='me@mydomain.com'
                    SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                    DATE=$(date)
                    TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                    curl -s --user $APK
                    https://api.mailgun.net/v3/mg.mydomain.com/messages
                    -F from="$FROM"
                    -F to="$TO"
                    -F subject="$SUBJECT"
                    -F text="$TEXT"
                    fi


                    After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                    session optional pam_exec.so seteuid /root/login-alert.sh


                    I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                    share|improve this answer

































                      0














                      I've actually just modified @SirCharlo answer



                      ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                      logger -t ssh-wrapper $USER login from $ip
                      echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                      This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                      share|improve this answer































                        0














                        I'm using swatchdog from the swatch package to monitor for any lines containing the phrase "fail" (case insensitive) in /var/log/auth.log. I set it up to run it as a simple systemd service.



                        apt install swatch


                        Create a configure file /etc/swatch/swatch-auth-log.conf with owner root, permission 644 --



                        watchfor /fail/i
                        pipe /usr/local/sbin/sendmail -t auth.log@xxx.com


                        The "/fail/i" is a regexp, with the "i" indicating it is case insensitive. (My sendmail is a script sending everything to a fixed address via mailgun, so the address doesn't really matter).



                        Create a systemd service file /etc/systemd/system/swatch-auth-log.service with owner root, permission 644 --



                        [Unit]
                        Description=monitor /var/log/auth.log, send fail notices by mail

                        [Service]
                        ExecStart=/usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log

                        [Install]
                        #WantedBy=multi-user.target
                        WantedBy=pre-network.target


                        Then enable, start, and view the status of the service --



                        sudo systemctl enable swatch-auth-log.service
                        sudo systemctl start swatch-auth-log.service
                        sudo systemctl status swatch-auth-log.service


                        An example of a successful status report --



                        ● swatch-auth-log.service - monitor /var/log/auth.log, send fail notices by mail
                        Loaded: loaded (/etc/systemd/system/swatch-auth-log.service; enabled; vendor preset: enabled)
                        Active: active (running) since Thu 2019-01-31 21:41:52 PST; 17min ago
                        Main PID: 27945 (swatchdog)
                        Tasks: 3 (limit: 4915)
                        CGroup: /system.slice/swatch-auth-log.service
                        ├─27945 /usr/bin/perl /usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log
                        ├─27947 /usr/bin/perl /.swatchdog_script.27945
                        └─27949 /usr/bin/tail -n 0 -F /var/log/auth.log

                        Jan 31 21:41:52 ub18 systemd[1]: Started monitor /var/log/auth.log, send fail notices by mail.
                        Jan 31 21:41:52 ub18 swatchdog[27945]: *** swatchdog version 3.2.4 (pid:27945) started at Thu Jan 31 21:41:52 PST 2019


                        The service will be automatically started at boot and monitored by systemd.





                        Discussion



                        Originally I used a pam solution similar to the above, but in /etc/pam.d/common-auth not sshd. That was to catch ssh, sudo, and logins. But then after an update all my passwords stopped working, even after changing the passwords in rescue mode. Eventually I changed the /etc/pam.d/common-auth back to the original and passwords worked again. Here is a description on the Stack Exchange UNIX & Linux board



                        I decided it would be safer not to touch difficult to understand security settings. And everything is in the log files anyway.





                        share























                          Your Answer








                          StackExchange.ready(function() {
                          var channelOptions = {
                          tags: "".split(" "),
                          id: "89"
                          };
                          initTagRenderer("".split(" "), "".split(" "), channelOptions);

                          StackExchange.using("externalEditor", function() {
                          // Have to fire editor after snippets, if snippets enabled
                          if (StackExchange.settings.snippets.snippetsEnabled) {
                          StackExchange.using("snippets", function() {
                          createEditor();
                          });
                          }
                          else {
                          createEditor();
                          }
                          });

                          function createEditor() {
                          StackExchange.prepareEditor({
                          heartbeatType: 'answer',
                          autoActivateHeartbeat: false,
                          convertImagesToLinks: true,
                          noModals: true,
                          showLowRepImageUploadWarning: true,
                          reputationToPostImages: 10,
                          bindNavPrevention: true,
                          postfix: "",
                          imageUploader: {
                          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                          allowUrls: true
                          },
                          onDemand: true,
                          discardSelector: ".discard-answer"
                          ,immediatelyShowMarkdownHelp:true
                          });


                          }
                          });














                          draft saved

                          draft discarded


















                          StackExchange.ready(
                          function () {
                          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f179889%2fhow-do-i-set-up-an-email-alert-when-a-ssh-login-is-successful%23new-answer', 'question_page');
                          }
                          );

                          Post as a guest















                          Required, but never shown

























                          10 Answers
                          10






                          active

                          oldest

                          votes








                          10 Answers
                          10






                          active

                          oldest

                          votes









                          active

                          oldest

                          votes






                          active

                          oldest

                          votes









                          45















                          Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                          Modify or create /etc/ssh/sshrc with the following contents:



                          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                          logger -t ssh-wrapper $USER login from $ip
                          echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                          This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                          Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                          Note: works with port forwarding, but with -N option not.






                          share|improve this answer


























                          • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                            – gertvdijk
                            Jan 5 '13 at 15:58











                          • does this also work when we are using gmail as the smtp server ?

                            – user155073
                            May 3 '13 at 6:38











                          • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                            – Fritz
                            Apr 16 '14 at 11:38








                          • 2





                            @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                            – Fritz
                            Jan 26 '17 at 11:32











                          • @Fritz Awesome, thanks for explaining.

                            – mchid
                            Jan 29 '17 at 17:02
















                          45















                          Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                          Modify or create /etc/ssh/sshrc with the following contents:



                          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                          logger -t ssh-wrapper $USER login from $ip
                          echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                          This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                          Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                          Note: works with port forwarding, but with -N option not.






                          share|improve this answer


























                          • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                            – gertvdijk
                            Jan 5 '13 at 15:58











                          • does this also work when we are using gmail as the smtp server ?

                            – user155073
                            May 3 '13 at 6:38











                          • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                            – Fritz
                            Apr 16 '14 at 11:38








                          • 2





                            @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                            – Fritz
                            Jan 26 '17 at 11:32











                          • @Fritz Awesome, thanks for explaining.

                            – mchid
                            Jan 29 '17 at 17:02














                          45












                          45








                          45








                          Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                          Modify or create /etc/ssh/sshrc with the following contents:



                          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                          logger -t ssh-wrapper $USER login from $ip
                          echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                          This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                          Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                          Note: works with port forwarding, but with -N option not.






                          share|improve this answer
















                          Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                          Modify or create /etc/ssh/sshrc with the following contents:



                          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                          logger -t ssh-wrapper $USER login from $ip
                          echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                          This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                          Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                          Note: works with port forwarding, but with -N option not.







                          share|improve this answer














                          share|improve this answer



                          share|improve this answer








                          edited May 9 '18 at 16:16









                          Philippe Gachoud

                          3,2372538




                          3,2372538










                          answered Aug 24 '12 at 15:16









                          SirCharloSirCharlo

                          29.7k75976




                          29.7k75976













                          • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                            – gertvdijk
                            Jan 5 '13 at 15:58











                          • does this also work when we are using gmail as the smtp server ?

                            – user155073
                            May 3 '13 at 6:38











                          • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                            – Fritz
                            Apr 16 '14 at 11:38








                          • 2





                            @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                            – Fritz
                            Jan 26 '17 at 11:32











                          • @Fritz Awesome, thanks for explaining.

                            – mchid
                            Jan 29 '17 at 17:02



















                          • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                            – gertvdijk
                            Jan 5 '13 at 15:58











                          • does this also work when we are using gmail as the smtp server ?

                            – user155073
                            May 3 '13 at 6:38











                          • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                            – Fritz
                            Apr 16 '14 at 11:38








                          • 2





                            @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                            – Fritz
                            Jan 26 '17 at 11:32











                          • @Fritz Awesome, thanks for explaining.

                            – mchid
                            Jan 29 '17 at 17:02

















                          Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                          – gertvdijk
                          Jan 5 '13 at 15:58





                          Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                          – gertvdijk
                          Jan 5 '13 at 15:58













                          does this also work when we are using gmail as the smtp server ?

                          – user155073
                          May 3 '13 at 6:38





                          does this also work when we are using gmail as the smtp server ?

                          – user155073
                          May 3 '13 at 6:38













                          This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                          – Fritz
                          Apr 16 '14 at 11:38







                          This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                          – Fritz
                          Apr 16 '14 at 11:38






                          2




                          2





                          @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                          – Fritz
                          Jan 26 '17 at 11:32





                          @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                          – Fritz
                          Jan 26 '17 at 11:32













                          @Fritz Awesome, thanks for explaining.

                          – mchid
                          Jan 29 '17 at 17:02





                          @Fritz Awesome, thanks for explaining.

                          – mchid
                          Jan 29 '17 at 17:02













                          63















                          Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                          Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                          First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                          Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                          #!/bin/sh

                          # Change these two lines:
                          sender="sender-address@example.com"
                          recepient="notify-address@example.org"

                          if [ "$PAM_TYPE" != "close_session" ]; then
                          host="`hostname`"
                          subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                          # Message to send, e.g. the current environment variables.
                          message="`env`"
                          echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                          fi


                          Once you have that, you can add the following line to /etc/pam.d/sshd:



                          session optional pam_exec.so seteuid /path/to/login-notify.sh


                          For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                          For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






                          share|improve this answer





















                          • 1





                            It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                            – FelikZ
                            Aug 29 '14 at 13:43






                          • 1





                            Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                            – Nicolas BADIA
                            Mar 11 '15 at 8:11






                          • 1





                            You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                            – texasflood
                            Oct 4 '15 at 13:55






                          • 2





                            Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                            – RedGiant
                            Jan 18 '17 at 17:12






                          • 2





                            /etc/pam.d/login <- for tty logins

                            – Fernando André
                            Sep 29 '18 at 3:10
















                          63















                          Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                          Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                          First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                          Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                          #!/bin/sh

                          # Change these two lines:
                          sender="sender-address@example.com"
                          recepient="notify-address@example.org"

                          if [ "$PAM_TYPE" != "close_session" ]; then
                          host="`hostname`"
                          subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                          # Message to send, e.g. the current environment variables.
                          message="`env`"
                          echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                          fi


                          Once you have that, you can add the following line to /etc/pam.d/sshd:



                          session optional pam_exec.so seteuid /path/to/login-notify.sh


                          For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                          For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






                          share|improve this answer





















                          • 1





                            It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                            – FelikZ
                            Aug 29 '14 at 13:43






                          • 1





                            Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                            – Nicolas BADIA
                            Mar 11 '15 at 8:11






                          • 1





                            You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                            – texasflood
                            Oct 4 '15 at 13:55






                          • 2





                            Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                            – RedGiant
                            Jan 18 '17 at 17:12






                          • 2





                            /etc/pam.d/login <- for tty logins

                            – Fernando André
                            Sep 29 '18 at 3:10














                          63












                          63








                          63








                          Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                          Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                          First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                          Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                          #!/bin/sh

                          # Change these two lines:
                          sender="sender-address@example.com"
                          recepient="notify-address@example.org"

                          if [ "$PAM_TYPE" != "close_session" ]; then
                          host="`hostname`"
                          subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                          # Message to send, e.g. the current environment variables.
                          message="`env`"
                          echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                          fi


                          Once you have that, you can add the following line to /etc/pam.d/sshd:



                          session optional pam_exec.so seteuid /path/to/login-notify.sh


                          For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                          For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






                          share|improve this answer
















                          Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                          Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                          First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                          Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                          #!/bin/sh

                          # Change these two lines:
                          sender="sender-address@example.com"
                          recepient="notify-address@example.org"

                          if [ "$PAM_TYPE" != "close_session" ]; then
                          host="`hostname`"
                          subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                          # Message to send, e.g. the current environment variables.
                          message="`env`"
                          echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                          fi


                          Once you have that, you can add the following line to /etc/pam.d/sshd:



                          session optional pam_exec.so seteuid /path/to/login-notify.sh


                          For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                          For those of you in need of an explanation of what PAM is and how it works, here is a very good one.







                          share|improve this answer














                          share|improve this answer



                          share|improve this answer








                          edited Jan 16 at 9:59

























                          answered Apr 16 '14 at 14:39









                          FritzFritz

                          73459




                          73459








                          • 1





                            It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                            – FelikZ
                            Aug 29 '14 at 13:43






                          • 1





                            Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                            – Nicolas BADIA
                            Mar 11 '15 at 8:11






                          • 1





                            You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                            – texasflood
                            Oct 4 '15 at 13:55






                          • 2





                            Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                            – RedGiant
                            Jan 18 '17 at 17:12






                          • 2





                            /etc/pam.d/login <- for tty logins

                            – Fernando André
                            Sep 29 '18 at 3:10














                          • 1





                            It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                            – FelikZ
                            Aug 29 '14 at 13:43






                          • 1





                            Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                            – Nicolas BADIA
                            Mar 11 '15 at 8:11






                          • 1





                            You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                            – texasflood
                            Oct 4 '15 at 13:55






                          • 2





                            Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                            – RedGiant
                            Jan 18 '17 at 17:12






                          • 2





                            /etc/pam.d/login <- for tty logins

                            – Fernando André
                            Sep 29 '18 at 3:10








                          1




                          1





                          It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                          – FelikZ
                          Aug 29 '14 at 13:43





                          It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                          – FelikZ
                          Aug 29 '14 at 13:43




                          1




                          1





                          Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                          – Nicolas BADIA
                          Mar 11 '15 at 8:11





                          Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                          – Nicolas BADIA
                          Mar 11 '15 at 8:11




                          1




                          1





                          You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                          – texasflood
                          Oct 4 '15 at 13:55





                          You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                          – texasflood
                          Oct 4 '15 at 13:55




                          2




                          2





                          Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                          – RedGiant
                          Jan 18 '17 at 17:12





                          Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                          – RedGiant
                          Jan 18 '17 at 17:12




                          2




                          2





                          /etc/pam.d/login <- for tty logins

                          – Fernando André
                          Sep 29 '18 at 3:10





                          /etc/pam.d/login <- for tty logins

                          – Fernando André
                          Sep 29 '18 at 3:10











                          9














                          We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                           check file ssh_logins with path /var/log/auth.log  
                          # Ignore login's from whitelist ip addresses
                          ignore match "100.100.100.1"
                          # Else, alert
                          if match "Accepted publickey" then alert


                          Note: The mailserver configuration, email format etc. should be set in monitrc file



                          Update:
                          Wrote a more detailed blog post on this






                          share|improve this answer






























                            9














                            We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                             check file ssh_logins with path /var/log/auth.log  
                            # Ignore login's from whitelist ip addresses
                            ignore match "100.100.100.1"
                            # Else, alert
                            if match "Accepted publickey" then alert


                            Note: The mailserver configuration, email format etc. should be set in monitrc file



                            Update:
                            Wrote a more detailed blog post on this






                            share|improve this answer




























                              9












                              9








                              9







                              We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                               check file ssh_logins with path /var/log/auth.log  
                              # Ignore login's from whitelist ip addresses
                              ignore match "100.100.100.1"
                              # Else, alert
                              if match "Accepted publickey" then alert


                              Note: The mailserver configuration, email format etc. should be set in monitrc file



                              Update:
                              Wrote a more detailed blog post on this






                              share|improve this answer















                              We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                               check file ssh_logins with path /var/log/auth.log  
                              # Ignore login's from whitelist ip addresses
                              ignore match "100.100.100.1"
                              # Else, alert
                              if match "Accepted publickey" then alert


                              Note: The mailserver configuration, email format etc. should be set in monitrc file



                              Update:
                              Wrote a more detailed blog post on this







                              share|improve this answer














                              share|improve this answer



                              share|improve this answer








                              edited Jun 15 '14 at 6:36

























                              answered Jun 2 '14 at 11:52









                              LitmusLitmus

                              23134




                              23134























                                  6














                                  Put the following in /etc/profile:



                                  if [ -n "$SSH_CLIENT" ]; then 
                                  TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                  TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                  echo $TEXT|mail -s "ssh login" you@your.domain
                                  fi


                                  How the script works



                                  /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                  Next, we then build the text of the message:





                                  • $(date) will be replaced by the output of the date command


                                  • ${USER} will be replaced by the user’s login name


                                  • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                  The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                  Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






                                  share|improve this answer






























                                    6














                                    Put the following in /etc/profile:



                                    if [ -n "$SSH_CLIENT" ]; then 
                                    TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                    TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                    echo $TEXT|mail -s "ssh login" you@your.domain
                                    fi


                                    How the script works



                                    /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                    Next, we then build the text of the message:





                                    • $(date) will be replaced by the output of the date command


                                    • ${USER} will be replaced by the user’s login name


                                    • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                    The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                    Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






                                    share|improve this answer




























                                      6












                                      6








                                      6







                                      Put the following in /etc/profile:



                                      if [ -n "$SSH_CLIENT" ]; then 
                                      TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                      TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                      echo $TEXT|mail -s "ssh login" you@your.domain
                                      fi


                                      How the script works



                                      /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                      Next, we then build the text of the message:





                                      • $(date) will be replaced by the output of the date command


                                      • ${USER} will be replaced by the user’s login name


                                      • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                      The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                      Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






                                      share|improve this answer















                                      Put the following in /etc/profile:



                                      if [ -n "$SSH_CLIENT" ]; then 
                                      TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                      TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                      echo $TEXT|mail -s "ssh login" you@your.domain
                                      fi


                                      How the script works



                                      /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                      Next, we then build the text of the message:





                                      • $(date) will be replaced by the output of the date command


                                      • ${USER} will be replaced by the user’s login name


                                      • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                      The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                      Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.







                                      share|improve this answer














                                      share|improve this answer



                                      share|improve this answer








                                      edited Nov 26 '15 at 10:55









                                      muru

                                      1




                                      1










                                      answered Nov 26 '15 at 10:48









                                      user476225user476225

                                      6111




                                      6111























                                          2














                                          In this other question you probably have what you are looking for.
                                          Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






                                          share|improve this answer






























                                            2














                                            In this other question you probably have what you are looking for.
                                            Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






                                            share|improve this answer




























                                              2












                                              2








                                              2







                                              In this other question you probably have what you are looking for.
                                              Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






                                              share|improve this answer















                                              In this other question you probably have what you are looking for.
                                              Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd







                                              share|improve this answer














                                              share|improve this answer



                                              share|improve this answer








                                              edited Apr 13 '17 at 12:37









                                              Community

                                              1




                                              1










                                              answered Aug 24 '12 at 15:01









                                              adosaiguasadosaiguas

                                              324214




                                              324214























                                                  1














                                                  I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                  Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                  #!/bin/sh

                                                  # this script is triggered on SSH login and sends an email with details of the login
                                                  # such as user, IP, hostname, and environment variables

                                                  # script should be placed somewhere on the server, eg /etc/ssh
                                                  # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                  # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                  # Script settings
                                                  MAILGUN_API_KEY=
                                                  MAILGUN_DOMAIN=
                                                  SENDER_NAME=
                                                  SENDER_EMAIL_ADDRESS=
                                                  RECIPIENT_EMAIL_ADDRESS=

                                                  if [ "$PAM_TYPE" != "close_session" ]; then
                                                  host=$(hostname)
                                                  ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                  # Message to send, e.g. the current environment variables.
                                                  subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                  message=$(env)
                                                  curl -s --user '$MAILGUN_API_KEY'
                                                  https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                  -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                  -F to=$RECIPIENT_EMAIL_ADDRESS
                                                  -F subject="$subject"
                                                  -F text="${subject} ${message}"
                                                  fi





                                                  share|improve this answer




























                                                    1














                                                    I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                    Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                    #!/bin/sh

                                                    # this script is triggered on SSH login and sends an email with details of the login
                                                    # such as user, IP, hostname, and environment variables

                                                    # script should be placed somewhere on the server, eg /etc/ssh
                                                    # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                    # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                    # Script settings
                                                    MAILGUN_API_KEY=
                                                    MAILGUN_DOMAIN=
                                                    SENDER_NAME=
                                                    SENDER_EMAIL_ADDRESS=
                                                    RECIPIENT_EMAIL_ADDRESS=

                                                    if [ "$PAM_TYPE" != "close_session" ]; then
                                                    host=$(hostname)
                                                    ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                    # Message to send, e.g. the current environment variables.
                                                    subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                    message=$(env)
                                                    curl -s --user '$MAILGUN_API_KEY'
                                                    https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                    -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                    -F to=$RECIPIENT_EMAIL_ADDRESS
                                                    -F subject="$subject"
                                                    -F text="${subject} ${message}"
                                                    fi





                                                    share|improve this answer


























                                                      1












                                                      1








                                                      1







                                                      I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                      Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                      #!/bin/sh

                                                      # this script is triggered on SSH login and sends an email with details of the login
                                                      # such as user, IP, hostname, and environment variables

                                                      # script should be placed somewhere on the server, eg /etc/ssh
                                                      # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                      # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                      # Script settings
                                                      MAILGUN_API_KEY=
                                                      MAILGUN_DOMAIN=
                                                      SENDER_NAME=
                                                      SENDER_EMAIL_ADDRESS=
                                                      RECIPIENT_EMAIL_ADDRESS=

                                                      if [ "$PAM_TYPE" != "close_session" ]; then
                                                      host=$(hostname)
                                                      ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                      # Message to send, e.g. the current environment variables.
                                                      subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                      message=$(env)
                                                      curl -s --user '$MAILGUN_API_KEY'
                                                      https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                      -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                      -F to=$RECIPIENT_EMAIL_ADDRESS
                                                      -F subject="$subject"
                                                      -F text="${subject} ${message}"
                                                      fi





                                                      share|improve this answer













                                                      I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                      Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                      #!/bin/sh

                                                      # this script is triggered on SSH login and sends an email with details of the login
                                                      # such as user, IP, hostname, and environment variables

                                                      # script should be placed somewhere on the server, eg /etc/ssh
                                                      # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                      # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                      # Script settings
                                                      MAILGUN_API_KEY=
                                                      MAILGUN_DOMAIN=
                                                      SENDER_NAME=
                                                      SENDER_EMAIL_ADDRESS=
                                                      RECIPIENT_EMAIL_ADDRESS=

                                                      if [ "$PAM_TYPE" != "close_session" ]; then
                                                      host=$(hostname)
                                                      ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                      # Message to send, e.g. the current environment variables.
                                                      subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                      message=$(env)
                                                      curl -s --user '$MAILGUN_API_KEY'
                                                      https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                      -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                      -F to=$RECIPIENT_EMAIL_ADDRESS
                                                      -F subject="$subject"
                                                      -F text="${subject} ${message}"
                                                      fi






                                                      share|improve this answer












                                                      share|improve this answer



                                                      share|improve this answer










                                                      answered Nov 16 '17 at 18:12









                                                      pacharaneropacharanero

                                                      111




                                                      111























                                                          1














                                                          This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                          SUBNET="192.168.0"

                                                          IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                          CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                          if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                          msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                          echo $msg|mail -s "$msg" root
                                                          else
                                                          msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                          echo $msg|mail -s "$msg" root
                                                          fi

                                                          logger -t ssh-wrapper $USER login from $IP





                                                          share|improve this answer




























                                                            1














                                                            This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                            SUBNET="192.168.0"

                                                            IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                            CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                            if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                            msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                            echo $msg|mail -s "$msg" root
                                                            else
                                                            msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                            echo $msg|mail -s "$msg" root
                                                            fi

                                                            logger -t ssh-wrapper $USER login from $IP





                                                            share|improve this answer


























                                                              1












                                                              1








                                                              1







                                                              This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                              SUBNET="192.168.0"

                                                              IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                              CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                              if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                              msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                              echo $msg|mail -s "$msg" root
                                                              else
                                                              msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                              echo $msg|mail -s "$msg" root
                                                              fi

                                                              logger -t ssh-wrapper $USER login from $IP





                                                              share|improve this answer













                                                              This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                              SUBNET="192.168.0"

                                                              IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                              CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                              if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                              msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                              echo $msg|mail -s "$msg" root
                                                              else
                                                              msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                              echo $msg|mail -s "$msg" root
                                                              fi

                                                              logger -t ssh-wrapper $USER login from $IP






                                                              share|improve this answer












                                                              share|improve this answer



                                                              share|improve this answer










                                                              answered May 11 '18 at 13:11









                                                              Philippe GachoudPhilippe Gachoud

                                                              3,2372538




                                                              3,2372538























                                                                  1














                                                                  Mailgun adaptation of @Fritz answer



                                                                  After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                  understand what they are doing with dig, so I'll post my solution as well.



                                                                  If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                  One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                  This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                  #!/bin/bash
                                                                  if [ "$PAM_TYPE" != "close_session" ]; then
                                                                  APK='api:your-mailgun-api-key-goes-here'
                                                                  FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                  TO='me@mydomain.com'
                                                                  SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                  DATE=$(date)
                                                                  TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                  curl -s --user $APK
                                                                  https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                  -F from="$FROM"
                                                                  -F to="$TO"
                                                                  -F subject="$SUBJECT"
                                                                  -F text="$TEXT"
                                                                  fi


                                                                  After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                  session optional pam_exec.so seteuid /root/login-alert.sh


                                                                  I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                                                                  share|improve this answer






























                                                                    1














                                                                    Mailgun adaptation of @Fritz answer



                                                                    After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                    understand what they are doing with dig, so I'll post my solution as well.



                                                                    If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                    One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                    This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                    #!/bin/bash
                                                                    if [ "$PAM_TYPE" != "close_session" ]; then
                                                                    APK='api:your-mailgun-api-key-goes-here'
                                                                    FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                    TO='me@mydomain.com'
                                                                    SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                    DATE=$(date)
                                                                    TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                    curl -s --user $APK
                                                                    https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                    -F from="$FROM"
                                                                    -F to="$TO"
                                                                    -F subject="$SUBJECT"
                                                                    -F text="$TEXT"
                                                                    fi


                                                                    After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                    session optional pam_exec.so seteuid /root/login-alert.sh


                                                                    I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                                                                    share|improve this answer




























                                                                      1












                                                                      1








                                                                      1







                                                                      Mailgun adaptation of @Fritz answer



                                                                      After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                      understand what they are doing with dig, so I'll post my solution as well.



                                                                      If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                      One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                      This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                      #!/bin/bash
                                                                      if [ "$PAM_TYPE" != "close_session" ]; then
                                                                      APK='api:your-mailgun-api-key-goes-here'
                                                                      FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                      TO='me@mydomain.com'
                                                                      SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                      DATE=$(date)
                                                                      TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                      curl -s --user $APK
                                                                      https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                      -F from="$FROM"
                                                                      -F to="$TO"
                                                                      -F subject="$SUBJECT"
                                                                      -F text="$TEXT"
                                                                      fi


                                                                      After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                      session optional pam_exec.so seteuid /root/login-alert.sh


                                                                      I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                                                                      share|improve this answer















                                                                      Mailgun adaptation of @Fritz answer



                                                                      After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                      understand what they are doing with dig, so I'll post my solution as well.



                                                                      If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                      One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                      This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                      #!/bin/bash
                                                                      if [ "$PAM_TYPE" != "close_session" ]; then
                                                                      APK='api:your-mailgun-api-key-goes-here'
                                                                      FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                      TO='me@mydomain.com'
                                                                      SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                      DATE=$(date)
                                                                      TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                      curl -s --user $APK
                                                                      https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                      -F from="$FROM"
                                                                      -F to="$TO"
                                                                      -F subject="$SUBJECT"
                                                                      -F text="$TEXT"
                                                                      fi


                                                                      After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                      session optional pam_exec.so seteuid /root/login-alert.sh


                                                                      I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.







                                                                      share|improve this answer














                                                                      share|improve this answer



                                                                      share|improve this answer








                                                                      edited Jul 4 '18 at 6:46

























                                                                      answered Jul 4 '18 at 6:29









                                                                      PaulPaul

                                                                      13519




                                                                      13519























                                                                          0














                                                                          I've actually just modified @SirCharlo answer



                                                                          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                          logger -t ssh-wrapper $USER login from $ip
                                                                          echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                          This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                                                                          share|improve this answer




























                                                                            0














                                                                            I've actually just modified @SirCharlo answer



                                                                            ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                            logger -t ssh-wrapper $USER login from $ip
                                                                            echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                            This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                                                                            share|improve this answer


























                                                                              0












                                                                              0








                                                                              0







                                                                              I've actually just modified @SirCharlo answer



                                                                              ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                              logger -t ssh-wrapper $USER login from $ip
                                                                              echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                              This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                                                                              share|improve this answer













                                                                              I've actually just modified @SirCharlo answer



                                                                              ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                              logger -t ssh-wrapper $USER login from $ip
                                                                              echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                              This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts







                                                                              share|improve this answer












                                                                              share|improve this answer



                                                                              share|improve this answer










                                                                              answered Dec 13 '16 at 13:24









                                                                              MrMeseesMrMesees

                                                                              1188




                                                                              1188























                                                                                  0














                                                                                  I'm using swatchdog from the swatch package to monitor for any lines containing the phrase "fail" (case insensitive) in /var/log/auth.log. I set it up to run it as a simple systemd service.



                                                                                  apt install swatch


                                                                                  Create a configure file /etc/swatch/swatch-auth-log.conf with owner root, permission 644 --



                                                                                  watchfor /fail/i
                                                                                  pipe /usr/local/sbin/sendmail -t auth.log@xxx.com


                                                                                  The "/fail/i" is a regexp, with the "i" indicating it is case insensitive. (My sendmail is a script sending everything to a fixed address via mailgun, so the address doesn't really matter).



                                                                                  Create a systemd service file /etc/systemd/system/swatch-auth-log.service with owner root, permission 644 --



                                                                                  [Unit]
                                                                                  Description=monitor /var/log/auth.log, send fail notices by mail

                                                                                  [Service]
                                                                                  ExecStart=/usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log

                                                                                  [Install]
                                                                                  #WantedBy=multi-user.target
                                                                                  WantedBy=pre-network.target


                                                                                  Then enable, start, and view the status of the service --



                                                                                  sudo systemctl enable swatch-auth-log.service
                                                                                  sudo systemctl start swatch-auth-log.service
                                                                                  sudo systemctl status swatch-auth-log.service


                                                                                  An example of a successful status report --



                                                                                  ● swatch-auth-log.service - monitor /var/log/auth.log, send fail notices by mail
                                                                                  Loaded: loaded (/etc/systemd/system/swatch-auth-log.service; enabled; vendor preset: enabled)
                                                                                  Active: active (running) since Thu 2019-01-31 21:41:52 PST; 17min ago
                                                                                  Main PID: 27945 (swatchdog)
                                                                                  Tasks: 3 (limit: 4915)
                                                                                  CGroup: /system.slice/swatch-auth-log.service
                                                                                  ├─27945 /usr/bin/perl /usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log
                                                                                  ├─27947 /usr/bin/perl /.swatchdog_script.27945
                                                                                  └─27949 /usr/bin/tail -n 0 -F /var/log/auth.log

                                                                                  Jan 31 21:41:52 ub18 systemd[1]: Started monitor /var/log/auth.log, send fail notices by mail.
                                                                                  Jan 31 21:41:52 ub18 swatchdog[27945]: *** swatchdog version 3.2.4 (pid:27945) started at Thu Jan 31 21:41:52 PST 2019


                                                                                  The service will be automatically started at boot and monitored by systemd.





                                                                                  Discussion



                                                                                  Originally I used a pam solution similar to the above, but in /etc/pam.d/common-auth not sshd. That was to catch ssh, sudo, and logins. But then after an update all my passwords stopped working, even after changing the passwords in rescue mode. Eventually I changed the /etc/pam.d/common-auth back to the original and passwords worked again. Here is a description on the Stack Exchange UNIX & Linux board



                                                                                  I decided it would be safer not to touch difficult to understand security settings. And everything is in the log files anyway.





                                                                                  share




























                                                                                    0














                                                                                    I'm using swatchdog from the swatch package to monitor for any lines containing the phrase "fail" (case insensitive) in /var/log/auth.log. I set it up to run it as a simple systemd service.



                                                                                    apt install swatch


                                                                                    Create a configure file /etc/swatch/swatch-auth-log.conf with owner root, permission 644 --



                                                                                    watchfor /fail/i
                                                                                    pipe /usr/local/sbin/sendmail -t auth.log@xxx.com


                                                                                    The "/fail/i" is a regexp, with the "i" indicating it is case insensitive. (My sendmail is a script sending everything to a fixed address via mailgun, so the address doesn't really matter).



                                                                                    Create a systemd service file /etc/systemd/system/swatch-auth-log.service with owner root, permission 644 --



                                                                                    [Unit]
                                                                                    Description=monitor /var/log/auth.log, send fail notices by mail

                                                                                    [Service]
                                                                                    ExecStart=/usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log

                                                                                    [Install]
                                                                                    #WantedBy=multi-user.target
                                                                                    WantedBy=pre-network.target


                                                                                    Then enable, start, and view the status of the service --



                                                                                    sudo systemctl enable swatch-auth-log.service
                                                                                    sudo systemctl start swatch-auth-log.service
                                                                                    sudo systemctl status swatch-auth-log.service


                                                                                    An example of a successful status report --



                                                                                    ● swatch-auth-log.service - monitor /var/log/auth.log, send fail notices by mail
                                                                                    Loaded: loaded (/etc/systemd/system/swatch-auth-log.service; enabled; vendor preset: enabled)
                                                                                    Active: active (running) since Thu 2019-01-31 21:41:52 PST; 17min ago
                                                                                    Main PID: 27945 (swatchdog)
                                                                                    Tasks: 3 (limit: 4915)
                                                                                    CGroup: /system.slice/swatch-auth-log.service
                                                                                    ├─27945 /usr/bin/perl /usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log
                                                                                    ├─27947 /usr/bin/perl /.swatchdog_script.27945
                                                                                    └─27949 /usr/bin/tail -n 0 -F /var/log/auth.log

                                                                                    Jan 31 21:41:52 ub18 systemd[1]: Started monitor /var/log/auth.log, send fail notices by mail.
                                                                                    Jan 31 21:41:52 ub18 swatchdog[27945]: *** swatchdog version 3.2.4 (pid:27945) started at Thu Jan 31 21:41:52 PST 2019


                                                                                    The service will be automatically started at boot and monitored by systemd.





                                                                                    Discussion



                                                                                    Originally I used a pam solution similar to the above, but in /etc/pam.d/common-auth not sshd. That was to catch ssh, sudo, and logins. But then after an update all my passwords stopped working, even after changing the passwords in rescue mode. Eventually I changed the /etc/pam.d/common-auth back to the original and passwords worked again. Here is a description on the Stack Exchange UNIX & Linux board



                                                                                    I decided it would be safer not to touch difficult to understand security settings. And everything is in the log files anyway.





                                                                                    share


























                                                                                      0












                                                                                      0








                                                                                      0







                                                                                      I'm using swatchdog from the swatch package to monitor for any lines containing the phrase "fail" (case insensitive) in /var/log/auth.log. I set it up to run it as a simple systemd service.



                                                                                      apt install swatch


                                                                                      Create a configure file /etc/swatch/swatch-auth-log.conf with owner root, permission 644 --



                                                                                      watchfor /fail/i
                                                                                      pipe /usr/local/sbin/sendmail -t auth.log@xxx.com


                                                                                      The "/fail/i" is a regexp, with the "i" indicating it is case insensitive. (My sendmail is a script sending everything to a fixed address via mailgun, so the address doesn't really matter).



                                                                                      Create a systemd service file /etc/systemd/system/swatch-auth-log.service with owner root, permission 644 --



                                                                                      [Unit]
                                                                                      Description=monitor /var/log/auth.log, send fail notices by mail

                                                                                      [Service]
                                                                                      ExecStart=/usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log

                                                                                      [Install]
                                                                                      #WantedBy=multi-user.target
                                                                                      WantedBy=pre-network.target


                                                                                      Then enable, start, and view the status of the service --



                                                                                      sudo systemctl enable swatch-auth-log.service
                                                                                      sudo systemctl start swatch-auth-log.service
                                                                                      sudo systemctl status swatch-auth-log.service


                                                                                      An example of a successful status report --



                                                                                      ● swatch-auth-log.service - monitor /var/log/auth.log, send fail notices by mail
                                                                                      Loaded: loaded (/etc/systemd/system/swatch-auth-log.service; enabled; vendor preset: enabled)
                                                                                      Active: active (running) since Thu 2019-01-31 21:41:52 PST; 17min ago
                                                                                      Main PID: 27945 (swatchdog)
                                                                                      Tasks: 3 (limit: 4915)
                                                                                      CGroup: /system.slice/swatch-auth-log.service
                                                                                      ├─27945 /usr/bin/perl /usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log
                                                                                      ├─27947 /usr/bin/perl /.swatchdog_script.27945
                                                                                      └─27949 /usr/bin/tail -n 0 -F /var/log/auth.log

                                                                                      Jan 31 21:41:52 ub18 systemd[1]: Started monitor /var/log/auth.log, send fail notices by mail.
                                                                                      Jan 31 21:41:52 ub18 swatchdog[27945]: *** swatchdog version 3.2.4 (pid:27945) started at Thu Jan 31 21:41:52 PST 2019


                                                                                      The service will be automatically started at boot and monitored by systemd.





                                                                                      Discussion



                                                                                      Originally I used a pam solution similar to the above, but in /etc/pam.d/common-auth not sshd. That was to catch ssh, sudo, and logins. But then after an update all my passwords stopped working, even after changing the passwords in rescue mode. Eventually I changed the /etc/pam.d/common-auth back to the original and passwords worked again. Here is a description on the Stack Exchange UNIX & Linux board



                                                                                      I decided it would be safer not to touch difficult to understand security settings. And everything is in the log files anyway.





                                                                                      share













                                                                                      I'm using swatchdog from the swatch package to monitor for any lines containing the phrase "fail" (case insensitive) in /var/log/auth.log. I set it up to run it as a simple systemd service.



                                                                                      apt install swatch


                                                                                      Create a configure file /etc/swatch/swatch-auth-log.conf with owner root, permission 644 --



                                                                                      watchfor /fail/i
                                                                                      pipe /usr/local/sbin/sendmail -t auth.log@xxx.com


                                                                                      The "/fail/i" is a regexp, with the "i" indicating it is case insensitive. (My sendmail is a script sending everything to a fixed address via mailgun, so the address doesn't really matter).



                                                                                      Create a systemd service file /etc/systemd/system/swatch-auth-log.service with owner root, permission 644 --



                                                                                      [Unit]
                                                                                      Description=monitor /var/log/auth.log, send fail notices by mail

                                                                                      [Service]
                                                                                      ExecStart=/usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log

                                                                                      [Install]
                                                                                      #WantedBy=multi-user.target
                                                                                      WantedBy=pre-network.target


                                                                                      Then enable, start, and view the status of the service --



                                                                                      sudo systemctl enable swatch-auth-log.service
                                                                                      sudo systemctl start swatch-auth-log.service
                                                                                      sudo systemctl status swatch-auth-log.service


                                                                                      An example of a successful status report --



                                                                                      ● swatch-auth-log.service - monitor /var/log/auth.log, send fail notices by mail
                                                                                      Loaded: loaded (/etc/systemd/system/swatch-auth-log.service; enabled; vendor preset: enabled)
                                                                                      Active: active (running) since Thu 2019-01-31 21:41:52 PST; 17min ago
                                                                                      Main PID: 27945 (swatchdog)
                                                                                      Tasks: 3 (limit: 4915)
                                                                                      CGroup: /system.slice/swatch-auth-log.service
                                                                                      ├─27945 /usr/bin/perl /usr/bin/swatchdog -c /etc/swatch/swatch-auth-log.conf -t /var/log/auth.log
                                                                                      ├─27947 /usr/bin/perl /.swatchdog_script.27945
                                                                                      └─27949 /usr/bin/tail -n 0 -F /var/log/auth.log

                                                                                      Jan 31 21:41:52 ub18 systemd[1]: Started monitor /var/log/auth.log, send fail notices by mail.
                                                                                      Jan 31 21:41:52 ub18 swatchdog[27945]: *** swatchdog version 3.2.4 (pid:27945) started at Thu Jan 31 21:41:52 PST 2019


                                                                                      The service will be automatically started at boot and monitored by systemd.





                                                                                      Discussion



                                                                                      Originally I used a pam solution similar to the above, but in /etc/pam.d/common-auth not sshd. That was to catch ssh, sudo, and logins. But then after an update all my passwords stopped working, even after changing the passwords in rescue mode. Eventually I changed the /etc/pam.d/common-auth back to the original and passwords worked again. Here is a description on the Stack Exchange UNIX & Linux board



                                                                                      I decided it would be safer not to touch difficult to understand security settings. And everything is in the log files anyway.






                                                                                      share











                                                                                      share


                                                                                      share










                                                                                      answered 3 mins ago









                                                                                      Craig HicksCraig Hicks

                                                                                      22017




                                                                                      22017






























                                                                                          draft saved

                                                                                          draft discarded




















































                                                                                          Thanks for contributing an answer to Ask Ubuntu!


                                                                                          • Please be sure to answer the question. Provide details and share your research!

                                                                                          But avoid



                                                                                          • Asking for help, clarification, or responding to other answers.

                                                                                          • Making statements based on opinion; back them up with references or personal experience.


                                                                                          To learn more, see our tips on writing great answers.




                                                                                          draft saved


                                                                                          draft discarded














                                                                                          StackExchange.ready(
                                                                                          function () {
                                                                                          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f179889%2fhow-do-i-set-up-an-email-alert-when-a-ssh-login-is-successful%23new-answer', 'question_page');
                                                                                          }
                                                                                          );

                                                                                          Post as a guest















                                                                                          Required, but never shown





















































                                                                                          Required, but never shown














                                                                                          Required, but never shown












                                                                                          Required, but never shown







                                                                                          Required, but never shown

































                                                                                          Required, but never shown














                                                                                          Required, but never shown












                                                                                          Required, but never shown







                                                                                          Required, but never shown







                                                                                          Popular posts from this blog

                                                                                          日野市

                                                                                          GameSpot

                                                                                          Tu-95轟炸機