BookmarkSubscribeRSS Feed
reefermadness26
Calcite | Level 5

secure log is being populated every minute like this:
May 18 10:01:20 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:20 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:21 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:21 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:01:21 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:21 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:23 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:23 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:01:47 sasoa01p sshd[76487]: Accepted keyboard-interactive/pam for sas from 10.36.65.178 port 59682 ssh2
May 18 10:01:47 sasoa01p sshd[76487]: pam_tty_audit(sshd:session): changed status from 0 to 0
May 18 10:01:47 sasoa01p sshd[76487]: pam_unix(sshd:session): session opened for user sas by (uid=0)
May 18 10:01:53 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:53 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:54 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:54 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:01:54 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:54 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:56 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:56 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:02:26 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:02:26 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:02:27 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:02:27 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:02:27 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:02:27 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:02:29 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:02:29 sasoa01p su: pam_tty_audit(su:session): restored status to 1

how do I stop these or investigate the cause of this, 

I have checked crond for sas and root user and have not found much here, 

also /etc/cron.d/ has just hourly and monthly jobs that should not be populating secure log on such high frequency, 

please any ideas why this log is being populated so frequently and it is just wasting space with this consistent log.

 

Br, HS

3 REPLIES 3
gwootton
SAS Super FREQ
This seems to translate as the root user running the su command to become the user "sas", auditing being turned off (presumably because it's only turned on for root), then the session ends and auditing is turned on again.
May 18 10:01:20 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:20 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:21 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:21 sasoa01p su: pam_tty_audit(su:session): restored status to 1

Might be worth checking to see what processes are running as the root user, and/or the audit report (aureport --tty)
https://linux.die.net/man/8/pam_tty_audit
--
Greg Wootton | Principal Systems Technical Support Engineer
reefermadness26
Calcite | Level 5

@gwootton 
Hi, 
I have checked aureport -tty documentation link you sent.
So if auditing is only enabled for root user, would it help if I enable auditing for sas user as well?

then this flurry of logs might stop.
But I am unable to find pam.conf in my installation, and seems like contents of /etc/pam.d/ are alternatives to that, but I am not sure where I can enable that option so that sas auditing enable flag can be changed.
then these checks on session auditing might stop in secure log.

 

Br, 

HS

gwootton
SAS Super FREQ
Enabling audit for the sas user might prevent two of those lines from showing up (those for pam_tty_audit) because the status wouldn't be changing, but it would not change what is happening (su being run as root to switch to sas and perform some action or no action). The existing audit report might have some detail on what root is doing when switching to sas. Adding sas to the audit will probably increase other file usage as it will now start capturing sas tty activity as well as root.

The /etc/pam.d/su file is what is being used, and it probably has a session line that is calling some other pam.d file like system-auth where the pam_tty_audit line is. You could do something like grep tty /etc/pam.d/* to find it and make changes.
--
Greg Wootton | Principal Systems Technical Support Engineer

suga badge.PNGThe SAS Users Group for Administrators (SUGA) is open to all SAS administrators and architects who install, update, manage or maintain a SAS deployment. 

Join SUGA 

Get Started with SAS Information Catalog in SAS Viya

SAS technical trainer Erin Winters shows you how to explore assets, create new data discovery agents, schedule data discovery agents, and much more.

Find more tutorials on the SAS Users YouTube channel.

Discussion stats
  • 3 replies
  • 837 views
  • 0 likes
  • 2 in conversation