Bug 19966

Summary: sshd uses AUTH, not AUTHPRIV, for syslog entries
Product: [Retired] Red Hat Linux Reporter: Jeff Norden <jeff>
Component: opensshAssignee: Nalin Dahyabhai <nalin>
Status: CLOSED RAWHIDE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 7.0   
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2000-10-28 20:22:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jeff Norden 2000-10-28 20:22:45 UTC
sshd sends its syslog messages using the AUTH facility instead of
AUTHPRIV.  (According to the syslog(3) man page, the use of AUTH is
supposed to be deprecated.)  The result is that sshd messages go into
/var/log/messages and not /var/log/secure.  Since redhat leaves both these
log files readable only by root, the problem is not one of privacy. 
Rather, it is good practice to periodically scan /var/log/secure for
possible breaking attempts, etc,  (it is usually much shorter than
messages).  Not having any ssh entries there is a bad idea, imho.

A simple and immediate fix is to change the entry in /etc/syslog.conf  for
/var/log/secure from

 authpriv.*			/var/log/secure

to

 auth.*;authpriv.*                        /var/log/secure

sshd messages then go into both the messages and secure logs, but that's
ok.  I think that the above change to syslog.conf  is a good idea anyway,
even once sshd's logging gets fixed.

Comment 1 Nalin Dahyabhai 2000-10-30 20:51:39 UTC
This will be fixed in openssh-2.2.0p1-8 and later.  Thanks!