Re: [j-nsp] Logging for shell sessions

2024-07-12 Thread Pierre Emeriaud via juniper-nsp
Hi Le lun. 8 juil. 2024 à 22:48, Wojciech Janiszewski via juniper-nsp a écrit : > > Hi Phil, > > Seems that it's supported from 23.4 > > https://apps.juniper.net/feature-explorer/feature-info.html?fKey=11993=Logging%20support%20for%20routing%20engine%20shell%20and%20line%20card%20shell Just

Re: [j-nsp] Logging for shell sessions

2024-07-08 Thread Wojciech Janiszewski via juniper-nsp
Hi Phil, Seems that it's supported from 23.4 https://apps.juniper.net/feature-explorer/feature-info.html?fKey=11993=Logging%20support%20for%20routing%20engine%20shell%20and%20line%20card%20shell HTH, Wojciech sob., 6 lip 2024, 08:27 użytkownik Phil Mawson via juniper-nsp <

Re: [j-nsp] Logging for shell sessions

2024-07-08 Thread Tom Beecher via juniper-nsp
> > If you have Cisco HTTS or Juniper ACP or the like, where you get named > engineers, then you can develop a mutual trust and give those > engineers access to your network. > To each their own, but I'm with Jared on this. No way would a vendor have any direct access. The most permissive I'd

Re: [j-nsp] Logging for shell sessions

2024-07-08 Thread Saku Ytti via juniper-nsp
This depends greatly on how you've set up your support. If you have Cisco HTTS or Juniper ACP or the like, where you get named engineers, then you can develop a mutual trust and give those engineers access to your network. But if you're going through a normal process, perhaps additional care is

Re: [j-nsp] Logging for shell sessions

2024-07-07 Thread Jared Mauch via juniper-nsp
I don't trust my vendors to run commands on my devices, it's not personal. If there is a diagnostic that they want run, they need to be able to articulate the operational risk, or we may want to validate in a virtual or real physical router. - Jared On Sun, Jul 07, 2024 at

Re: [j-nsp] Logging for shell sessions

2024-07-07 Thread Saku Ytti via juniper-nsp
For things like TAC use, what I've previously done is made a vendor shell, where the shell program is screen instead of shell, and screen is set up to log. On Sat, 6 Jul 2024 at 16:50, Job Snijders wrote: > > Perhaps it’s just about wanting to keep track “what happened?!?” > > For such a

Re: [j-nsp] Logging for shell sessions

2024-07-06 Thread Job Snijders via juniper-nsp
Perhaps it’s just about wanting to keep track “what happened?!?” For such a scenario, consider conserver https://www.conserver.com/docs/console.man.html and script http://man.openbsd.org/script to store the terminal interactions Assume untrusted users probably can escape these such environments

Re: [j-nsp] Logging for shell sessions

2024-07-06 Thread Saku Ytti via juniper-nsp
I don't believe there is any supported way to do this, an unsupported way, probably, but also probably an educated operator could circumvent it anyhow. You probably shouldn't allow untrusted users to access the shell. On Sat, 6 Jul 2024 at 09:26, Phil Mawson via juniper-nsp wrote: > > Hi, > >

[j-nsp] Logging for shell sessions

2024-07-06 Thread Phil Mawson via juniper-nsp
Hi, Once a user enters the unix shell on a Juniper router/switch (Ie: start shell), it appears all standard logging of the commands typed is not captured by syslog and obviously not sent to AAA for authorisation. Is there a way to capture all commands users type and send to an external