Who have previously accessed a shared file?











up vote
-1
down vote

favorite












I just discovered a mistake in the permissions setting of our system. It's kind of serious because it allows normal users to access something they shouldn't see. Currently the mistake has been fixed, but I wonder how many users have ever accessed these files. By "accessing", I mean reading from it, for example, vi (without saving), less, cat, cp, scp, ...



One strategy I can think of is greping through users' ~/.history files, but they could have deleted the relevant commands.










share|improve this question
























  • May I ask why the downvote?
    – nalzok
    2 days ago















up vote
-1
down vote

favorite












I just discovered a mistake in the permissions setting of our system. It's kind of serious because it allows normal users to access something they shouldn't see. Currently the mistake has been fixed, but I wonder how many users have ever accessed these files. By "accessing", I mean reading from it, for example, vi (without saving), less, cat, cp, scp, ...



One strategy I can think of is greping through users' ~/.history files, but they could have deleted the relevant commands.










share|improve this question
























  • May I ask why the downvote?
    – nalzok
    2 days ago













up vote
-1
down vote

favorite









up vote
-1
down vote

favorite











I just discovered a mistake in the permissions setting of our system. It's kind of serious because it allows normal users to access something they shouldn't see. Currently the mistake has been fixed, but I wonder how many users have ever accessed these files. By "accessing", I mean reading from it, for example, vi (without saving), less, cat, cp, scp, ...



One strategy I can think of is greping through users' ~/.history files, but they could have deleted the relevant commands.










share|improve this question















I just discovered a mistake in the permissions setting of our system. It's kind of serious because it allows normal users to access something they shouldn't see. Currently the mistake has been fixed, but I wonder how many users have ever accessed these files. By "accessing", I mean reading from it, for example, vi (without saving), less, cat, cp, scp, ...



One strategy I can think of is greping through users' ~/.history files, but they could have deleted the relevant commands.







permissions security users command-history access-control






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 2 days ago









G-Man

12.4k93062




12.4k93062










asked Dec 5 at 19:49









nalzok

69115




69115












  • May I ask why the downvote?
    – nalzok
    2 days ago


















  • May I ask why the downvote?
    – nalzok
    2 days ago
















May I ask why the downvote?
– nalzok
2 days ago




May I ask why the downvote?
– nalzok
2 days ago










1 Answer
1






active

oldest

votes

















up vote
4
down vote



accepted










If you didn't have some sort of auditing mechanism
in place at the time the file's permissions were wrong,
it's pretty much impossible. 
While your idea of searching the users' history files is not a terrible one
(if you don't have concerns over the ethical and privacy issues),
a simple grep won't find things like


cd (directory_where_file_is)
ls -l
less *
or cases where the user said
vi (some_random_file),
and then did :e (the_sensitive_file)
from within vi.




share|improve this answer





















    Your Answer








    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "106"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    convertImagesToLinks: false,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f486226%2fwho-have-previously-accessed-a-shared-file%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes








    up vote
    4
    down vote



    accepted










    If you didn't have some sort of auditing mechanism
    in place at the time the file's permissions were wrong,
    it's pretty much impossible. 
    While your idea of searching the users' history files is not a terrible one
    (if you don't have concerns over the ethical and privacy issues),
    a simple grep won't find things like


    cd (directory_where_file_is)
    ls -l
    less *
    or cases where the user said
    vi (some_random_file),
    and then did :e (the_sensitive_file)
    from within vi.




    share|improve this answer

























      up vote
      4
      down vote



      accepted










      If you didn't have some sort of auditing mechanism
      in place at the time the file's permissions were wrong,
      it's pretty much impossible. 
      While your idea of searching the users' history files is not a terrible one
      (if you don't have concerns over the ethical and privacy issues),
      a simple grep won't find things like


      cd (directory_where_file_is)
      ls -l
      less *
      or cases where the user said
      vi (some_random_file),
      and then did :e (the_sensitive_file)
      from within vi.




      share|improve this answer























        up vote
        4
        down vote



        accepted







        up vote
        4
        down vote



        accepted






        If you didn't have some sort of auditing mechanism
        in place at the time the file's permissions were wrong,
        it's pretty much impossible. 
        While your idea of searching the users' history files is not a terrible one
        (if you don't have concerns over the ethical and privacy issues),
        a simple grep won't find things like


        cd (directory_where_file_is)
        ls -l
        less *
        or cases where the user said
        vi (some_random_file),
        and then did :e (the_sensitive_file)
        from within vi.




        share|improve this answer












        If you didn't have some sort of auditing mechanism
        in place at the time the file's permissions were wrong,
        it's pretty much impossible. 
        While your idea of searching the users' history files is not a terrible one
        (if you don't have concerns over the ethical and privacy issues),
        a simple grep won't find things like


        cd (directory_where_file_is)
        ls -l
        less *
        or cases where the user said
        vi (some_random_file),
        and then did :e (the_sensitive_file)
        from within vi.





        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Dec 5 at 22:00









        G-Man

        12.4k93062




        12.4k93062






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Unix & Linux Stack Exchange!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.





            Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


            Please pay close attention to the following guidance:


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f486226%2fwho-have-previously-accessed-a-shared-file%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Accessing regular linux commands in Huawei's Dopra Linux

            Can't connect RFCOMM socket: Host is down

            Kernel panic - not syncing: Fatal Exception in Interrupt