How do I set up an email alert when a ssh login is successful?












51















Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



I'm using Ubuntu 12.04 running xfce










share|improve this question





























    51















    Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



    I'm using Ubuntu 12.04 running xfce










    share|improve this question



























      51












      51








      51


      39






      Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



      I'm using Ubuntu 12.04 running xfce










      share|improve this question
















      Does anyone have a bash script that will email or notify someone in the case of a successful login to a ssh server? I want to be notified if anyone logs into my personal box.



      I'm using Ubuntu 12.04 running xfce







      bash ssh






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Sep 18 '12 at 1:05









      Jorge Castro

      36.3k105422617




      36.3k105422617










      asked Aug 24 '12 at 14:10









      Rick TRick T

      77221122




      77221122






















          9 Answers
          9






          active

          oldest

          votes


















          45















          Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




          Modify or create /etc/ssh/sshrc with the following contents:



          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

          logger -t ssh-wrapper $USER login from $ip
          echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




          This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



          Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



          Note: works with port forwarding, but with -N option not.






          share|improve this answer


























          • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

            – gertvdijk
            Jan 5 '13 at 15:58











          • does this also work when we are using gmail as the smtp server ?

            – user155073
            May 3 '13 at 6:38











          • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

            – Fritz
            Apr 16 '14 at 11:38








          • 2





            @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

            – Fritz
            Jan 26 '17 at 11:32











          • @Fritz Awesome, thanks for explaining.

            – mchid
            Jan 29 '17 at 17:02



















          63















          Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




          Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



          First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



          Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



          #!/bin/sh

          # Change these two lines:
          sender="sender-address@example.com"
          recepient="notify-address@example.org"

          if [ "$PAM_TYPE" != "close_session" ]; then
          host="`hostname`"
          subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
          # Message to send, e.g. the current environment variables.
          message="`env`"
          echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
          fi


          Once you have that, you can add the following line to /etc/pam.d/sshd:



          session optional pam_exec.so seteuid /path/to/login-notify.sh


          For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



          For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






          share|improve this answer





















          • 1





            It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

            – FelikZ
            Aug 29 '14 at 13:43






          • 1





            Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

            – Nicolas BADIA
            Mar 11 '15 at 8:11






          • 1





            You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

            – texasflood
            Oct 4 '15 at 13:55






          • 2





            Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

            – RedGiant
            Jan 18 '17 at 17:12






          • 2





            /etc/pam.d/login <- for tty logins

            – Fernando André
            Sep 29 '18 at 3:10



















          9














          We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



           check file ssh_logins with path /var/log/auth.log  
          # Ignore login's from whitelist ip addresses
          ignore match "100.100.100.1"
          # Else, alert
          if match "Accepted publickey" then alert


          Note: The mailserver configuration, email format etc. should be set in monitrc file



          Update:
          Wrote a more detailed blog post on this






          share|improve this answer

































            6














            Put the following in /etc/profile:



            if [ -n "$SSH_CLIENT" ]; then 
            TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
            TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
            echo $TEXT|mail -s "ssh login" you@your.domain
            fi


            How the script works



            /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



            Next, we then build the text of the message:





            • $(date) will be replaced by the output of the date command


            • ${USER} will be replaced by the user’s login name


            • $(hostname -f) will be replaced by the full hostname of the system being logged into


            The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



            Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






            share|improve this answer

































              2














              In this other question you probably have what you are looking for.
              Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






              share|improve this answer

































                1














                I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                #!/bin/sh

                # this script is triggered on SSH login and sends an email with details of the login
                # such as user, IP, hostname, and environment variables

                # script should be placed somewhere on the server, eg /etc/ssh
                # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                # Script settings
                MAILGUN_API_KEY=
                MAILGUN_DOMAIN=
                SENDER_NAME=
                SENDER_EMAIL_ADDRESS=
                RECIPIENT_EMAIL_ADDRESS=

                if [ "$PAM_TYPE" != "close_session" ]; then
                host=$(hostname)
                ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                # Message to send, e.g. the current environment variables.
                subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                message=$(env)
                curl -s --user '$MAILGUN_API_KEY'
                https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                -F to=$RECIPIENT_EMAIL_ADDRESS
                -F subject="$subject"
                -F text="${subject} ${message}"
                fi





                share|improve this answer































                  1














                  This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                  SUBNET="192.168.0"

                  IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                  CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                  if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                  msg="This message comes from same subnet! User $USER just logged in from $IP"
                  echo $msg|mail -s "$msg" root
                  else
                  msg="This message comes from different subnet! User $USER just logged in from $IP"
                  echo $msg|mail -s "$msg" root
                  fi

                  logger -t ssh-wrapper $USER login from $IP





                  share|improve this answer































                    1














                    Mailgun adaptation of @Fritz answer



                    After posting I noticed @pacharanero also writes about mailgun, but I don't
                    understand what they are doing with dig, so I'll post my solution as well.



                    If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                    One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                    This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                    #!/bin/bash
                    if [ "$PAM_TYPE" != "close_session" ]; then
                    APK='api:your-mailgun-api-key-goes-here'
                    FROM='Login Alert <mailgun@mg.mydomain.com>'
                    TO='me@mydomain.com'
                    SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                    DATE=$(date)
                    TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                    curl -s --user $APK
                    https://api.mailgun.net/v3/mg.mydomain.com/messages
                    -F from="$FROM"
                    -F to="$TO"
                    -F subject="$SUBJECT"
                    -F text="$TEXT"
                    fi


                    After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                    session optional pam_exec.so seteuid /root/login-alert.sh


                    I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                    share|improve this answer

































                      0














                      I've actually just modified @SirCharlo answer



                      ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                      logger -t ssh-wrapper $USER login from $ip
                      echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                      This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                      share|improve this answer























                        Your Answer








                        StackExchange.ready(function() {
                        var channelOptions = {
                        tags: "".split(" "),
                        id: "89"
                        };
                        initTagRenderer("".split(" "), "".split(" "), channelOptions);

                        StackExchange.using("externalEditor", function() {
                        // Have to fire editor after snippets, if snippets enabled
                        if (StackExchange.settings.snippets.snippetsEnabled) {
                        StackExchange.using("snippets", function() {
                        createEditor();
                        });
                        }
                        else {
                        createEditor();
                        }
                        });

                        function createEditor() {
                        StackExchange.prepareEditor({
                        heartbeatType: 'answer',
                        autoActivateHeartbeat: false,
                        convertImagesToLinks: true,
                        noModals: true,
                        showLowRepImageUploadWarning: true,
                        reputationToPostImages: 10,
                        bindNavPrevention: true,
                        postfix: "",
                        imageUploader: {
                        brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                        contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                        allowUrls: true
                        },
                        onDemand: true,
                        discardSelector: ".discard-answer"
                        ,immediatelyShowMarkdownHelp:true
                        });


                        }
                        });














                        draft saved

                        draft discarded


















                        StackExchange.ready(
                        function () {
                        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f179889%2fhow-do-i-set-up-an-email-alert-when-a-ssh-login-is-successful%23new-answer', 'question_page');
                        }
                        );

                        Post as a guest















                        Required, but never shown

























                        9 Answers
                        9






                        active

                        oldest

                        votes








                        9 Answers
                        9






                        active

                        oldest

                        votes









                        active

                        oldest

                        votes






                        active

                        oldest

                        votes









                        45















                        Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                        Modify or create /etc/ssh/sshrc with the following contents:



                        ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                        logger -t ssh-wrapper $USER login from $ip
                        echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                        This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                        Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                        Note: works with port forwarding, but with -N option not.






                        share|improve this answer


























                        • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                          – gertvdijk
                          Jan 5 '13 at 15:58











                        • does this also work when we are using gmail as the smtp server ?

                          – user155073
                          May 3 '13 at 6:38











                        • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                          – Fritz
                          Apr 16 '14 at 11:38








                        • 2





                          @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                          – Fritz
                          Jan 26 '17 at 11:32











                        • @Fritz Awesome, thanks for explaining.

                          – mchid
                          Jan 29 '17 at 17:02
















                        45















                        Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                        Modify or create /etc/ssh/sshrc with the following contents:



                        ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                        logger -t ssh-wrapper $USER login from $ip
                        echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                        This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                        Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                        Note: works with port forwarding, but with -N option not.






                        share|improve this answer


























                        • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                          – gertvdijk
                          Jan 5 '13 at 15:58











                        • does this also work when we are using gmail as the smtp server ?

                          – user155073
                          May 3 '13 at 6:38











                        • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                          – Fritz
                          Apr 16 '14 at 11:38








                        • 2





                          @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                          – Fritz
                          Jan 26 '17 at 11:32











                        • @Fritz Awesome, thanks for explaining.

                          – mchid
                          Jan 29 '17 at 17:02














                        45












                        45








                        45








                        Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                        Modify or create /etc/ssh/sshrc with the following contents:



                        ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                        logger -t ssh-wrapper $USER login from $ip
                        echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                        This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                        Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                        Note: works with port forwarding, but with -N option not.






                        share|improve this answer
















                        Warning: according to the comments, this does not work if the user creates a file called ~/.ssh/rc.*




                        Modify or create /etc/ssh/sshrc with the following contents:



                        ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                        logger -t ssh-wrapper $USER login from $ip
                        echo "User $USER just logged in from $ip" | sendemail -q -u "SSH Login" -f "Originator <from@address.com>" -t "Your Name <your.email@domain.com>" -s smtp.server.com &




                        This will effectively notify you by email anytime someone logs in through SSH, and the login will be logged in the syslog.



                        Note: You'll need the sendemailpackage (sudo apt-get install sendemail) for the email notification to work.



                        Note: works with port forwarding, but with -N option not.







                        share|improve this answer














                        share|improve this answer



                        share|improve this answer








                        edited May 9 '18 at 16:16









                        Philippe Gachoud

                        3,2372538




                        3,2372538










                        answered Aug 24 '12 at 15:16









                        SirCharloSirCharlo

                        29.7k75976




                        29.7k75976













                        • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                          – gertvdijk
                          Jan 5 '13 at 15:58











                        • does this also work when we are using gmail as the smtp server ?

                          – user155073
                          May 3 '13 at 6:38











                        • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                          – Fritz
                          Apr 16 '14 at 11:38








                        • 2





                          @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                          – Fritz
                          Jan 26 '17 at 11:32











                        • @Fritz Awesome, thanks for explaining.

                          – mchid
                          Jan 29 '17 at 17:02



















                        • Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                          – gertvdijk
                          Jan 5 '13 at 15:58











                        • does this also work when we are using gmail as the smtp server ?

                          – user155073
                          May 3 '13 at 6:38











                        • This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                          – Fritz
                          Apr 16 '14 at 11:38








                        • 2





                          @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                          – Fritz
                          Jan 26 '17 at 11:32











                        • @Fritz Awesome, thanks for explaining.

                          – mchid
                          Jan 29 '17 at 17:02

















                        Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                        – gertvdijk
                        Jan 5 '13 at 15:58





                        Does this also work if the client doesn't request a TTY? E.g. ssh -N with only port forwarding.

                        – gertvdijk
                        Jan 5 '13 at 15:58













                        does this also work when we are using gmail as the smtp server ?

                        – user155073
                        May 3 '13 at 6:38





                        does this also work when we are using gmail as the smtp server ?

                        – user155073
                        May 3 '13 at 6:38













                        This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                        – Fritz
                        Apr 16 '14 at 11:38







                        This needs a Warning: This does not work if the user creates a file called ~/.ssh/rc so it's quite useless as a security measure. @adosaiguas' answer concerning pam_exec is the correct one.

                        – Fritz
                        Apr 16 '14 at 11:38






                        2




                        2





                        @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                        – Fritz
                        Jan 26 '17 at 11:32





                        @mchid: If you consider the question "I want to be notified if anyone logs into my personal box.", then this might be acceptable. If you have only one user account. Otherwise you have to do it for all accounts, including every newly added account. And ideally you have make sure that users can not modify or delete their ~/.ssh/rc file. Using a system-wide method based on pam is just more reliable and safer, because only root can mess with it. So the answer is: The sshrd methods works okay for single-user systems, but the pam method works reliably for all systems.

                        – Fritz
                        Jan 26 '17 at 11:32













                        @Fritz Awesome, thanks for explaining.

                        – mchid
                        Jan 29 '17 at 17:02





                        @Fritz Awesome, thanks for explaining.

                        – mchid
                        Jan 29 '17 at 17:02













                        63















                        Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                        Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                        First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                        Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                        #!/bin/sh

                        # Change these two lines:
                        sender="sender-address@example.com"
                        recepient="notify-address@example.org"

                        if [ "$PAM_TYPE" != "close_session" ]; then
                        host="`hostname`"
                        subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                        # Message to send, e.g. the current environment variables.
                        message="`env`"
                        echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                        fi


                        Once you have that, you can add the following line to /etc/pam.d/sshd:



                        session optional pam_exec.so seteuid /path/to/login-notify.sh


                        For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                        For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






                        share|improve this answer





















                        • 1





                          It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                          – FelikZ
                          Aug 29 '14 at 13:43






                        • 1





                          Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                          – Nicolas BADIA
                          Mar 11 '15 at 8:11






                        • 1





                          You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                          – texasflood
                          Oct 4 '15 at 13:55






                        • 2





                          Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                          – RedGiant
                          Jan 18 '17 at 17:12






                        • 2





                          /etc/pam.d/login <- for tty logins

                          – Fernando André
                          Sep 29 '18 at 3:10
















                        63















                        Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                        Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                        First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                        Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                        #!/bin/sh

                        # Change these two lines:
                        sender="sender-address@example.com"
                        recepient="notify-address@example.org"

                        if [ "$PAM_TYPE" != "close_session" ]; then
                        host="`hostname`"
                        subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                        # Message to send, e.g. the current environment variables.
                        message="`env`"
                        echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                        fi


                        Once you have that, you can add the following line to /etc/pam.d/sshd:



                        session optional pam_exec.so seteuid /path/to/login-notify.sh


                        For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                        For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






                        share|improve this answer





















                        • 1





                          It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                          – FelikZ
                          Aug 29 '14 at 13:43






                        • 1





                          Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                          – Nicolas BADIA
                          Mar 11 '15 at 8:11






                        • 1





                          You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                          – texasflood
                          Oct 4 '15 at 13:55






                        • 2





                          Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                          – RedGiant
                          Jan 18 '17 at 17:12






                        • 2





                          /etc/pam.d/login <- for tty logins

                          – Fernando André
                          Sep 29 '18 at 3:10














                        63












                        63








                        63








                        Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                        Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                        First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                        Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                        #!/bin/sh

                        # Change these two lines:
                        sender="sender-address@example.com"
                        recepient="notify-address@example.org"

                        if [ "$PAM_TYPE" != "close_session" ]; then
                        host="`hostname`"
                        subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                        # Message to send, e.g. the current environment variables.
                        message="`env`"
                        echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                        fi


                        Once you have that, you can add the following line to /etc/pam.d/sshd:



                        session optional pam_exec.so seteuid /path/to/login-notify.sh


                        For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                        For those of you in need of an explanation of what PAM is and how it works, here is a very good one.






                        share|improve this answer
















                        Warning: As always when you change the login configuration, leave a backup ssh session open in the background and test the login from a new terminal.




                        Since the sshrc method doesn't work if the user has their own ~/.ssh/rc file, I'll explain how to do this with pam_exec as @adosaiguas suggested. The good thing is that this can also be easily adapted to login types other than ssh (such as local logins or even all logins) by hooking into a different file in /etc/pam.d/.



                        First you need to be able to send mail from the command line. There are other questions about this. On a mail server it's probably easiest to install mailx (which is probably already installed anyway).



                        Then you need an executable script file login-notify.sh (I put it in /etc/ssh/ for example) with the following content. You can change the variables to change the subject and content of the e-mail notification. Don't forget to execute chmod +x login-notify.sh to make it executable.



                        #!/bin/sh

                        # Change these two lines:
                        sender="sender-address@example.com"
                        recepient="notify-address@example.org"

                        if [ "$PAM_TYPE" != "close_session" ]; then
                        host="`hostname`"
                        subject="SSH Login: $PAM_USER from $PAM_RHOST on $host"
                        # Message to send, e.g. the current environment variables.
                        message="`env`"
                        echo "$message" | mailx -r "$sender" -s "$subject" "$recepient"
                        fi


                        Once you have that, you can add the following line to /etc/pam.d/sshd:



                        session optional pam_exec.so seteuid /path/to/login-notify.sh


                        For testing purposes, the module is included as optional, so that you can still log in if the execution fails. After you made sure that it works, you can change optional to required. Then login won't be possible unless the execution of your hook script is successful (if that is what you want).



                        For those of you in need of an explanation of what PAM is and how it works, here is a very good one.







                        share|improve this answer














                        share|improve this answer



                        share|improve this answer








                        edited Jan 16 at 9:59

























                        answered Apr 16 '14 at 14:39









                        FritzFritz

                        73459




                        73459








                        • 1





                          It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                          – FelikZ
                          Aug 29 '14 at 13:43






                        • 1





                          Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                          – Nicolas BADIA
                          Mar 11 '15 at 8:11






                        • 1





                          You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                          – texasflood
                          Oct 4 '15 at 13:55






                        • 2





                          Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                          – RedGiant
                          Jan 18 '17 at 17:12






                        • 2





                          /etc/pam.d/login <- for tty logins

                          – Fernando André
                          Sep 29 '18 at 3:10














                        • 1





                          It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                          – FelikZ
                          Aug 29 '14 at 13:43






                        • 1





                          Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                          – Nicolas BADIA
                          Mar 11 '15 at 8:11






                        • 1





                          You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                          – texasflood
                          Oct 4 '15 at 13:55






                        • 2





                          Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                          – RedGiant
                          Jan 18 '17 at 17:12






                        • 2





                          /etc/pam.d/login <- for tty logins

                          – Fernando André
                          Sep 29 '18 at 3:10








                        1




                        1





                        It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                        – FelikZ
                        Aug 29 '14 at 13:43





                        It says: /etc/ssh/login-notify.sh failed: exit code 13 right after login :(

                        – FelikZ
                        Aug 29 '14 at 13:43




                        1




                        1





                        Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                        – Nicolas BADIA
                        Mar 11 '15 at 8:11





                        Thanks, it works great. Just make sure you have UsePAM set to yes in your sshd_config.

                        – Nicolas BADIA
                        Mar 11 '15 at 8:11




                        1




                        1





                        You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                        – texasflood
                        Oct 4 '15 at 13:55





                        You should probably remove the fork (&) if you have required in the sshd file because mailx can fail but the user may still have logged on. Also, the script is run as root, so make sure mailx is also configured for root

                        – texasflood
                        Oct 4 '15 at 13:55




                        2




                        2





                        Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                        – RedGiant
                        Jan 18 '17 at 17:12





                        Just a note to myself or other people who are new to Selinux. I got a permission error when pam_exec ran the script. Later I found out that it was incorrectly labelled for Selinux. I cloned the script to /bin/ which will automatically be labelled as unconfined_u:object_r:bin_t:s0. Then I chmod +x /bin/login-notify.sh and it works.

                        – RedGiant
                        Jan 18 '17 at 17:12




                        2




                        2





                        /etc/pam.d/login <- for tty logins

                        – Fernando André
                        Sep 29 '18 at 3:10





                        /etc/pam.d/login <- for tty logins

                        – Fernando André
                        Sep 29 '18 at 3:10











                        9














                        We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                         check file ssh_logins with path /var/log/auth.log  
                        # Ignore login's from whitelist ip addresses
                        ignore match "100.100.100.1"
                        # Else, alert
                        if match "Accepted publickey" then alert


                        Note: The mailserver configuration, email format etc. should be set in monitrc file



                        Update:
                        Wrote a more detailed blog post on this






                        share|improve this answer






























                          9














                          We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                           check file ssh_logins with path /var/log/auth.log  
                          # Ignore login's from whitelist ip addresses
                          ignore match "100.100.100.1"
                          # Else, alert
                          if match "Accepted publickey" then alert


                          Note: The mailserver configuration, email format etc. should be set in monitrc file



                          Update:
                          Wrote a more detailed blog post on this






                          share|improve this answer




























                            9












                            9








                            9







                            We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                             check file ssh_logins with path /var/log/auth.log  
                            # Ignore login's from whitelist ip addresses
                            ignore match "100.100.100.1"
                            # Else, alert
                            if match "Accepted publickey" then alert


                            Note: The mailserver configuration, email format etc. should be set in monitrc file



                            Update:
                            Wrote a more detailed blog post on this






                            share|improve this answer















                            We have been using monit to monitor processes on our linux boxes. monit can also alert by emails on successful logins over ssh. Our monit config looks like this



                             check file ssh_logins with path /var/log/auth.log  
                            # Ignore login's from whitelist ip addresses
                            ignore match "100.100.100.1"
                            # Else, alert
                            if match "Accepted publickey" then alert


                            Note: The mailserver configuration, email format etc. should be set in monitrc file



                            Update:
                            Wrote a more detailed blog post on this







                            share|improve this answer














                            share|improve this answer



                            share|improve this answer








                            edited Jun 15 '14 at 6:36

























                            answered Jun 2 '14 at 11:52









                            LitmusLitmus

                            23134




                            23134























                                6














                                Put the following in /etc/profile:



                                if [ -n "$SSH_CLIENT" ]; then 
                                TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                echo $TEXT|mail -s "ssh login" you@your.domain
                                fi


                                How the script works



                                /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                Next, we then build the text of the message:





                                • $(date) will be replaced by the output of the date command


                                • ${USER} will be replaced by the user’s login name


                                • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






                                share|improve this answer






























                                  6














                                  Put the following in /etc/profile:



                                  if [ -n "$SSH_CLIENT" ]; then 
                                  TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                  TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                  echo $TEXT|mail -s "ssh login" you@your.domain
                                  fi


                                  How the script works



                                  /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                  Next, we then build the text of the message:





                                  • $(date) will be replaced by the output of the date command


                                  • ${USER} will be replaced by the user’s login name


                                  • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                  The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                  Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






                                  share|improve this answer




























                                    6












                                    6








                                    6







                                    Put the following in /etc/profile:



                                    if [ -n "$SSH_CLIENT" ]; then 
                                    TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                    TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                    echo $TEXT|mail -s "ssh login" you@your.domain
                                    fi


                                    How the script works



                                    /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                    Next, we then build the text of the message:





                                    • $(date) will be replaced by the output of the date command


                                    • ${USER} will be replaced by the user’s login name


                                    • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                    The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                    Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.






                                    share|improve this answer















                                    Put the following in /etc/profile:



                                    if [ -n "$SSH_CLIENT" ]; then 
                                    TEXT="$(date): ssh login to ${USER}@$(hostname -f)"
                                    TEXT="$TEXT from $(echo $SSH_CLIENT|awk '{print $1}')"
                                    echo $TEXT|mail -s "ssh login" you@your.domain
                                    fi


                                    How the script works



                                    /etc/profile is executed at every login (for bash shell users). The if statement will only return true if the user has logged in via ssh, which in turn will cause the indented code block to be run.



                                    Next, we then build the text of the message:





                                    • $(date) will be replaced by the output of the date command


                                    • ${USER} will be replaced by the user’s login name


                                    • $(hostname -f) will be replaced by the full hostname of the system being logged into


                                    The second TEXT line adds to the first, giving the IP address of the system this user is logging in from. Finally, the generated text is sent in an email to your address.



                                    Summary Linux will, by default, record every system login, whether by ssh or not, in the system log files, but sometimes – particularly for a system that is seldom accessed via ssh – a quick and dirty notification can be useful.







                                    share|improve this answer














                                    share|improve this answer



                                    share|improve this answer








                                    edited Nov 26 '15 at 10:55









                                    muru

                                    1




                                    1










                                    answered Nov 26 '15 at 10:48









                                    user476225user476225

                                    6111




                                    6111























                                        2














                                        In this other question you probably have what you are looking for.
                                        Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






                                        share|improve this answer






























                                          2














                                          In this other question you probably have what you are looking for.
                                          Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






                                          share|improve this answer




























                                            2












                                            2








                                            2







                                            In this other question you probably have what you are looking for.
                                            Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd






                                            share|improve this answer















                                            In this other question you probably have what you are looking for.
                                            Basically you can add a call to the mail command in the script that is run when a user logs in via ssh: /etc/pam.d/sshd







                                            share|improve this answer














                                            share|improve this answer



                                            share|improve this answer








                                            edited Apr 13 '17 at 12:37









                                            Community

                                            1




                                            1










                                            answered Aug 24 '12 at 15:01









                                            adosaiguasadosaiguas

                                            324214




                                            324214























                                                1














                                                I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                #!/bin/sh

                                                # this script is triggered on SSH login and sends an email with details of the login
                                                # such as user, IP, hostname, and environment variables

                                                # script should be placed somewhere on the server, eg /etc/ssh
                                                # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                # Script settings
                                                MAILGUN_API_KEY=
                                                MAILGUN_DOMAIN=
                                                SENDER_NAME=
                                                SENDER_EMAIL_ADDRESS=
                                                RECIPIENT_EMAIL_ADDRESS=

                                                if [ "$PAM_TYPE" != "close_session" ]; then
                                                host=$(hostname)
                                                ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                # Message to send, e.g. the current environment variables.
                                                subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                message=$(env)
                                                curl -s --user '$MAILGUN_API_KEY'
                                                https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                -F to=$RECIPIENT_EMAIL_ADDRESS
                                                -F subject="$subject"
                                                -F text="${subject} ${message}"
                                                fi





                                                share|improve this answer




























                                                  1














                                                  I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                  Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                  #!/bin/sh

                                                  # this script is triggered on SSH login and sends an email with details of the login
                                                  # such as user, IP, hostname, and environment variables

                                                  # script should be placed somewhere on the server, eg /etc/ssh
                                                  # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                  # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                  # Script settings
                                                  MAILGUN_API_KEY=
                                                  MAILGUN_DOMAIN=
                                                  SENDER_NAME=
                                                  SENDER_EMAIL_ADDRESS=
                                                  RECIPIENT_EMAIL_ADDRESS=

                                                  if [ "$PAM_TYPE" != "close_session" ]; then
                                                  host=$(hostname)
                                                  ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                  # Message to send, e.g. the current environment variables.
                                                  subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                  message=$(env)
                                                  curl -s --user '$MAILGUN_API_KEY'
                                                  https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                  -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                  -F to=$RECIPIENT_EMAIL_ADDRESS
                                                  -F subject="$subject"
                                                  -F text="${subject} ${message}"
                                                  fi





                                                  share|improve this answer


























                                                    1












                                                    1








                                                    1







                                                    I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                    Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                    #!/bin/sh

                                                    # this script is triggered on SSH login and sends an email with details of the login
                                                    # such as user, IP, hostname, and environment variables

                                                    # script should be placed somewhere on the server, eg /etc/ssh
                                                    # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                    # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                    # Script settings
                                                    MAILGUN_API_KEY=
                                                    MAILGUN_DOMAIN=
                                                    SENDER_NAME=
                                                    SENDER_EMAIL_ADDRESS=
                                                    RECIPIENT_EMAIL_ADDRESS=

                                                    if [ "$PAM_TYPE" != "close_session" ]; then
                                                    host=$(hostname)
                                                    ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                    # Message to send, e.g. the current environment variables.
                                                    subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                    message=$(env)
                                                    curl -s --user '$MAILGUN_API_KEY'
                                                    https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                    -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                    -F to=$RECIPIENT_EMAIL_ADDRESS
                                                    -F subject="$subject"
                                                    -F text="${subject} ${message}"
                                                    fi





                                                    share|improve this answer













                                                    I've taken some of the excellent answers from this thread and made something that is more-or-less copy-and-pasteable. It uses Mailgun to send the emails so you are spared any issues with setting up STMP. You just need a Mailgun API key and a sending domain.



                                                    Upon SSH login, the script will send details of the login (user, hostname, IP address, and all current environment variables) to an email address. It's easy to add other parameters you'd want to send by customising the message variable.



                                                    #!/bin/sh

                                                    # this script is triggered on SSH login and sends an email with details of the login
                                                    # such as user, IP, hostname, and environment variables

                                                    # script should be placed somewhere on the server, eg /etc/ssh
                                                    # to trigger on SSH login, put this line in /etc/pam.d/sshd:
                                                    # session optional pam_exec.so seteuid /etc/ssh/snippet-for-sending-emails-on-SSH-login-using-PAM.sh

                                                    # Script settings
                                                    MAILGUN_API_KEY=
                                                    MAILGUN_DOMAIN=
                                                    SENDER_NAME=
                                                    SENDER_EMAIL_ADDRESS=
                                                    RECIPIENT_EMAIL_ADDRESS=

                                                    if [ "$PAM_TYPE" != "close_session" ]; then
                                                    host=$(hostname)
                                                    ip=$(dig +short myip.opendns.com @resolver1.opendns.com) # gets public IP
                                                    # Message to send, e.g. the current environment variables.
                                                    subject="SSH login - user:$USER pam-host:$PAM_RHOST host:$host ip:$ip"
                                                    message=$(env)
                                                    curl -s --user '$MAILGUN_API_KEY'
                                                    https://api.mailgun.net/v3/$MAILGUN_DOMAIN/messages
                                                    -F from='$SENDER_NAME <$SENDER_EMAIL_ADDRESS>'
                                                    -F to=$RECIPIENT_EMAIL_ADDRESS
                                                    -F subject="$subject"
                                                    -F text="${subject} ${message}"
                                                    fi






                                                    share|improve this answer












                                                    share|improve this answer



                                                    share|improve this answer










                                                    answered Nov 16 '17 at 18:12









                                                    pacharaneropacharanero

                                                    111




                                                    111























                                                        1














                                                        This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                        SUBNET="192.168.0"

                                                        IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                        CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                        if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                        msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                        echo $msg|mail -s "$msg" root
                                                        else
                                                        msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                        echo $msg|mail -s "$msg" root
                                                        fi

                                                        logger -t ssh-wrapper $USER login from $IP





                                                        share|improve this answer




























                                                          1














                                                          This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                          SUBNET="192.168.0"

                                                          IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                          CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                          if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                          msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                          echo $msg|mail -s "$msg" root
                                                          else
                                                          msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                          echo $msg|mail -s "$msg" root
                                                          fi

                                                          logger -t ssh-wrapper $USER login from $IP





                                                          share|improve this answer


























                                                            1












                                                            1








                                                            1







                                                            This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                            SUBNET="192.168.0"

                                                            IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                            CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                            if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                            msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                            echo $msg|mail -s "$msg" root
                                                            else
                                                            msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                            echo $msg|mail -s "$msg" root
                                                            fi

                                                            logger -t ssh-wrapper $USER login from $IP





                                                            share|improve this answer













                                                            This script in /etc/ssh/sshrc sends an email and adds a log to system logger. A difference is made (so you can disable it if you want) between your personal subnet and the world wide web (requires sudo apt-get install mailutils).



                                                            SUBNET="192.168.0"

                                                            IP=`echo $SSH_CONNECTION | cut -d " " -f 1`
                                                            CURRENT_SUBNET="$(echo $IP|cut -d'.' -f1-3)"
                                                            if [ "$CURRENT_SUBNET" = "$SUBNET" ]; then
                                                            msg="This message comes from same subnet! User $USER just logged in from $IP"
                                                            echo $msg|mail -s "$msg" root
                                                            else
                                                            msg="This message comes from different subnet! User $USER just logged in from $IP"
                                                            echo $msg|mail -s "$msg" root
                                                            fi

                                                            logger -t ssh-wrapper $USER login from $IP






                                                            share|improve this answer












                                                            share|improve this answer



                                                            share|improve this answer










                                                            answered May 11 '18 at 13:11









                                                            Philippe GachoudPhilippe Gachoud

                                                            3,2372538




                                                            3,2372538























                                                                1














                                                                Mailgun adaptation of @Fritz answer



                                                                After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                understand what they are doing with dig, so I'll post my solution as well.



                                                                If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                #!/bin/bash
                                                                if [ "$PAM_TYPE" != "close_session" ]; then
                                                                APK='api:your-mailgun-api-key-goes-here'
                                                                FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                TO='me@mydomain.com'
                                                                SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                DATE=$(date)
                                                                TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                curl -s --user $APK
                                                                https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                -F from="$FROM"
                                                                -F to="$TO"
                                                                -F subject="$SUBJECT"
                                                                -F text="$TEXT"
                                                                fi


                                                                After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                session optional pam_exec.so seteuid /root/login-alert.sh


                                                                I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                                                                share|improve this answer






























                                                                  1














                                                                  Mailgun adaptation of @Fritz answer



                                                                  After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                  understand what they are doing with dig, so I'll post my solution as well.



                                                                  If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                  One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                  This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                  #!/bin/bash
                                                                  if [ "$PAM_TYPE" != "close_session" ]; then
                                                                  APK='api:your-mailgun-api-key-goes-here'
                                                                  FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                  TO='me@mydomain.com'
                                                                  SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                  DATE=$(date)
                                                                  TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                  curl -s --user $APK
                                                                  https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                  -F from="$FROM"
                                                                  -F to="$TO"
                                                                  -F subject="$SUBJECT"
                                                                  -F text="$TEXT"
                                                                  fi


                                                                  After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                  session optional pam_exec.so seteuid /root/login-alert.sh


                                                                  I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                                                                  share|improve this answer




























                                                                    1












                                                                    1








                                                                    1







                                                                    Mailgun adaptation of @Fritz answer



                                                                    After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                    understand what they are doing with dig, so I'll post my solution as well.



                                                                    If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                    One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                    This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                    #!/bin/bash
                                                                    if [ "$PAM_TYPE" != "close_session" ]; then
                                                                    APK='api:your-mailgun-api-key-goes-here'
                                                                    FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                    TO='me@mydomain.com'
                                                                    SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                    DATE=$(date)
                                                                    TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                    curl -s --user $APK
                                                                    https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                    -F from="$FROM"
                                                                    -F to="$TO"
                                                                    -F subject="$SUBJECT"
                                                                    -F text="$TEXT"
                                                                    fi


                                                                    After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                    session optional pam_exec.so seteuid /root/login-alert.sh


                                                                    I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.






                                                                    share|improve this answer















                                                                    Mailgun adaptation of @Fritz answer



                                                                    After posting I noticed @pacharanero also writes about mailgun, but I don't
                                                                    understand what they are doing with dig, so I'll post my solution as well.



                                                                    If you are on a VM that doesn't have SMTP, you might need to use something like mailgun, sendgrid, or the like. This worked for me on Google Cloud.



                                                                    One risk of this approach is that an attacker may get your outgoing email sending credentials if they can sudo su and find the script or you leave the script for sending email readable. mailgun has an ip whitelist you should set up, but that's imperfect for this particular use case, obviously.



                                                                    This script should work with mailgun after you change mydomain.com to your actual domain. You could save the script in /root/login-alert.sh or some more obscure location.



                                                                    #!/bin/bash
                                                                    if [ "$PAM_TYPE" != "close_session" ]; then
                                                                    APK='api:your-mailgun-api-key-goes-here'
                                                                    FROM='Login Alert <mailgun@mg.mydomain.com>'
                                                                    TO='me@mydomain.com'
                                                                    SUBJECT="Login: $PAM_USER @ mydomain.com from $PAM_RHOST"
                                                                    DATE=$(date)
                                                                    TEXT="At $DATE a login occurred for $PAM_USER on mydomain.com from $PAM_RHOST"
                                                                    curl -s --user $APK
                                                                    https://api.mailgun.net/v3/mg.mydomain.com/messages
                                                                    -F from="$FROM"
                                                                    -F to="$TO"
                                                                    -F subject="$SUBJECT"
                                                                    -F text="$TEXT"
                                                                    fi


                                                                    After that you can follow @Fritz answer to change /etc/pam.d/sshd to include:



                                                                    session optional pam_exec.so seteuid /root/login-alert.sh


                                                                    I note this works with no read permissions for arriving users (chmod 700 /root/login-alert.sh) so arriving users do not need to have read access to the script.







                                                                    share|improve this answer














                                                                    share|improve this answer



                                                                    share|improve this answer








                                                                    edited Jul 4 '18 at 6:46

























                                                                    answered Jul 4 '18 at 6:29









                                                                    PaulPaul

                                                                    13519




                                                                    13519























                                                                        0














                                                                        I've actually just modified @SirCharlo answer



                                                                        ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                        logger -t ssh-wrapper $USER login from $ip
                                                                        echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                        This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                                                                        share|improve this answer




























                                                                          0














                                                                          I've actually just modified @SirCharlo answer



                                                                          ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                          logger -t ssh-wrapper $USER login from $ip
                                                                          echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                          This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                                                                          share|improve this answer


























                                                                            0












                                                                            0








                                                                            0







                                                                            I've actually just modified @SirCharlo answer



                                                                            ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                            logger -t ssh-wrapper $USER login from $ip
                                                                            echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                            This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts






                                                                            share|improve this answer













                                                                            I've actually just modified @SirCharlo answer



                                                                            ip=`echo $SSH_CONNECTION | cut -d " " -f 1`

                                                                            logger -t ssh-wrapper $USER login from $ip
                                                                            echo "User $USER just logged in from $ip" | mail -s "SSH Login" "who to <who-to@youremail.com>" &


                                                                            This works on 14.04, 16.04 and Centos 6.5.x servers I've setup, I'm pretty sure you need to ensure mta is configured, but once that is done, this works a charm. Next step twilio alerts







                                                                            share|improve this answer












                                                                            share|improve this answer



                                                                            share|improve this answer










                                                                            answered Dec 13 '16 at 13:24









                                                                            MrMeseesMrMesees

                                                                            1188




                                                                            1188






























                                                                                draft saved

                                                                                draft discarded




















































                                                                                Thanks for contributing an answer to Ask Ubuntu!


                                                                                • Please be sure to answer the question. Provide details and share your research!

                                                                                But avoid



                                                                                • Asking for help, clarification, or responding to other answers.

                                                                                • Making statements based on opinion; back them up with references or personal experience.


                                                                                To learn more, see our tips on writing great answers.




                                                                                draft saved


                                                                                draft discarded














                                                                                StackExchange.ready(
                                                                                function () {
                                                                                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f179889%2fhow-do-i-set-up-an-email-alert-when-a-ssh-login-is-successful%23new-answer', 'question_page');
                                                                                }
                                                                                );

                                                                                Post as a guest















                                                                                Required, but never shown





















































                                                                                Required, but never shown














                                                                                Required, but never shown












                                                                                Required, but never shown







                                                                                Required, but never shown

































                                                                                Required, but never shown














                                                                                Required, but never shown












                                                                                Required, but never shown







                                                                                Required, but never shown







                                                                                Popular posts from this blog

                                                                                How to reconfigure Docker Trusted Registry 2.x.x to use CEPH FS mount instead of NFS and other traditional...

                                                                                is 'sed' thread safe

                                                                                How to make a Squid Proxy server?