record ssh sessions

How to record ssh sessions on a Linux Server, Router, Switch using Ezeelogin ssh Jump Server?

The "SSH Log" recording feature lets you record ssh sessions of system administrator, system engineers , developers ,network administrators  accessing remote  Linux servers /  cloud instances / switches / routers and other network devices via ssh.  In other words, you can log all things that happened via an ssh session on a linux device, router device or a switch device and log them all into a log file which can later be reviewed, revisited or can be pipelined to log processing engines.

The  SSHD daemon has to be running on the remote devices.   The  SSH daemon comes with  the OpenSSH packages  on most Linux distributions. ( Centos 6, Centos7, Centos 8, Centos 5, Centos 4, Ubuntu 14, Ubuntu 16, Ubuntu 18, SUSE, RHEL , Fedora , Freebsd and more. ).


record ssh session linux os


There is  NO need to install a agent on the  Remote Linux servers ( Production servers ) to record ssh session of users accessing the servers via ssh.


Disable tcp forwarding in SSHD server configuration file on the jump server. 

The ssh session recorded  lets you audit the ssh users accessing  the Linux servers remotely via the ssh protocol. You can also monitor a ssh user in real time.  You can also search the entire logs recorded for a string or pattern which  is very useful to perform security audits  on various security incidents, lapses, security forensics etc. This is useful for meeting security compliances like pci dss, hippa, nist , nerc, ffiec etc.

1. To enable ssh  recording of the jump server users on the Ezeelogin ssh jump server gui, do the following.
Navigate to Settings->General->Security->SSH Session Logging


There are 3 settings to record the ssh sessions

  1. None - This would disable ssh session recording.
  2. Input - This would record only the STDIN , which would be the keyboard inputs of the ssh jump server user. 
  3. Output - This would record only the STDOUT which would be the outputs on the screen of the jump server user.
  4. Both - This would record both the STDIN and STDOUT of the ssh session. 
 The input mode would record the invisible characters typed into the STDIN, hence it would record the password changes of a user that is done using the password command. This would be in violation of security compliances like PCI DSS , HIPPA , MAS , NIST, GDPR, FFIEC, etc. We would recommend choosing output only to avoid recording the password in order to meet security compliance.

 2.   How to view the user ssh session recorded on the Ezeelogin ssh jump server gui?

A)  Navigate to users->SSH log and select the jump server user and the server  to view the recorded session for that server.

B) Click on the ’Log type output’ to view the entire ssh session recorded for the user john on the server  As you can see the entire ssh session is available. 



3. How to view the ssh session recorded of a user in real time ?

a) Identify the ongoing ssh sessions which has the status ' Active' and Click on its  'note' icon on the right.



b)Click on enable streaming and choose the interval of 1 second and you will be able to what the jump server user is doing on a server in real time.

Ensure to disable ssh log encryption under Settings->General->Security->Encrypt SSH Session logs so that the Enable streaming button is visible.



The ssh logs recorded for every gateway user is stored in the filesystem directory /var/log/ezlogin/input/{username}.  The input directory stores only the inputs from STDIN devices such as keyboard,mouse etc hence the input log would contain every keypress of the user including password and invisible characters. The directory /var/log/ezlogin/output/{username} stores the output from STDOUT devices such as monitor,printer etc, hence the output logs would contain every characters that is printed on the screen. It is recommended to enable STDOUT recording under Settings->General->Security->SSH Session Logging->Output. Also, refer the article strange characters in INPUT logs recorded.

4. How to encrypt  users ssh session log recorded to meet security compliances?

You can enable ’Encrypt ssh session logs’ under Settings->General->Security so that logs are not human readable. Note that the logs are only readable from the gui.  In the backend, the ssh logs are  stored in the /var/log/ezlogin directory.

record ssh session


5. How to search the users recorded ssh session logs for  specific strings or keywords?

Enter the string to be searched in the field 'Log Content'.  The results show the matching logs and user,username with which the server was accessed and the login and logout times are recorded as well.



6. The  Administrator user can download any users ssh session to remote devices as a text file by clicking on the blue arrow as shown below. 


7.  The normal user can download his own ssh session logs  recorded under  Users->SSH Log


8. How to get local, timestamped logging of all ssh commands?  

 At the moment only the ssh session start time and end time are recorded and not the times when each command is run.  In order to have the timestamps of commands executed in ssh, the easiest method would be add the date in the command prompt in the bash shell as follows.

For Centos, edit bashrc file and add the line at end of the file or  refer article to modify command prompt in CentOS

[root@centos ~]# vi /etc/bashrc

PS1="[\u@\h \D{%Y%m%d-%H:%M:%S}]\$ "

An example of adding timestamp on a Centos server.

[root@otp ~]# vi /etc/bashrc

PS1="[\u@\h \D{%Y%B%d-%H:%M:%S}]\$ "

[root@otp 2021March18-12:02:27]$ uptime


12:02:42 up 3 days, 14:58,  2 users,  load average: 0.00, 0.01, 0.05


[root@otp 2021March18-12:02:42]$ date


Thu Mar 18 12:02:43 IST 2021

The recorded output session in Ezeelogin will contain the date and timestamp as show below.


Do refer the article to add the time in command prompt for OS such Ubuntu , Debian and others.

Recording of software tools using  ncurses libraries or text based graphical libraries  such as htop,top,midnight commander is not supported.
3 (2)
Article Rating (2 Votes)
Rate this article
    Attached Files
    There are no attachments for this article.