Login Detection Ques #1920
Unanswered
djgrover101-debug
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I am working on detecting successful user login events on Linux systems using eBPF, and I’m facing reliability issues when relying on user-space authentication libraries (PAM).
Current approach
Problem
In real environments:
Additionally, user-space hooks are fragile due to:
What I’m trying to achieve
I understand that:
However, I want to know:
Is there a kernel-level, service-agnostic way to reliably identify that a real login session has occurred (SSH, FTP, console, etc.), without purely relying on user-space authentication libraries?
Are there kernel signals or state transitions (e.g. credential changes, session creation, process ancestry, TTY allocation, audit hooks, etc.) that can be used to infer a successful login, even though the kernel does not perform authentication?
From a design perspective:
Can we use user space and kernel level things together and series of event capturing to make a concrete function?
Goal
The goal is to build a robust, low-false-negative login detection mechanism that:
I’m looking for design guidance, not a specific implementation.
Beta Was this translation helpful? Give feedback.
All reactions