I've had a few security problems with a server of mine because a few SSH users have been causing problems.
So I would like to:
The ssh daemon,
sshd, has much of this built in and enabled. Here's are some sample lines from
/var/log/secure on my machine (names and IP addresses changed):
Sep 7 08:34:25 myhost sshd: Failed password for illegal user root from 62.75.999.999 port 52663 ssh2 Sep 7 08:34:26 myhost sshd: User root not allowed because listed in DenyUsers Sep 7 08:34:28 myhost sshd: Failed password for illegal user root from 62.75.999.999 port 53393 ssh2 Sep 7 11:55:18 myhost sshd: Accepted password for gooduser from 98.999.26.41 port 43104 ssh2 Sep 7 23:01:28 myhost sshd: Did not receive identification string from 9126.96.36.1999 Sep 8 06:31:30 myhost sshd: Accepted password for gooduser from 98.999.26.41 port 5978 ssh2
This example shows a couple attempts by somebody to ssh into this machine as root -- both were denied because root is forbidden. It also shows a successful login by the user named "gooduser".
To fine tune what you see and in which file, read more in the sshd_config man page -- specifically the options for LogLevel and SyslogFacility.
Following up on what Doug Harris answered (and only addressing part of your question - this seems to be how I work), the Logwatch package will email you a daily summary of a number of server logs, including the SSHd log. I get a summary of who successfully logged in via SSH, how many times, and from where, as well as what IPs tried to log in unsuccessfully and what credentials they used. It gets long if someone tries a brute-force SSH attack on a host where I'm allowing password authentication (I try to avoid that, favoring RSA keys instead, but the customer is always right and doesn't always understand public-key authentication. Anyway.)
To install Logwatch (which is basically just a collection of Perl filters for digesting various log formats) on Ubuntu, use
apt-get install logwatch and then edit
--output mail with
--mailto email@example.com. You'll get one a day. You can add more flags to tune which logs Logwatch actually reads.
One a very complete way of tracking users is to use auditd. It's a kernel level way to track whatever you need to audit. It should be bundled with Ubuntu Server and if not already running, should be startable with
sudo service auditd start.
There are plenty of configuration examples for it under /usr/share/doc/auditd/ or something similar to that, and of course if you Google for auditd tutorial, you'll be rewarded with many, many tutorials.
The reports generated by auditd are stored in /var/log/audit/ directory. They also can be parsed to more human-readable form with tools like aureport and ausearch, also should already be bundled with Ubuntu Server.
I wouldn't give out ssh-accounts, especially to distro-groups type people.
Here's a couple of things:
From Can history files be unified in bash?
Insert the command shopt -s histappend in your .bashrc. This will append to the history file instead of overwriting it. Also in your .bashrc, insert PROMPT_COMMAND="$PROMPT_COMMAND;history -a; history -n" and the history file will be re-written and re-read each time bash shows the prompt.