Ssh Cipher
Test suite for validating SSH cipher options
SSH Connection Specific Cipher
Description
Sets the SSH service to only accept a single cipher (AES256-CBC
)
and checks that a client can connect to the remote server using that
cipher. Later on, checks that it cannot connect using a different
cipher.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.20/24 set service ssh cipher aes256-cbc
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.215.168.21/24 set service ssh
Step 3: Ping IP address 10.215.168.20
from DUT1
:
admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data. 64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.642 ms --- 10.215.168.20 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.642/0.642/0.642/0.000 ms
Step 4: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-cbcShow output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts. admin@10.215.168.20's password: Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot This system includes free software. Contact Teldat for licenses information and source code. Last login: Wed Jan 24 23:59:27 2024 from 127.0.0.1 admin@osdx$
Step 5: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher 3des-cbc
SSH Connection Multiple Ciphers
Description
Sets the SSH service to accept multiple ciphers (AES256-CBC
and
AES128-CTR
) and checks that a client can connect to the remote
server using any of the two ciphers. Later on, checks that it cannot connect
using a different cipher.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.20/24 set service ssh cipher aes256-cbc,aes128-ctr
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.215.168.21/24 set service ssh
Step 3: Ping IP address 10.215.168.20
from DUT1
:
admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data. 64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.486 ms --- 10.215.168.20 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.486/0.486/0.486/0.000 ms
Step 4: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-cbcShow output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts. admin@10.215.168.20's password: Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot This system includes free software. Contact Teldat for licenses information and source code. Last login: Wed Jan 24 23:59:37 2024 from 10.215.168.21 admin@osdx$
Step 5: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes128-ctrShow output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts. admin@10.215.168.20's password: Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot This system includes free software. Contact Teldat for licenses information and source code. Last login: Wed Jan 24 23:59:57 2024 from 10.215.168.21 admin@osdx$
Step 6: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher 3des-cbc