Ssh Cipher

Test suite for validating SSH cipher options

SSH Connection Specific Cipher

Description

Sets the SSH service to only accept a single cipher (AES256-CBC) and checks that a client can connect to the remote server using that cipher. Later on, checks that it cannot connect using a different cipher.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.20/24
set service ssh cipher aes256-cbc

Step 2: Set the following configuration in DUT1:

set interfaces ethernet eth0 address 10.215.168.21/24
set service ssh

Step 3: Ping IP address 10.215.168.20 from DUT1:

admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1
Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data.
64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.642 ms

--- 10.215.168.20 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.642/0.642/0.642/0.000 ms

Step 4: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-cbc
Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts.
admin@10.215.168.20's password:
Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jan 24 23:59:27 2024 from 127.0.0.1
admin@osdx$

Step 5: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher 3des-cbc

SSH Connection Multiple Ciphers

Description

Sets the SSH service to accept multiple ciphers (AES256-CBC and AES128-CTR) and checks that a client can connect to the remote server using any of the two ciphers. Later on, checks that it cannot connect using a different cipher.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.20/24
set service ssh cipher aes256-cbc,aes128-ctr

Step 2: Set the following configuration in DUT1:

set interfaces ethernet eth0 address 10.215.168.21/24
set service ssh

Step 3: Ping IP address 10.215.168.20 from DUT1:

admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1
Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data.
64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.486 ms

--- 10.215.168.20 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.486/0.486/0.486/0.000 ms

Step 4: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-cbc
Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts.
admin@10.215.168.20's password:
Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jan 24 23:59:37 2024 from 10.215.168.21
admin@osdx$

Step 5: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes128-ctr
Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts.
admin@10.215.168.20's password:
Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jan 24 23:59:57 2024 from 10.215.168.21
admin@osdx$

Step 6: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher 3des-cbc