Ssh Mac
Test suite for validating SSH access control options
SSH Connection Specific MAC
Description
Sets the SSH service to only accept a single HMAC (HMAC-SHA2-512
)
and checks that a client can connect to the remote server using that
MAC. Later, checks that using a different MAC does indeed fail.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.20/24 set service ssh mac hmac-sha2-512
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.215.168.21/24 set service ssh
Step 3: Ping IP address 10.215.168.20
from DUT1
:
admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data. 64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.498 ms --- 10.215.168.20 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.498/0.498/0.498/0.000 ms
Step 4: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-sha2-512Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts. admin@10.215.168.20's password: Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot This system includes free software. Contact Teldat for licenses information and source code. Last login: Wed Jan 24 23:50:15 2024 admin@osdx$
Step 5: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-md5
SSH Connection Multiple MACs
Description
Sets the SSH service to accept multiple HMACs (HMAC-SHA2-512
and
HMAC-SHA1
) and checks that a client can connect to the remote
server using those MACs. Later on, checks that using a different MAC
does indeed fail.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.20/24 set service ssh mac hmac-sha2-512,hmac-sha1
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.215.168.21/24 set service ssh
Step 3: Ping IP address 10.215.168.20
from DUT1
:
admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data. 64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.425 ms --- 10.215.168.20 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.425/0.425/0.425/0.000 ms
Step 4: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-sha2-512Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts. admin@10.215.168.20's password: Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot This system includes free software. Contact Teldat for licenses information and source code. Last login: Wed Jan 24 23:50:30 2024 from 10.215.168.21 admin@osdx$
Step 5: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-sha1Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts. admin@10.215.168.20's password: Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot This system includes free software. Contact Teldat for licenses information and source code. Last login: Wed Jan 24 23:50:49 2024 from 10.215.168.21 admin@osdx$
Step 6: Init an SSH connection from DUT1
to IP address 10.215.168.20
with the user admin
:
admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-md5