Ssh Mac

Test suite for validating SSH access control options

SSH Connection Specific MAC

Description

Sets the SSH service to only accept a single HMAC (HMAC-SHA2-512) and checks that a client can connect to the remote server using that MAC. Later, checks that using a different MAC does indeed fail.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.20/24
set service ssh mac hmac-sha2-512

Step 2: Set the following configuration in DUT1:

set interfaces ethernet eth0 address 10.215.168.21/24
set service ssh

Step 3: Ping IP address 10.215.168.20 from DUT1:

admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1
Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data.
64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.498 ms

--- 10.215.168.20 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.498/0.498/0.498/0.000 ms

Step 4: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-sha2-512
Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts.
admin@10.215.168.20's password:
Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jan 24 23:50:15 2024
admin@osdx$

Step 5: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-md5

SSH Connection Multiple MACs

Description

Sets the SSH service to accept multiple HMACs (HMAC-SHA2-512 and HMAC-SHA1) and checks that a client can connect to the remote server using those MACs. Later on, checks that using a different MAC does indeed fail.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.20/24
set service ssh mac hmac-sha2-512,hmac-sha1

Step 2: Set the following configuration in DUT1:

set interfaces ethernet eth0 address 10.215.168.21/24
set service ssh

Step 3: Ping IP address 10.215.168.20 from DUT1:

admin@DUT1$ ping 10.215.168.20 count 1 size 56 timeout 1
Show output
PING 10.215.168.20 (10.215.168.20) 56(84) bytes of data.
64 bytes from 10.215.168.20: icmp_seq=1 ttl=64 time=0.425 ms

--- 10.215.168.20 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.425/0.425/0.425/0.000 ms

Step 4: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-sha2-512
Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts.
admin@10.215.168.20's password:
Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jan 24 23:50:30 2024 from 10.215.168.21
admin@osdx$

Step 5: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-sha1
Show output
Warning: Permanently added '10.215.168.20' (ED25519) to the list of known hosts.
admin@10.215.168.20's password:
Welcome to Teldat OSDx 202401241058.f949bb7-v3.9.1.2-snapshot

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jan 24 23:50:49 2024 from 10.215.168.21
admin@osdx$

Step 6: Init an SSH connection from DUT1 to IP address 10.215.168.20 with the user admin:

admin@DUT1$ ssh admin@10.215.168.20 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null cipher aes256-ctr mac hmac-md5