Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-01-10 14:01:12.733257 daemon-info , modulelauncher[15581]:  Secure mode started
2025-01-10 14:01:14.306816 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.2.1
# Fri 10 Jan 2025 14:01:14 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$dsbpK8Q5Cw9s2tJY$KrDj/6tqIiHkpYGhUlLMz5eXAnOmA5Po4kvmIRJPM.FRBAzpsb0SVAU4EOOMEuRZ4.fPXphs/cIyx0NhxkeAV/'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-01-10 14:01:12.733257 daemon-info , modulelauncher[15581]:  Secure mode started
2025-01-10 14:01:14.306816 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-01-10 14:01:14.438344 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-01-10 14:01:14.482111 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$dsbpK8Q5Cw9s2tJY$KrDj/6tqIiHkpYGhUlLMz5eXAnOmA5Po4kvmIRJPM.FRBAzpsb0SVAU4EOOMEuRZ4.fPXphs/cIyx0NhxkeAV/'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-01-10 14:01:12.733257 daemon-info , modulelauncher[15581]:  Secure mode started
2025-01-10 14:01:14.306816 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-01-10 14:01:14.438344 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-01-10 14:01:14.482111 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-01-10 14:01:14.652594 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-01-10 14:01:14.775192 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-01-10 14:01:14.833441 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-01-10 14:01:14.897103 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-01-10 14:01:14.958186 user-warning , OSDxCLI:  Signal 10 received
2025-01-10 14:01:14.960318 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-01-10 14:01:15.027834 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX19DMktgqBgUxvD8NFnj3n4McGR9HGvpenU=
set system login user admin authentication encrypted-password '$6$c5a3dK3PHxH42BFK$YjxKaT5DzDRjrWjsli4WJNSno6lmbJvmQoZYbbUgm9J5ZVKK8IdSdpb7w.ts/tNKVbLjpAAZlTlErsvnaCnWS/'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-01-10 14:01:22.517848 daemon-info , modulelauncher[15968]:  Secure mode started
2025-01-10 14:01:23.927630 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-01-10 14:01:24.058882 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-01-10 14:01:24.133252 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-01-10 14:01:24.231364 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-01-10 14:01:24.281543 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-01-10 14:01:24.402910 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-01-10 14:01:24.605594 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-01-10 14:01:24.620905 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$M/nLC5V6w9f2ZRB7$kjD.Q.RRz8y2jil0vfjfBZQ/GtWh.yauC/nq4wr09sdgdFeQXmShd69TbyNO7ZdNrh8850RStXphgpxHpt01Y0'
set system login user test authentication encrypted-password '$6$V4QsZICifqwMTXWu$4SpQt9hfCiMoFtslNiK2hG2hKsP07Wd.3U6BalwWC9vB.a6hHN3xnGqQN.kmkEhA0udd7iCGp7r1xSSaq0wUE1'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed