Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-02-19 17:49:33.430364 daemon-info , modulelauncher[78781]:  Secure mode started
2025-02-19 17:49:34.980242 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.2.2
# Wed 19 Feb 2025 17:49:35 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$ucHGUUhm/kcYtRcy$VZTWD0Q9ARPI2ZGWhh8gNHfLegoF8OIIML2UcBfu4hQKdS2H.4MZLQZPgsFN4bRZOvPstMjFTpfjZT9bJw1MV0'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-02-19 17:49:33.430364 daemon-info , modulelauncher[78781]:  Secure mode started
2025-02-19 17:49:34.980242 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-02-19 17:49:35.197961 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-02-19 17:49:35.403377 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$ucHGUUhm/kcYtRcy$VZTWD0Q9ARPI2ZGWhh8gNHfLegoF8OIIML2UcBfu4hQKdS2H.4MZLQZPgsFN4bRZOvPstMjFTpfjZT9bJw1MV0'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-02-19 17:49:33.430364 daemon-info , modulelauncher[78781]:  Secure mode started
2025-02-19 17:49:34.980242 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-02-19 17:49:35.197961 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-02-19 17:49:35.403377 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-02-19 17:49:35.640582 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-02-19 17:49:35.903908 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19 17:49:36.042757 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-02-19 17:49:36.261193 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19 17:49:36.404982 user-warning , OSDxCLI:  Signal 10 received
2025-02-19 17:49:36.409747 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-02-19 17:49:36.490730 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX1+JITtgVFCfc/f/5aZnU1xoem00KP9kx1c=
set system login user admin authentication encrypted-password '$6$EtsfDWP6AMAmFLkb$p89HjKB0MGinmHsE6KdGIFxbqwL1yqgYIb4v.esd2Ll1Y7oWL03Itpachy3rR1iZJ4.b4n0lMQT32.zWXl9nO0'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-02-19 17:49:56.194002 daemon-info , modulelauncher[79168]:  Secure mode started
2025-02-19 17:49:57.776964 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-02-19 17:49:58.134413 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19 17:49:58.354087 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-02-19 17:49:58.567433 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-02-19 17:49:58.689383 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-02-19 17:49:58.918253 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19 17:49:59.488170 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-02-19 17:49:59.531911 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$sK4BJNh9D7tDTh1d$cG6UF1eWFR4RvkX48YermQyYlmIK4Fvq3/6MOO2kOMLNf5kxT8XTtbTuA9Xiwp4opyW466umX0m9ql57L63N21'
set system login user test authentication encrypted-password '$6$iauAPb9Dtc7oy4Ap$6iLVimlXaaNyr8T4.i4xd5wdiqMCW7jZlFYKOFwROqyWAqOxETwuAkXz4b/K4wKyZ.K0sDHFGSOjZC0Uj/OYe1'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed