Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-06-25 12:04:02.585323 daemon-info , modulelauncher[23987]:  Secure mode started
2025-06-25 12:04:04.199658 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.4.5
# Wed 25 Jun 2025 12:04:04 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$FIhK4QVVZ4Q4CLkq$C8ghLFoAtEaYtfnsmACGIJTvFUO2xLL9y3QPVIbLO7EqJZ43Tj92CVzhREb6.GXHDKJEEFNoZOUfQK0od83bg1'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-06-25 12:04:02.585323 daemon-info , modulelauncher[23987]:  Secure mode started
2025-06-25 12:04:04.199658 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-06-25 12:04:04.305455 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-06-25 12:04:04.356738 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$FIhK4QVVZ4Q4CLkq$C8ghLFoAtEaYtfnsmACGIJTvFUO2xLL9y3QPVIbLO7EqJZ43Tj92CVzhREb6.GXHDKJEEFNoZOUfQK0od83bg1'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-06-25 12:04:02.585323 daemon-info , modulelauncher[23987]:  Secure mode started
2025-06-25 12:04:04.199658 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-06-25 12:04:04.305455 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-06-25 12:04:04.356738 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-06-25 12:04:04.528273 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-06-25 12:04:04.667226 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-25 12:04:04.728610 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-06-25 12:04:04.798799 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-25 12:04:04.878011 user-warning , OSDxCLI:  Signal 10 received
2025-06-25 12:04:04.880358 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-25 12:04:04.934051 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX19qpwNXicJeXwYAm+UuC2Iw3LZJ4klfcvI=
set system login user admin authentication encrypted-password '$6$eCxkgLk9jhQn6vGj$3ZwEkiKpi5uMoG75.XWRq4RNj8jA6BX8gZG.ubvZ4jpz/uk5vV68rz5qKOI72hU20g0IV18AFcNjbq400rO9//'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-06-25 12:04:13.192987 daemon-info , modulelauncher[24373]:  Secure mode started
2025-06-25 12:04:14.607577 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-06-25 12:04:14.745510 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-25 12:04:14.824093 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-06-25 12:04:14.910807 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-06-25 12:04:14.994758 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-06-25 12:04:15.064971 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-25 12:04:15.264952 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-25 12:04:15.280853 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$XvmarNu2LPsd/fJh$OeGlNelwA346nSxaIsufSjN5rS7a604bzFt/lj6z25pe48wv.GL4qHqeSHzK2SibqZlKdZRVYER82kDWc7gqz/'
set system login user test authentication encrypted-password '$6$IzeroKxpXdY4CJtc$AZwo8gpLGop7WEkxOnLrFcWhBXflmhGhcW5iG3ohIQ663JAMlg3lXIgH4YV3BkZ8Y.z6qjccHZD9xNR7B0FYW1'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed