Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2026-03-24 09:12:03.645474 daemon-info , modulelauncher[11127]:  Secure mode started
2026-03-24 09:12:05.098959 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.4.9
# Tue 24 Mar 2026 09:12:05 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$baJI1luLzpt5/z6o$YUBCrv72d/WjGDhmc17J5r5OL800ys3RIaQpoGQfd5PHjmxcE8615FoVkKfnMV58Z2NWm28khS9R4pWJSo4pU/'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2026-03-24 09:12:03.645474 daemon-info , modulelauncher[11127]:  Secure mode started
2026-03-24 09:12:05.098959 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-03-24 09:12:05.245607 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-03-24 09:12:05.288681 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$baJI1luLzpt5/z6o$YUBCrv72d/WjGDhmc17J5r5OL800ys3RIaQpoGQfd5PHjmxcE8615FoVkKfnMV58Z2NWm28khS9R4pWJSo4pU/'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2026-03-24 09:12:03.645474 daemon-info , modulelauncher[11127]:  Secure mode started
2026-03-24 09:12:05.098959 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-03-24 09:12:05.245607 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-03-24 09:12:05.288681 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2026-03-24 09:12:05.450372 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-03-24 09:12:05.568416 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-03-24 09:12:05.628820 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2026-03-24 09:12:05.692943 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-03-24 09:12:05.772407 user-warning , OSDxCLI:  Signal 10 received
2026-03-24 09:12:05.774457 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-03-24 09:12:05.837862 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX1+Tip3UOJh1QpDkLiVpXZ69YEr4geDio98=
set system login user admin authentication encrypted-password '$6$otXo3c0icr3bDIHM$aQzps8OmKXSBoZlFQ5aRf5oHTHqAVaOM.ttTqy4Hl/YgqkLKComxrMRQOXvP1vAkZBI/pVmKK.Iju4.UXJpHW0'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2026-03-24 09:12:13.250185 daemon-info , modulelauncher[11514]:  Secure mode started
2026-03-24 09:12:14.693097 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-03-24 09:12:14.847646 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-03-24 09:12:14.925022 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2026-03-24 09:12:15.034069 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2026-03-24 09:12:15.087366 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2026-03-24 09:12:15.196763 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-03-24 09:12:15.378295 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-03-24 09:12:15.407371 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$4hwn.JxNl/c4ucVz$spJ.dZ731rDH/Ewqx5CvdinOI.mZk59JajU2RdZXLze5pBq0PwwN4FeojxRsTdJHeLEo8gbBTOKTDjUZ9Pusb.'
set system login user test authentication encrypted-password '$6$3rNPVMWP9hB38B1V$XvVq2haVeIG4/4CIyd0FX7Yb7d2s2I8CnmAVkOAuwK3/Zfo3mRVaYlP2l5mEfMf9nAIiopY3Co8dRJYseHU4T0'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed