Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-05-13 15:10:38.961385 daemon-info , modulelauncher[180686]:  Secure mode started
2025-05-13 15:10:40.404142 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.5.0
# Tue 13 May 2025 15:10:40 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$wPUrUrmFLVEos5dA$YrrFEwJ.sRHm9HunssjAaMkY9yt2pP1Orjd5YxmmBZc2Qqr5F0Z02TxkoLehFtV6A7/sZs0HzYiukmTJs9EGo.'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-05-13 15:10:38.961385 daemon-info , modulelauncher[180686]:  Secure mode started
2025-05-13 15:10:40.404142 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-05-13 15:10:40.521904 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-05-13 15:10:40.566000 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$wPUrUrmFLVEos5dA$YrrFEwJ.sRHm9HunssjAaMkY9yt2pP1Orjd5YxmmBZc2Qqr5F0Z02TxkoLehFtV6A7/sZs0HzYiukmTJs9EGo.'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-05-13 15:10:38.961385 daemon-info , modulelauncher[180686]:  Secure mode started
2025-05-13 15:10:40.404142 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-05-13 15:10:40.521904 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-05-13 15:10:40.566000 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-05-13 15:10:40.723965 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-05-13 15:10:40.850226 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-13 15:10:40.911778 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-05-13 15:10:40.983118 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-13 15:10:41.062432 user-warning , OSDxCLI:  Signal 10 received
2025-05-13 15:10:41.064294 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-05-13 15:10:41.112793 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX1/50opPgXAf5uSKCOeyR5LUJqYkt2zMi4s=
set system login user admin authentication encrypted-password '$6$BQBllqwjHpdksLDQ$Y8uPxQrw4VRGj6dfQQimcwB1azBmMXRQIUpvxRGyyftYu/kArmD7H/Ea7mvTpHGsKA5P2LkqFLe4.ucsJ.RXk1'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-05-13 15:10:50.870281 daemon-info , modulelauncher[181092]:  Secure mode started
2025-05-13 15:10:52.410664 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-05-13 15:10:52.584432 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-13 15:10:52.687816 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-05-13 15:10:52.786182 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-05-13 15:10:52.854187 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-05-13 15:10:52.970276 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-13 15:10:53.179943 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-05-13 15:10:53.197759 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$aIvtWLCvZWLToZRR$YIi8HMrjVO56tRzAlzHJP8T7jcL/tuU9xpZNAU7UiaRbjP4Mik9rMA7z8iAD67ftHXAmU6sNX0H76P2MsrGxk0'
set system login user test authentication encrypted-password '$6$THDoBTi95IJbjP7Y$muITzhd97fA/a13pc4vESbYstl3AS2N4DI4TAmh/krmXvAUtP2K8QpmUyd1OXX8Uz6G5XlTPE/Oe/yT76ACxp/'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed