Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-06-20 13:03:55.488272 daemon-info , modulelauncher[172242]:  Secure mode started
2025-06-20 13:03:56.883200 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.5.1
# Fri 20 Jun 2025 13:03:57 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$4alO/yaP8DXN35q8$C8NrHfsEk4tgQqpnb2SiImKUEuLaqHLj89mUpz4IuaRVnK2t1gxnzNZvMkm3DHc7OzO4388IJZ3Y1cCxQlrji/'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-06-20 13:03:55.488272 daemon-info , modulelauncher[172242]:  Secure mode started
2025-06-20 13:03:56.883200 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-06-20 13:03:57.000260 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-06-20 13:03:57.076965 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$4alO/yaP8DXN35q8$C8NrHfsEk4tgQqpnb2SiImKUEuLaqHLj89mUpz4IuaRVnK2t1gxnzNZvMkm3DHc7OzO4388IJZ3Y1cCxQlrji/'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-06-20 13:03:55.488272 daemon-info , modulelauncher[172242]:  Secure mode started
2025-06-20 13:03:56.883200 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-06-20 13:03:57.000260 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-06-20 13:03:57.076965 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-06-20 13:03:57.235624 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-06-20 13:03:57.382114 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-20 13:03:57.468009 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-06-20 13:03:57.546952 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-20 13:03:57.621436 user-warning , OSDxCLI:  Signal 10 received
2025-06-20 13:03:57.623373 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-20 13:03:57.681148 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX1/dFD+GXcwS0gsTqHXdRRkDPtYuE/gwGZU=
set system login user admin authentication encrypted-password '$6$bRNAzcEkLWInILPP$H5WsHWHHSX./ufpa8MyG5eHofaahbldJ2AL3UewgHcq63XvVk7Rfmnr2mNBBcFQE2gmHu10fhvTlOO2R9O3GS0'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-06-20 13:04:05.322744 daemon-info , modulelauncher[172642]:  Secure mode started
2025-06-20 13:04:06.906585 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-06-20 13:04:07.075195 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-20 13:04:07.201129 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-06-20 13:04:07.312958 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-06-20 13:04:07.414247 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-06-20 13:04:07.566052 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-20 13:04:07.790171 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-20 13:04:07.819196 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$LBZzSX0PDrWO07Jh$3NZMCnVbTo.L22jlcfumWfmAijKeozcnB5qmCOW8xyIUzDplJ66s9y4swXoNjp2Z3j.klNT2aPWqlAHH/MdFj0'
set system login user test authentication encrypted-password '$6$vr/nvc2BGcBJsDj5$3dxvuBdbpMyDp7DasIk42DNccBMpcrDfaoCq7ywGBPeV6qrcsOXskqBpqPnBX0zpcE8Vy2/eOHIIQe2kM4ivZ.'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed