Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-09-05 14:36:00.559364 daemon-info , modulelauncher[194666]:  Secure mode started
2025-09-05 14:36:02.217285 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.5.2
# Fri 05 Sep 2025 14:36:02 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$FXcL55CTMQCUlsjc$S4YCTwpyCAzroQJgHplBCU2m8OhW3z715EogCXoz5DZjqy5lJwmyRVo2fXzI35xQKysarKiO3u6ytry1q8Mg81'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-09-05 14:36:00.559364 daemon-info , modulelauncher[194666]:  Secure mode started
2025-09-05 14:36:02.217285 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-09-05 14:36:02.342326 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-09-05 14:36:02.385822 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$FXcL55CTMQCUlsjc$S4YCTwpyCAzroQJgHplBCU2m8OhW3z715EogCXoz5DZjqy5lJwmyRVo2fXzI35xQKysarKiO3u6ytry1q8Mg81'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-09-05 14:36:00.559364 daemon-info , modulelauncher[194666]:  Secure mode started
2025-09-05 14:36:02.217285 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-09-05 14:36:02.342326 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-09-05 14:36:02.385822 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-09-05 14:36:02.549051 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-09-05 14:36:02.666512 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-09-05 14:36:02.726710 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-09-05 14:36:02.800828 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-09-05 14:36:02.892033 user-warning , OSDxCLI:  Signal 10 received
2025-09-05 14:36:02.894183 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-09-05 14:36:02.945238 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX18lXjGQjaEW1lY8IHGac3Lo6h1KLVyLueQ=
set system login user admin authentication encrypted-password '$6$TZis1txqC.Pm1myp$1nmpHGrWvVEKUtwICu5I9E3lq3SDThXtVkl7mk1LzC5HLOxsMudVfXvkNL89kUO6Fj4t.dEzG4FZYlaKxgtaW/'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-09-05 14:36:10.284900 daemon-info , modulelauncher[195067]:  Secure mode started
2025-09-05 14:36:11.796863 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-09-05 14:36:11.937270 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-09-05 14:36:12.016003 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-09-05 14:36:12.102945 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-09-05 14:36:12.187341 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-09-05 14:36:12.255153 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-09-05 14:36:12.471348 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-09-05 14:36:12.489594 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$BgwN7ferph4Xphxg$mIxnIBaVxN3MwDWbdu9AV/aRR3CpFdKX4lozJNof4C9IS65fyhEbpM1Er/gB/Wr/rPkKzrnTJ6yhlnd3FyE2P0'
set system login user test authentication encrypted-password '$6$366Itiily/Ag6q7V$/PZWOAd7MRh0sOwQP492gLHKtVbW/kndQq6Uw.uEc0QwUdOtrGw86rPABII.m0cMGHIlAtA5wy92UHWXAZHpY/'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed