Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2025-12-17 16:51:49.798286 daemon-info , modulelauncher[77585]:  Secure mode started
2025-12-17 16:51:51.412167 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.7.2
# Wed 17 Dec 2025 16:51:51 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$oRWyaDdd3Q3rRpVs$uJCvEio6iZHUq4nIMXhQSq/taUrdmlhdM1PP87uUMjuIZNPrCcVM2vR6f5uyV2Nbg.8PIZx5POzk2kCEvAQQ41'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2025-12-17 16:51:49.798286 daemon-info , modulelauncher[77585]:  Secure mode started
2025-12-17 16:51:51.412167 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-12-17 16:51:51.558217 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-12-17 16:51:51.612691 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$oRWyaDdd3Q3rRpVs$uJCvEio6iZHUq4nIMXhQSq/taUrdmlhdM1PP87uUMjuIZNPrCcVM2vR6f5uyV2Nbg.8PIZx5POzk2kCEvAQQ41'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2025-12-17 16:51:49.798286 daemon-info , modulelauncher[77585]:  Secure mode started
2025-12-17 16:51:51.412167 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-12-17 16:51:51.558217 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-12-17 16:51:51.612691 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2025-12-17 16:51:51.792502 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2025-12-17 16:51:51.915671 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-12-17 16:51:51.983113 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2025-12-17 16:51:52.066574 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-12-17 16:51:52.150676 user-warning , OSDxCLI:  Signal 10 received
2025-12-17 16:51:52.152921 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-12-17 16:51:52.207812 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX18j6NlpSd8PQl8NIuo/K5ZokiHo0o+Bo44=
set system login user admin authentication encrypted-password '$6$WmawMIOZueUh8si3$qO/leTWVlnAZQ52JEnMK3wOdb5baEGftShe.rodnmwyLezGvfgJQiu9G5QoC4XKeyw2xlfoiSIBSFCyPfPMIV1'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2025-12-17 16:52:00.226068 daemon-info , modulelauncher[77978]:  Secure mode started
2025-12-17 16:52:01.633577 auth-notice , OSDxCLI:  User 'admin' has logged in.
2025-12-17 16:52:01.791605 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2025-12-17 16:52:01.875284 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2025-12-17 16:52:01.968930 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2025-12-17 16:52:02.045158 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2025-12-17 16:52:02.150891 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-12-17 16:52:02.332207 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-12-17 16:52:02.356317 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$oOqFcfbtSsL2GM/E$iD4j3Arwx5pYqD6j7j3.mBlB2yHZiY0FEKvlCy/eSlLvQV3S4wataGxEJ79x79roMJIXlhXmFea6F3Sh0pM2d1'
set system login user test authentication encrypted-password '$6$5wYVMe8XyXhvDiMK$zo9qt6/uBxa8q3G4T0jtJZBIFe5jeF1B3lmMLLrbPJtB3WSAiyRyBYWYLzzAALwxgG.V97lBC51OCnfgjH2m71'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed