Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2026-02-19 13:51:12.287036 daemon-info , modulelauncher[760990]:  Secure mode started
2026-02-19 13:51:13.929295 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.8.4
# Thu 19 Feb 2026 13:51:14 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$ryP6uuR3FU2dtxLc$0G62UUDnOW9TJArazYhKpiPPh7B.mVD4CeBVmjEnAHYYuexlSRxM8brA1zuRD7bFS/Acy9bn5BKILY.CWZNLW1'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2026-02-19 13:51:12.287036 daemon-info , modulelauncher[760990]:  Secure mode started
2026-02-19 13:51:13.929295 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-02-19 13:51:14.064243 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-02-19 13:51:14.132716 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$ryP6uuR3FU2dtxLc$0G62UUDnOW9TJArazYhKpiPPh7B.mVD4CeBVmjEnAHYYuexlSRxM8brA1zuRD7bFS/Acy9bn5BKILY.CWZNLW1'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2026-02-19 13:51:12.287036 daemon-info , modulelauncher[760990]:  Secure mode started
2026-02-19 13:51:13.929295 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-02-19 13:51:14.064243 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-02-19 13:51:14.132716 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2026-02-19 13:51:14.335014 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-02-19 13:51:14.506469 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-02-19 13:51:14.600824 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2026-02-19 13:51:14.661796 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-02-19 13:51:14.769427 user-warning , OSDxCLI:  Signal 10 received
2026-02-19 13:51:14.771697 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-02-19 13:51:14.796292 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX1+U8++9vr9eSQj8WEC/LD4Lf8T3QRm0sCg=
set system login user admin authentication encrypted-password '$6$n9Rsqag0HCO6pA1d$dUzRan/pubw7eIJ887L2ShCzwXFpx1Mmmsg3SVX6qZ8pvdBHeCf63qSXJxJR3QHdILM5ykIp9YtGRtt9BOEkf1'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2026-02-19 13:51:24.454954 daemon-info , modulelauncher[761400]:  Secure mode started
2026-02-19 13:51:26.897052 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-02-19 13:51:27.080859 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-02-19 13:51:27.216805 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2026-02-19 13:51:27.359872 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2026-02-19 13:51:27.427064 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2026-02-19 13:51:27.554131 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-02-19 13:51:27.796519 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-02-19 13:51:27.814996 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$bT8daCnygotb5gcS$POrNuv066MQo/9E2crfIbPEqxXUSK1vtt/sO.X6dbGvGxfborvIBxkjoeHA8xEMTK35iT7RheGfw6tp/.JbjT/'
set system login user test authentication encrypted-password '$6$Uaz.2emjHaaL6aD/$/HHyTVu1esWK4tYbGTUFS8fdVMgcM8ugoXyUw2OFAnLxUL6KuBT.1eSlr7Vza00Wi5XXpjXOb.lm6BFlhxM1N0'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed