Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2026-04-16 15:49:14.421412 daemon-info , modulelauncher[134129]:  Secure mode started
2026-04-16 15:49:15.843892 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.9.2
# Thu 16 Apr 2026 15:49:16 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$.irAMXu7IyTfcegQ$6Ivm94C1b1qipfe.kbjrcMi.OI9TQZmYtqGe4umQ2Ebxbkv0HrohuhynuniTylgQY3xGfvamB9Srs5F36pT.o0'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2026-04-16 15:49:14.421412 daemon-info , modulelauncher[134129]:  Secure mode started
2026-04-16 15:49:15.843892 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-04-16 15:49:15.969274 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-04-16 15:49:16.026263 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$.irAMXu7IyTfcegQ$6Ivm94C1b1qipfe.kbjrcMi.OI9TQZmYtqGe4umQ2Ebxbkv0HrohuhynuniTylgQY3xGfvamB9Srs5F36pT.o0'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2026-04-16 15:49:14.421412 daemon-info , modulelauncher[134129]:  Secure mode started
2026-04-16 15:49:15.843892 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-04-16 15:49:15.969274 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-04-16 15:49:16.026263 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2026-04-16 15:49:16.212464 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-04-16 15:49:16.349246 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-04-16 15:49:16.415755 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2026-04-16 15:49:16.521215 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-04-16 15:49:16.587597 user-warning , OSDxCLI:  Signal 10 received
2026-04-16 15:49:16.589973 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-04-16 15:49:16.633692 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX18Hea6TI/tg3b07V30UgkAmBLQx3jtsFoM=
set system login user admin authentication encrypted-password '$6$5cgZW2VEfaPYcT1m$d6.zm.2GBGjmuMlvCyOM2FhDrL.fazDTgp1Bq2LgcbGVs7PO7VboJK3mv4bD3uaHSpwmIn2Q7HqJgh6Q62TB31'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2026-04-16 15:49:26.380662 daemon-info , modulelauncher[134537]:  Secure mode started
2026-04-16 15:49:27.892526 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-04-16 15:49:28.053302 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-04-16 15:49:28.138449 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2026-04-16 15:49:28.251042 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2026-04-16 15:49:28.327717 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2026-04-16 15:49:28.436279 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-04-16 15:49:28.692919 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-04-16 15:49:28.721374 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$U3fICZsku67LTK9b$Xz8lrKN6x4uh5dDo/3qGYFmmF/hj96VwNEZ54049Ntr7XLd8BiSn6CPLwH5B3frC48umHT.A9/IoQVr0fr.ZG/'
set system login user test authentication encrypted-password '$6$5quJuu.rjBcKnm4D$gzxl0U0Lq9rY5cZCQEjGQcRnOx9HxUqAJqjmtC1bPxqKmBOhznaC3JSYslYxQlDLv.ZV5T71K/4nZ/UtG8aRF0'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed