Accounting

These scenarios show accounting feature when secure mode is enabled. All logs are stored in file: running://log/user/audit_file/audit_file

File Logs

Description

Show different logs stored in audit file

Scenario

Step 1: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Secure mode started
Show output
2026-05-05 01:42:15.367497 daemon-info , modulelauncher[565527]:  Secure mode started
2026-05-05 01:42:16.974139 auth-notice , OSDxCLI:  User 'admin' has logged in.

Step 2: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.2.9.3
# Tue 05 May 2026 01:42:17 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$lJcIxHBgaattCLQ2$ltJq8TIzEZTOtin8ucGWhy20a2Ol3LkowyvTvG9.VLI7fFVj4JqJt83eBRU.Lja/cBkz9ZUNx.3gf0iWDVM9B/'
set system security medium

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' executed a new command: 'show running'
Show output
2026-05-05 01:42:15.367497 daemon-info , modulelauncher[565527]:  Secure mode started
2026-05-05 01:42:16.974139 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-05-05 01:42:17.081318 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-05-05 01:42:17.115670 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.

Step 4: Set the following configuration in DUT0 :

set system cli configuration logging cli info
set system login user admin authentication encrypted-password '$6$lJcIxHBgaattCLQ2$ltJq8TIzEZTOtin8ucGWhy20a2Ol3LkowyvTvG9.VLI7fFVj4JqJt83eBRU.Lja/cBkz9ZUNx.3gf0iWDVM9B/'
set system security medium

Step 5: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' committed the configuration
Show output
2026-05-05 01:42:15.367497 daemon-info , modulelauncher[565527]:  Secure mode started
2026-05-05 01:42:16.974139 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-05-05 01:42:17.081318 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-05-05 01:42:17.115670 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show running'.
2026-05-05 01:42:17.278185 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'file show running://log/user/audit_file/audit_file'.
2026-05-05 01:42:17.392518 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-05-05 01:42:17.447098 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system cli configuration logging cli info'.
2026-05-05 01:42:17.553457 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-05-05 01:42:17.615790 user-warning , OSDxCLI:  Signal 10 received
2026-05-05 01:42:17.617910 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-05-05 01:42:17.670024 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Hidden Passwords

Description

Plain passwords are not displayed

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs TAC1 address 10.215.168.1
set system aaa server tacacs TAC1 encrypted-key U2FsdGVkX18Nei7eXiSfrZ6OB5ryOPhiTUYd7K6xaJM=
set system login user admin authentication encrypted-password '$6$8tZA6QB3Ay.4vadt$eCpjNxik2jlLJxWaFE2XcPHhiLPdV6mvn6mSBlNKQvkmyvHPlsgdmY.6xWTfjA55fQLOCbGm2gJyA9V4qq0mi0'
set system security medium

Step 2: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'
Show output
2026-05-05 01:42:24.059532 daemon-info , modulelauncher[565936]:  Secure mode started
2026-05-05 01:42:25.628441 auth-notice , OSDxCLI:  User 'admin' has logged in.
2026-05-05 01:42:25.752735 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2026-05-05 01:42:25.833025 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
2026-05-05 01:42:25.916341 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 key ******'.
2026-05-05 01:42:25.964571 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system aaa server tacacs TAC1 address 10.215.168.1'.
2026-05-05 01:42:26.069820 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2026-05-05 01:42:26.249926 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2026-05-05 01:42:26.264646 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Audit file permissions

Description

Non admin user is allowed to open audit file

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role cfg level 10
set system login user admin authentication encrypted-password '$6$Y.nVXdLko9FZzuqP$B4Hv60st6E/iu6pM50GIjU4Xxslvuz2sjrXzf/Ch5fd9nEvRPV4NCknXgEi09i.L8EQ8KEa314/bF6CgMnHSF0'
set system login user test authentication encrypted-password '$6$A5AYcbAtDC232NGQ$S8nki4aPVgXxci5tYyAx7erVM7Q5EgFpbIPBqBuQHKxdGZ8Ggsg7IApm1FSvyjf.Xaq0iuGIBg6A21fSyjj1I/'
set system login user test role cfg
set system security medium

Step 2: Login as test with password tEst!2qqqqqq

Step 3: Run command file show running://log/user/audit_file/audit_file at DUT0 and check if output contains the following tokens:

Permission denied
Show output
hexdump: /opt/vyatta/etc/config/log/user/audit_file/audit_file: Permission denied
hexdump: all input file arguments failed