You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Master_key_Encrption.md
+24-6
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ The applications will communicate with the master key encryption infra over D-BU
135
135
|**Test Name**|**Verify that the master key is in-accessible to the user via UI**|
136
136
|**Test Setup**|**Topology1**|
137
137
|**Type**|**Functional**|
138
-
|**Steps**| 1) Verify that system generates master key with the user configured key<br/>2) Please check the master key in system files with non root user not able to access<br/> |
138
+
|**Steps**| 1) Verify that system generates master key with the user configured key<br/>2) Please check the master key should not be displayed via show running config<br/> |
139
139
140
140
### 3.1.6 Verify that system is able to encrypt the protocol passwords with user configured Master Key
141
141
@@ -153,7 +153,7 @@ The applications will communicate with the master key encryption infra over D-BU
153
153
|**Test Name**|**Verify that the system re-encrypts all existing protocol passwords with the new master key**|
154
154
|**Test Setup**|**Topology1**|
155
155
|**Type**|**Functional**|
156
-
|**Steps**| 1) Verify that system generates master key with the user configured key<br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Configure new master key<br/>5) Verify from show running config that password is re-encrypted<br/> |
156
+
|**Steps**| 1) Verify that system generates master key with the user configured key<br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Configure new master key<br/>5) Verify from show running config that password is re-encrypted with different encrypted string compared to previous one<br/> |
157
157
158
158
### 3.1.8 Verify that the user is prompted to provide the correct old passphrase while trying to update the new master key passphrase
159
159
@@ -171,7 +171,7 @@ The applications will communicate with the master key encryption infra over D-BU
171
171
|**Test Name**|**Verify that the user is not allowed to retry a master key update in the case of a failure of authentication w.r.t older master key**|
172
172
|**Test Setup**|**Topology1**|
173
173
|**Type**|**Functional**|
174
-
|**Steps**| 1) Verify that system generates master key with the user configured key <br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Configure new master key <br/>5) verify that master key will not configured with wrong old key<br/>6) verify that master key will be configured with Correct old key<br/>7) Verify from show running config that password is re-encrypted<br/> |
174
+
|**Steps**| 1) Verify that system generates master key with the user configured key <br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Configure new master key <br/>5) verify that master key will not configured with wrong old key<br/>6) verify that master key will not be configured with Correct old key before 1 Sec retry<br/>7) verify that master key will be configured with Correct old key After 1 Sec retry<br/>7) Verify from show running config that password is re-encrypted and check that different from previous one<br/> |
175
175
176
176
### 3.1.10 Verify that the deletion of the master key results in the system falling back to the default key
177
177
@@ -189,7 +189,7 @@ The applications will communicate with the master key encryption infra over D-BU
189
189
|**Test Name**|**Verify that the configuration from one switch can be migrated to another provided that the master keys are the same**|
190
190
|**Test Setup**|**Topology1**|
191
191
|**Type**|**Functional**|
192
-
|**Steps**| 1) Verify that system generates master key with the user Default key <br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Copy the config_db.json file and try to load in other device with same master key<br/>5) Verify that the config loaded properly<br/>6) Verify the same with user configured key<br/> |
192
+
|**Steps**| 1) Verify that system generates master key with the user Default key <br/>2) Configure any protocol password ( ospf) between two switches and verify that ospf neighbors are up <br/>3) Verify from show running config that password is encrypted<br/>4) Copy the config_db.json file from switch 1 and load the same file again<br/>5) Verify that the config loaded properly<br/>6) Verify the same with user configured key and check ospf should be intact<br/> |
193
193
194
194
### 3.1.12 Verify that the configuration from one switch cannot be migrated to another provided that the master keys are Different
195
195
@@ -198,7 +198,7 @@ The applications will communicate with the master key encryption infra over D-BU
198
198
|**Test Name**|**Verify that the configuration from one switch cannot be migrated to another provided that the master keys are Different**|
199
199
|**Test Setup**|**Topology1**|
200
200
|**Type**|**Functional**|
201
-
|**Steps**| 1) Verify that system generates master key with the Default key <br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Copy the config_db.json file and try to load in other device with Different master key<br/>5) Verify that the device throws warnings appropriately<br/>6) Verify the same with User Configured key<br/> |
201
+
|**Steps**| 1) Verify that system generates master key with the Default key <br/>2) Configure any protocol password ( ospf) between two switches and verify that ospf neighbors are up <br/>3) Verify from show running config that password is encrypted<br/>4) Copy the config_db.json file from switch 1 and try to change the master key<br/>5) Try to load the same config on switch 1<br/>6) Verify that the ospf not comes up as mater key is diff and protocl password encryption/decryption to diff value <br/> |
202
202
203
203
### 3.1.13 Verify that ospf protocol functionality with the Default Configured Master key
204
204
@@ -225,7 +225,7 @@ The applications will communicate with the master key encryption infra over D-BU
225
225
|**Test Name**|**Verify that ospf protocol functionality after system boot with the User Configured Master Key**|
226
226
|**Test Setup**|**Topology as per the ospf functional suite**|
227
227
|**Type**|**Functional**|
228
-
|**Steps**| 1) Verify that system generates master key with the Default system MAC key <br/>2) Configure ospf as per the ospf functional suite <br/>3) Verify from show running config that password is encrypted<br/>4) Verify ospf neighbors are up<br/>5) Verify that route count as expected<br/>6) Verify that traffic as expected<br/>7) Configured the new key and verify that passwords are re-encrypted<br/>8) Verify ospf neighbors are up<br/>9) Verify that route count as expected<br/>10) Verify that traffic as expected<br/>11) Reboot the system and verify that master key intact<br/>12) Verify ospf neighbors are up<br/>13) Verify that route count as expected<br/>14) Verify that traffic as expected<br/> |
228
+
|**Steps**| 1) Verify that system generates master key with the Default system MAC key <br/>2) Configure ospf as per the ospf functional suite <br/>3) Verify from show running config that password is encrypted<br/>4) Verify ospf neighbors are up<br/>5) Verify that route count as expected<br/>6) Verify that traffic as expected<br/>7) Configured the new key and verify that passwords are re-encrypted<br/>8) Verify ospf neighbors are up<br/>9) Verify that route count as expected<br/>10) Verify that traffic as expected<br/>11) Reboot the system and verify that master key intact<br/>12) Verify ospf neighbors are up<br/>13) Verify that route count as expected<br/>14) Verify that traffic as expected<br/>15) Verify that there should not be any encryption/decryption errors in syslog<br/>|
229
229
230
230
### 3.1.16 Verify that BGP protocol functionality with the Default Configured Master key
231
231
@@ -335,6 +335,24 @@ The applications will communicate with the master key encryption infra over D-BU
335
335
|**Type**|**Functional**|
336
336
|**Steps**| 1) Verify that system generates master key with the User Configured key <br/>2) Configure the SNMPv3 on the device <br/>3) Verify from show running config that password is encrypted<br/>4) Configure some of the object using CLI<br/>5) Try to GET the data using netsnmp tool<br/>6) Verify the data is properly fetched |
337
337
338
+
### 3.1.29 verify that system throws syslog errors when delete the key file
|**Test Name**|**verify that system throws syslog errors when delete the key file**|
343
+
|**Test Setup**|**Topology1**|
344
+
|**Type**|**Functional**|
345
+
|**Steps**| 1) Verify that system generates master key with the user configured key <br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Delete the key file at /etc/<>xxx.txt <br/>5) Verify that system throws proper syslog message that kei file is not there to decrypt/encrypt passwords<br/> |
346
+
347
+
### 3.1.30 verify that system recovers, fallback to default key after deleting the configured master key
|**Test Name**|**verify that system recovers, fallback to default key after deleting the configured master key**|
352
+
|**Test Setup**|**Topology1**|
353
+
|**Type**|**Functional**|
354
+
|**Steps**| 1) Verify that system generates master key with the user configured key <br/>2) Configure any protocol password ( ospf/BGP/LDAP etc) <br/>3) Verify from show running config that password is encrypted<br/>4) Delete the key file at /etc/<>xxx.txt <br/>5) Verify that system throws proper syslog message that key file is not there to decrypt/encrypt passwords<br/>6) Try to delete the configured master key <br/>7) Verify that syslog generated that fallback to default system key and all passwords re-encrypted with default key<br/> |
0 commit comments