ATM_ID: 6074B77E-693F-11F0-90F0-C4D1B6ACCDE0 MFF: PLANNEDTIMESTAFF: ID: Not_to_use_for_any_Dashboard/CCC/165343 TESTCASE_HEADLINE: SSH_KEY-EXCHANGE_ALGORITHMS GROUP: FEATURE: SUB_FEATURE: INPUT:

Important: Please Make sure the Cerberus FTP Server is configured properly to accept SFTP scans.

PROCEDURE:

1 In Cerberus FTP Server,in the left side under Configuration Select [Server Manager] → [Protocols] → [SSH SFTP].2 In SSH Security Defaults,under [Active Key Exchange],Select only [ecdh-sha2-nistp256] key exchange algorithm and uncheck the remaining. Now click [Update] button.3 [Exit] from Cerberus FTP server and [Restart] Cerberus FTP Server windows service.4 Execute AUTOMATIC_LOG_TRANSFER_PASSWORD
5 Run the Wire shark tool while performing this job and view the traces getting displayed by giving "ssh" command in Filter6 To test [ecdh-sha2-nistp384] algorithm,Repeat from Step [1 – 4]. 7 Run the Wire shark tool while performing this job and view the traces getting displayed by giving "ssh" command in Filter8 To test [ecdh-sha2-nistp521] algorithm,Repeat from Step [1 – 4]. 9 Run the Wire shark tool while performing this job and view the traces getting displayed by giving "ssh" command in Filter10 To test the unsupported Key Exchange [diffie-hellman-group1-sha1] method,Repeat from Step [1 – 4].


11 Run the Wire shark tool while performing this job and view the traces getting displayed by giving "ssh" command in Filter

TEST_COVERED_BY: SRT_ANALYZATION: OUTPUT:

The Cerberus FTP Server Protocol Settings page will be displayed.The Settings will be updated.N/ASee Procedure
AUTOMATIC_LOG_TRANSFER_PASSWORD

Click the 'Client: Key Exchange Init'.

Under SSH Protocol,check the selected key exchange method is listed.

And the Audit log transfer should be Successful.N/AClick the 'Client: Key Exchange Init'.

Under SSH Protocol,check the selected key exchange method is listed.

And the Audit log transfer should be Successful.N/AClick the 'Client: Key Exchange Init'.

Under SSH Protocol,check the selected key exchange method is listed.

And the Audit log transfer should be Successful.N/AClick the 'Client: Key Exchange Init'.

Under SSH Protocol,check the selected encryption algorithm listed.

And the Audit log transfer should fail.

PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: SPEC_NUM: SPEC_VERSION: SPEC_TAG: ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_FAMILY: TESTCASE_APPROVALS: CDATE: 1753438137 MDATE: 1753438137 MUSER: USWU53416 AUTHOR: USWU53416 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: COMPETENCY: AUTOMATION_GROUP: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: COMMON_FUNCTIONALITY: COMMONALITY_DETAILS: CONSTRAINTS_DAR: DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: COMPLEXITY_OUTPUT_VALIDATION: AUTOMATABLE: AUTOMATION_CANDIDATE: TESTCASE_MODIFICATION_REQUIRED: APTEST_UPDATE_STATUS: DEVICE_CATEGORY: TC_WORK_LOCATION_CAT: AUTOMATION_TC_VALIDATION: