2005-04-06 15:17:08 +04:00
/*
Unix SMB / CIFS implementation .
NBT dgram testing
Copyright ( C ) Andrew Tridgell 2005
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 06:07:03 +04:00
the Free Software Foundation ; either version 3 of the License , or
2005-04-06 15:17:08 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 06:07:03 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2005-04-06 15:17:08 +04:00
*/
# include "includes.h"
# include "libcli/dgram/libdgram.h"
2006-03-16 03:23:11 +03:00
# include "librpc/gen_ndr/samr.h"
# include "librpc/gen_ndr/ndr_nbt.h"
# include "librpc/gen_ndr/ndr_netlogon.h"
2005-04-06 15:17:08 +04:00
# include "lib/socket/socket.h"
# include "lib/events/events.h"
2006-03-14 18:02:05 +03:00
# include "torture/rpc/rpc.h"
2006-03-07 14:07:23 +03:00
# include "libcli/resolve/resolve.h"
# include "system/network.h"
2006-08-17 17:37:04 +04:00
# include "lib/socket/netif.h"
2005-04-06 15:17:08 +04:00
# define TEST_NAME "TORTURE_TEST"
/*
reply handler for netlogon request
*/
static void netlogon_handler ( struct dgram_mailslot_handler * dgmslot ,
struct nbt_dgram_packet * packet ,
2006-01-10 01:12:53 +03:00
struct socket_address * src )
2005-04-06 15:17:08 +04:00
{
2005-04-08 09:34:13 +04:00
NTSTATUS status ;
struct nbt_netlogon_packet netlogon ;
2007-09-07 19:08:14 +04:00
int * replies = ( int * ) dgmslot - > private ;
2005-04-08 09:34:13 +04:00
2005-10-14 16:22:15 +04:00
printf ( " netlogon reply from %s:%d \n " , src - > addr , src - > port ) ;
2005-04-08 09:34:13 +04:00
status = dgram_mailslot_netlogon_parse ( dgmslot , dgmslot , packet , & netlogon ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Failed to parse netlogon packet from %s:%d \n " ,
2005-10-14 16:22:15 +04:00
src - > addr , src - > port ) ;
2005-04-08 09:34:13 +04:00
return ;
}
NDR_PRINT_DEBUG ( nbt_netlogon_packet , & netlogon ) ;
2005-04-08 09:46:00 +04:00
( * replies ) + + ;
2005-04-06 15:17:08 +04:00
}
2005-04-08 09:34:13 +04:00
2005-04-06 15:17:08 +04:00
/* test UDP/138 netlogon requests */
2006-10-16 17:06:41 +04:00
static bool nbt_test_netlogon ( struct torture_context * tctx )
2005-04-06 15:17:08 +04:00
{
struct dgram_mailslot_handler * dgmslot ;
2006-10-16 17:06:41 +04:00
struct nbt_dgram_socket * dgmsock = nbt_dgram_socket_init ( tctx , NULL ) ;
2006-01-10 01:12:53 +03:00
struct socket_address * dest ;
2006-10-16 17:06:41 +04:00
const char * myaddress ;
2005-04-06 15:17:08 +04:00
struct nbt_netlogon_packet logon ;
struct nbt_name myname ;
NTSTATUS status ;
struct timeval tv = timeval_current ( ) ;
2005-04-08 09:46:00 +04:00
int replies = 0 ;
2005-04-06 15:17:08 +04:00
2006-01-10 01:12:53 +03:00
struct socket_address * socket_address ;
2006-10-16 17:06:41 +04:00
const char * address ;
struct nbt_name name ;
name . name = lp_workgroup ( ) ;
name . type = NBT_NAME_LOGON ;
name . scope = NULL ;
/* do an initial name resolution to find its IP */
torture_assert_ntstatus_ok ( tctx ,
2006-11-13 22:08:11 +03:00
resolve_name ( & name , tctx , & address , event_context_find ( tctx ) ) ,
talloc_asprintf ( tctx , " Failed to resolve %s " , name . name ) ) ;
2006-10-16 17:06:41 +04:00
myaddress = talloc_strdup ( dgmsock , iface_best_ip ( address ) ) ;
2006-01-10 01:12:53 +03:00
socket_address = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
myaddress , lp_dgram_port ( ) ) ;
2006-11-13 22:08:11 +03:00
torture_assert ( tctx , socket_address ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
2005-04-08 09:34:13 +04:00
/* try receiving replies on port 138 first, which will only
work if we are root and smbd / nmbd are not running - fall
back to listening on any port , which means replies from
some windows versions won ' t be seen */
2006-01-10 01:12:53 +03:00
status = socket_listen ( dgmsock - > sock , socket_address , 0 , 0 ) ;
2005-04-08 09:34:13 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-01-10 01:12:53 +03:00
talloc_free ( socket_address ) ;
socket_address = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
myaddress , 0 ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , socket_address ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
socket_listen ( dgmsock - > sock , socket_address , 0 , 0 ) ;
2005-04-08 09:34:13 +04:00
}
2005-04-06 15:17:08 +04:00
/* setup a temporary mailslot listener for replies */
2005-04-08 12:57:09 +04:00
dgmslot = dgram_mailslot_temp ( dgmsock , NBT_MAILSLOT_GETDC ,
2005-04-08 09:46:00 +04:00
netlogon_handler , & replies ) ;
2005-04-06 15:17:08 +04:00
ZERO_STRUCT ( logon ) ;
logon . command = NETLOGON_QUERY_FOR_PDC ;
logon . req . pdc . computer_name = TEST_NAME ;
logon . req . pdc . mailslot_name = dgmslot - > mailslot_name ;
logon . req . pdc . unicode_name = TEST_NAME ;
logon . req . pdc . nt_version = 1 ;
logon . req . pdc . lmnt_token = 0xFFFF ;
logon . req . pdc . lm20_token = 0xFFFF ;
2005-05-22 14:23:01 +04:00
make_nbt_name_client ( & myname , TEST_NAME ) ;
2005-04-06 15:17:08 +04:00
2006-01-10 01:12:53 +03:00
dest = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
address , 0 ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , dest ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
status = dgram_mailslot_netlogon_send ( dgmsock , & name , dest ,
2005-10-14 16:22:15 +04:00
& myname , & logon ) ;
2006-10-16 17:06:41 +04:00
torture_assert_ntstatus_ok ( tctx , status , " Failed to send netlogon request " ) ;
2005-04-06 15:17:08 +04:00
2005-04-08 09:46:00 +04:00
while ( timeval_elapsed ( & tv ) < 5 & & replies = = 0 ) {
2005-04-06 15:17:08 +04:00
event_loop_once ( dgmsock - > event_ctx ) ;
}
2006-10-16 17:06:41 +04:00
return true ;
2005-04-06 15:17:08 +04:00
}
2005-04-14 06:36:30 +04:00
/* test UDP/138 netlogon requests */
2006-10-16 17:06:41 +04:00
static bool nbt_test_netlogon2 ( struct torture_context * tctx )
2005-04-14 06:36:30 +04:00
{
struct dgram_mailslot_handler * dgmslot ;
2006-10-16 17:06:41 +04:00
struct nbt_dgram_socket * dgmsock = nbt_dgram_socket_init ( tctx , NULL ) ;
2006-01-10 01:12:53 +03:00
struct socket_address * dest ;
2006-10-16 17:06:41 +04:00
const char * myaddress ;
2005-04-14 06:36:30 +04:00
struct nbt_netlogon_packet logon ;
struct nbt_name myname ;
NTSTATUS status ;
struct timeval tv = timeval_current ( ) ;
int replies = 0 ;
2006-01-10 01:12:53 +03:00
struct socket_address * socket_address ;
2006-10-16 17:06:41 +04:00
const char * address ;
struct nbt_name name ;
name . name = lp_workgroup ( ) ;
name . type = NBT_NAME_LOGON ;
name . scope = NULL ;
/* do an initial name resolution to find its IP */
torture_assert_ntstatus_ok ( tctx ,
2006-11-13 22:08:11 +03:00
resolve_name ( & name , tctx , & address , event_context_find ( tctx ) ) ,
talloc_asprintf ( tctx , " Failed to resolve %s " , name . name ) ) ;
2006-10-16 17:06:41 +04:00
myaddress = talloc_strdup ( dgmsock , iface_best_ip ( address ) ) ;
2006-01-10 01:12:53 +03:00
socket_address = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
myaddress , lp_dgram_port ( ) ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , socket_address ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
2005-04-14 06:36:30 +04:00
/* try receiving replies on port 138 first, which will only
work if we are root and smbd / nmbd are not running - fall
back to listening on any port , which means replies from
some windows versions won ' t be seen */
2006-01-10 01:12:53 +03:00
status = socket_listen ( dgmsock - > sock , socket_address , 0 , 0 ) ;
2005-04-14 06:36:30 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-01-10 01:12:53 +03:00
talloc_free ( socket_address ) ;
socket_address = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
myaddress , 0 ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , socket_address ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
socket_listen ( dgmsock - > sock , socket_address , 0 , 0 ) ;
2005-04-14 06:36:30 +04:00
}
/* setup a temporary mailslot listener for replies */
dgmslot = dgram_mailslot_temp ( dgmsock , NBT_MAILSLOT_GETDC ,
netlogon_handler , & replies ) ;
ZERO_STRUCT ( logon ) ;
logon . command = NETLOGON_QUERY_FOR_PDC2 ;
logon . req . pdc2 . request_count = 0 ;
logon . req . pdc2 . computer_name = TEST_NAME ;
logon . req . pdc2 . user_name = " " ;
logon . req . pdc2 . mailslot_name = dgmslot - > mailslot_name ;
logon . req . pdc2 . nt_version = 11 ;
logon . req . pdc2 . lmnt_token = 0xFFFF ;
logon . req . pdc2 . lm20_token = 0xFFFF ;
2005-05-22 14:23:01 +04:00
make_nbt_name_client ( & myname , TEST_NAME ) ;
2005-04-14 06:36:30 +04:00
2006-01-10 01:12:53 +03:00
dest = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
address , 0 ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , dest ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
status = dgram_mailslot_netlogon_send ( dgmsock , & name , dest ,
2005-10-14 16:22:15 +04:00
& myname , & logon ) ;
2006-10-16 17:06:41 +04:00
torture_assert_ntstatus_ok ( tctx , status , " Failed to send netlogon request " ) ;
2005-04-14 06:36:30 +04:00
while ( timeval_elapsed ( & tv ) < 5 & & replies = = 0 ) {
event_loop_once ( dgmsock - > event_ctx ) ;
}
2006-10-16 17:06:41 +04:00
return true ;
2005-04-14 06:36:30 +04:00
}
2005-04-13 09:07:04 +04:00
/*
reply handler for ntlogon request
*/
static void ntlogon_handler ( struct dgram_mailslot_handler * dgmslot ,
struct nbt_dgram_packet * packet ,
2006-01-10 01:12:53 +03:00
struct socket_address * src )
2005-04-13 09:07:04 +04:00
{
NTSTATUS status ;
struct nbt_ntlogon_packet ntlogon ;
2007-09-07 19:08:14 +04:00
int * replies = ( int * ) dgmslot - > private ;
2005-04-13 09:07:04 +04:00
2005-10-14 16:22:15 +04:00
printf ( " ntlogon reply from %s:%d \n " , src - > addr , src - > port ) ;
2005-04-13 09:07:04 +04:00
status = dgram_mailslot_ntlogon_parse ( dgmslot , dgmslot , packet , & ntlogon ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Failed to parse ntlogon packet from %s:%d \n " ,
2005-10-14 16:22:15 +04:00
src - > addr , src - > port ) ;
2005-04-13 09:07:04 +04:00
return ;
}
NDR_PRINT_DEBUG ( nbt_ntlogon_packet , & ntlogon ) ;
( * replies ) + + ;
}
/* test UDP/138 ntlogon requests */
2006-10-16 17:06:41 +04:00
static bool nbt_test_ntlogon ( struct torture_context * tctx )
2005-04-13 09:07:04 +04:00
{
struct dgram_mailslot_handler * dgmslot ;
2006-10-16 17:06:41 +04:00
struct nbt_dgram_socket * dgmsock = nbt_dgram_socket_init ( tctx , NULL ) ;
2006-01-10 01:12:53 +03:00
struct socket_address * dest ;
struct test_join * join_ctx ;
struct cli_credentials * machine_credentials ;
2006-02-13 03:02:31 +03:00
const struct dom_sid * dom_sid ;
2006-01-10 01:12:53 +03:00
2006-10-16 17:06:41 +04:00
const char * myaddress ;
2005-04-13 09:07:04 +04:00
struct nbt_ntlogon_packet logon ;
struct nbt_name myname ;
NTSTATUS status ;
struct timeval tv = timeval_current ( ) ;
int replies = 0 ;
2006-01-10 01:12:53 +03:00
struct socket_address * socket_address ;
2006-10-16 17:06:41 +04:00
const char * address ;
struct nbt_name name ;
name . name = lp_workgroup ( ) ;
name . type = NBT_NAME_LOGON ;
name . scope = NULL ;
/* do an initial name resolution to find its IP */
torture_assert_ntstatus_ok ( tctx ,
2006-11-13 22:08:11 +03:00
resolve_name ( & name , tctx , & address , event_context_find ( tctx ) ) ,
talloc_asprintf ( tctx , " Failed to resolve %s " , name . name ) ) ;
2006-10-16 17:06:41 +04:00
myaddress = talloc_strdup ( dgmsock , iface_best_ip ( address ) ) ;
2006-01-10 01:12:53 +03:00
socket_address = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
myaddress , lp_dgram_port ( ) ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , socket_address ! = NULL , " Error getting address " ) ;
2005-04-13 09:07:04 +04:00
/* try receiving replies on port 138 first, which will only
work if we are root and smbd / nmbd are not running - fall
back to listening on any port , which means replies from
some windows versions won ' t be seen */
2006-01-10 01:12:53 +03:00
status = socket_listen ( dgmsock - > sock , socket_address , 0 , 0 ) ;
2005-04-13 09:07:04 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-01-10 01:12:53 +03:00
talloc_free ( socket_address ) ;
socket_address = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
myaddress , 0 ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , socket_address ! = NULL , " Error getting address " ) ;
2006-01-10 01:12:53 +03:00
socket_listen ( dgmsock - > sock , socket_address , 0 , 0 ) ;
}
join_ctx = torture_join_domain ( TEST_NAME ,
ACB_WSTRUST , & machine_credentials ) ;
2006-11-13 22:08:11 +03:00
torture_assert ( tctx , join_ctx ! = NULL ,
talloc_asprintf ( tctx , " Failed to join domain %s as %s \n " ,
lp_workgroup ( ) , TEST_NAME ) ) ;
2005-04-13 09:07:04 +04:00
2006-01-10 01:12:53 +03:00
dom_sid = torture_join_sid ( join_ctx ) ;
2005-04-13 09:07:04 +04:00
/* setup a temporary mailslot listener for replies */
dgmslot = dgram_mailslot_temp ( dgmsock , NBT_MAILSLOT_GETDC ,
ntlogon_handler , & replies ) ;
ZERO_STRUCT ( logon ) ;
logon . command = NTLOGON_SAM_LOGON ;
logon . req . logon . request_count = 0 ;
logon . req . logon . computer_name = TEST_NAME ;
logon . req . logon . user_name = TEST_NAME " $ " ;
logon . req . logon . mailslot_name = dgmslot - > mailslot_name ;
logon . req . logon . acct_control = ACB_WSTRUST ;
2006-02-13 03:02:31 +03:00
logon . req . logon . sid = * dom_sid ;
2005-04-13 09:07:04 +04:00
logon . req . logon . nt_version = 1 ;
logon . req . logon . lmnt_token = 0xFFFF ;
logon . req . logon . lm20_token = 0xFFFF ;
2005-05-22 14:23:01 +04:00
make_nbt_name_client ( & myname , TEST_NAME ) ;
2005-04-13 09:07:04 +04:00
2006-01-10 01:12:53 +03:00
dest = socket_address_from_strings ( dgmsock , dgmsock - > sock - > backend_name ,
address , 0 ) ;
2006-10-16 17:06:41 +04:00
torture_assert ( tctx , dest ! = NULL , " Error getting address " ) ;
2005-10-14 18:02:47 +04:00
status = dgram_mailslot_ntlogon_send ( dgmsock , DGRAM_DIRECT_UNIQUE ,
2006-01-10 01:12:53 +03:00
& name , dest , & myname , & logon ) ;
2006-10-16 17:06:41 +04:00
torture_assert_ntstatus_ok ( tctx , status , " Failed to send ntlogon request " ) ;
2005-04-13 09:07:04 +04:00
while ( timeval_elapsed ( & tv ) < 5 & & replies = = 0 ) {
event_loop_once ( dgmsock - > event_ctx ) ;
}
torture_leave_domain ( join_ctx ) ;
2006-10-16 17:06:41 +04:00
return true ;
2005-04-13 09:07:04 +04:00
}
2005-04-06 15:17:08 +04:00
/*
test nbt dgram operations
*/
2007-09-07 20:27:57 +04:00
struct torture_suite * torture_nbt_dgram ( TALLOC_CTX * mem_ctx )
2005-04-06 15:17:08 +04:00
{
2007-09-07 21:59:53 +04:00
struct torture_suite * suite = torture_suite_create ( mem_ctx , " DGRAM " ) ;
2005-04-06 15:17:08 +04:00
2006-10-16 17:06:41 +04:00
torture_suite_add_simple_test ( suite , " netlogon " , nbt_test_netlogon ) ;
torture_suite_add_simple_test ( suite , " netlogon2 " , nbt_test_netlogon2 ) ;
torture_suite_add_simple_test ( suite , " ntlogon " , nbt_test_ntlogon ) ;
2005-04-06 15:17:08 +04:00
2006-10-16 17:06:41 +04:00
return suite ;
2005-04-06 15:17:08 +04:00
}