mirror of
https://github.com/samba-team/samba.git
synced 2025-02-09 09:57:48 +03:00
s4:torture: add smb2.session.reauth6 : test failing reauth
This attempts reauth with invalid creds, hence triggering the error path in the reauth code. This invalidates the session and subsequente requests on that connection fail. https://bugzilla.samba.org/show_bug.cgi?id=10208 Signed-off-by: Michael Adam <obnox@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Tue Oct 15 22:50:27 CEST 2013 on sn-devel-104
This commit is contained in:
parent
f643961343
commit
f50b6da7d5
@ -856,6 +856,108 @@ done:
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* do reauth with wrong credentials,
|
||||||
|
* hence triggering the error path in reauth.
|
||||||
|
* The invalid reauth deletes the session.
|
||||||
|
*/
|
||||||
|
bool test_session_reauth6(struct torture_context *tctx, struct smb2_tree *tree)
|
||||||
|
{
|
||||||
|
NTSTATUS status;
|
||||||
|
TALLOC_CTX *mem_ctx = talloc_new(tctx);
|
||||||
|
char fname[256];
|
||||||
|
struct smb2_handle _h1;
|
||||||
|
struct smb2_handle *h1 = NULL;
|
||||||
|
struct smb2_create io1;
|
||||||
|
bool ret = true;
|
||||||
|
char *corrupted_password;
|
||||||
|
struct cli_credentials *broken_creds;
|
||||||
|
bool ok;
|
||||||
|
bool encrypted;
|
||||||
|
NTSTATUS expected;
|
||||||
|
enum credentials_use_kerberos krb_state;
|
||||||
|
|
||||||
|
krb_state = cli_credentials_get_kerberos_state(cmdline_credentials);
|
||||||
|
if (krb_state == CRED_MUST_USE_KERBEROS) {
|
||||||
|
torture_skip(tctx,
|
||||||
|
"Can't test failing session setup with kerberos.");
|
||||||
|
}
|
||||||
|
|
||||||
|
encrypted = smb2cli_tcon_is_encryption_on(tree->smbXcli);
|
||||||
|
|
||||||
|
/* Add some random component to the file name. */
|
||||||
|
snprintf(fname, 256, "session_reauth1_%s.dat",
|
||||||
|
generate_random_str(tctx, 8));
|
||||||
|
|
||||||
|
smb2_util_unlink(tree, fname);
|
||||||
|
|
||||||
|
smb2_oplock_create_share(&io1, fname,
|
||||||
|
smb2_util_share_access(""),
|
||||||
|
smb2_util_oplock_level("b"));
|
||||||
|
io1.in.create_options |= NTCREATEX_OPTIONS_DELETE_ON_CLOSE;
|
||||||
|
|
||||||
|
status = smb2_create(tree, mem_ctx, &io1);
|
||||||
|
CHECK_STATUS(status, NT_STATUS_OK);
|
||||||
|
_h1 = io1.out.file.handle;
|
||||||
|
h1 = &_h1;
|
||||||
|
CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
|
||||||
|
CHECK_VAL(io1.out.oplock_level, smb2_util_oplock_level("b"));
|
||||||
|
|
||||||
|
/*
|
||||||
|
* reauthentication with invalid credentials:
|
||||||
|
*/
|
||||||
|
|
||||||
|
broken_creds = cli_credentials_shallow_copy(mem_ctx,
|
||||||
|
cmdline_credentials);
|
||||||
|
torture_assert(tctx, (broken_creds != NULL), "talloc error");
|
||||||
|
|
||||||
|
corrupted_password = talloc_asprintf(mem_ctx, "%s%s",
|
||||||
|
cli_credentials_get_password(broken_creds),
|
||||||
|
"corrupt");
|
||||||
|
torture_assert(tctx, (corrupted_password != NULL), "talloc error");
|
||||||
|
|
||||||
|
ok = cli_credentials_set_password(broken_creds, corrupted_password,
|
||||||
|
CRED_SPECIFIED);
|
||||||
|
CHECK_VAL(ok, true);
|
||||||
|
|
||||||
|
status = smb2_session_setup_spnego(tree->session,
|
||||||
|
broken_creds,
|
||||||
|
0 /* previous_session_id */);
|
||||||
|
CHECK_STATUS(status, NT_STATUS_LOGON_FAILURE);
|
||||||
|
|
||||||
|
torture_comment(tctx, "did failed reauth\n");
|
||||||
|
/*
|
||||||
|
* now verify that the invalid session reauth has closed our session
|
||||||
|
*/
|
||||||
|
|
||||||
|
if (encrypted) {
|
||||||
|
expected = NT_STATUS_CONNECTION_DISCONNECTED;
|
||||||
|
} else {
|
||||||
|
expected = NT_STATUS_USER_SESSION_DELETED;
|
||||||
|
}
|
||||||
|
|
||||||
|
smb2_oplock_create_share(&io1, fname,
|
||||||
|
smb2_util_share_access(""),
|
||||||
|
smb2_util_oplock_level("b"));
|
||||||
|
|
||||||
|
status = smb2_create(tree, mem_ctx, &io1);
|
||||||
|
CHECK_STATUS(status, expected);
|
||||||
|
|
||||||
|
done:
|
||||||
|
if (h1 != NULL) {
|
||||||
|
smb2_util_close(tree, *h1);
|
||||||
|
}
|
||||||
|
|
||||||
|
smb2_util_unlink(tree, fname);
|
||||||
|
|
||||||
|
talloc_free(tree);
|
||||||
|
|
||||||
|
talloc_free(mem_ctx);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
static bool test_session_expire1(struct torture_context *tctx)
|
static bool test_session_expire1(struct torture_context *tctx)
|
||||||
{
|
{
|
||||||
NTSTATUS status;
|
NTSTATUS status;
|
||||||
@ -981,6 +1083,7 @@ struct torture_suite *torture_smb2_session_init(void)
|
|||||||
torture_suite_add_1smb2_test(suite, "reauth3", test_session_reauth3);
|
torture_suite_add_1smb2_test(suite, "reauth3", test_session_reauth3);
|
||||||
torture_suite_add_1smb2_test(suite, "reauth4", test_session_reauth4);
|
torture_suite_add_1smb2_test(suite, "reauth4", test_session_reauth4);
|
||||||
torture_suite_add_1smb2_test(suite, "reauth5", test_session_reauth5);
|
torture_suite_add_1smb2_test(suite, "reauth5", test_session_reauth5);
|
||||||
|
torture_suite_add_1smb2_test(suite, "reauth6", test_session_reauth6);
|
||||||
torture_suite_add_simple_test(suite, "expire1", test_session_expire1);
|
torture_suite_add_simple_test(suite, "expire1", test_session_expire1);
|
||||||
|
|
||||||
suite->description = talloc_strdup(suite, "SMB2-SESSION tests");
|
suite->description = talloc_strdup(suite, "SMB2-SESSION tests");
|
||||||
|
Loading…
x
Reference in New Issue
Block a user