mirror of
https://github.com/samba-team/samba.git
synced 2024-12-24 21:34:56 +03:00
9ebc679e76
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14875 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Samuel Cabrero <scabrero@samba.org>
7515 lines
352 KiB
Python
Executable File
7515 lines
352 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# Unix SMB/CIFS implementation.
|
|
# Copyright (C) Stefan Metzmacher 2014,2015
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
import sys
|
|
import os
|
|
import time
|
|
|
|
sys.path.insert(0, "bin/python")
|
|
os.environ["PYTHONUNBUFFERED"] = "1"
|
|
|
|
import samba.dcerpc.dcerpc as dcerpc
|
|
import samba.dcerpc.base as base
|
|
import samba.dcerpc.misc as misc
|
|
import samba.dcerpc.epmapper
|
|
import samba.dcerpc.mgmt
|
|
import samba.dcerpc.netlogon
|
|
import samba.dcerpc.lsa
|
|
import struct
|
|
from samba import gensec
|
|
from samba.tests.dcerpc.raw_testcase import RawDCERPCTest
|
|
from samba.ntstatus import (
|
|
NT_STATUS_SUCCESS
|
|
)
|
|
|
|
global_ndr_print = False
|
|
global_hexdump = False
|
|
|
|
|
|
class TestDCERPC_BIND(RawDCERPCTest):
|
|
|
|
def setUp(self):
|
|
super(TestDCERPC_BIND, self).setUp()
|
|
self.do_ndr_print = global_ndr_print
|
|
self.do_hexdump = global_hexdump
|
|
|
|
def _test_no_auth_request_bind_pfc_flags(self, req_pfc_flags, rep_pfc_flags):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, pfc_flags=req_pfc_flags, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
pfc_flags=rep_pfc_flags, auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def _test_no_auth_request_alter_pfc_flags(self, req_pfc_flags, rep_pfc_flags):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# And now try a alter context
|
|
req = self.generate_alter(call_id=0, pfc_flags=req_pfc_flags, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
pfc_flags=rep_pfc_flags, auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertEqual(rep.u.secondary_address, "")
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_no_auth_request(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_00(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_FIRST(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_LAST(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_HDR_SIGNING(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN)
|
|
|
|
def test_no_auth_request_bind_pfc_08(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
8 |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_CONC_MPX(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_CONC_MPX |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_CONC_MPX)
|
|
|
|
def test_no_auth_request_bind_pfc_DID_NOT_EXECUTE(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_MAYBE(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_MAYBE |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_bind_pfc_OBJECT_UUID(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_OBJECT_UUID |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
# TODO: doesn't announce DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN
|
|
# without authentication
|
|
# TODO: doesn't announce DCERPC_PFC_FLAG_CONC_MPX
|
|
# by default
|
|
def _test_no_auth_request_bind_pfc_ff(self):
|
|
return self._test_no_auth_request_bind_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
0xff |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN |
|
|
dcerpc.DCERPC_PFC_FLAG_CONC_MPX)
|
|
|
|
def test_no_auth_request_alter_pfc_00(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_FIRST(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_LAST(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_HDR_SIGNING(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN)
|
|
|
|
def test_no_auth_request_alter_pfc_08(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
8 |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_CONC_MPX(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_CONC_MPX |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_DID_NOT_EXECUTE(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_MAYBE(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_MAYBE |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_OBJECT_UUID(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_OBJECT_UUID |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST)
|
|
|
|
def test_no_auth_request_alter_pfc_ff(self):
|
|
return self._test_no_auth_request_alter_pfc_flags(
|
|
req_pfc_flags=0 |
|
|
0xff |
|
|
0,
|
|
rep_pfc_flags=0 |
|
|
dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN)
|
|
|
|
def test_no_auth_no_ctx(self):
|
|
# send an useless bind
|
|
req = self.generate_bind(call_id=0)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
def test_invalid_auth_noctx(self):
|
|
req = self.generate_bind(call_id=0)
|
|
req.auth_length = dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_PROTOCOL_VERSION_NOT_SUPPORTED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
def test_no_auth_valid_valid_request(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# Send a bind again
|
|
tsf2_list = [ndr32]
|
|
ctx2 = dcerpc.ctx_list()
|
|
ctx2.context_id = 2
|
|
ctx2.num_transfer_syntaxes = len(tsf2_list)
|
|
ctx2.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx2.transfer_syntaxes = tsf2_list
|
|
|
|
req = self.generate_bind(call_id=1, ctx_list=[ctx2])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_no_auth_invalid_valid_request(self):
|
|
# send an useless bind
|
|
req = self.generate_bind(call_id=0)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_alter_no_auth_no_ctx(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# Send a alter
|
|
req = self.generate_alter(call_id=1, ctx_list=[])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_no_auth_presentation_ctx_valid1(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1_list = [zero_syntax, ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# Send a alter
|
|
req = self.generate_alter(call_id=1, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0xffff,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, ctx1.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_OP_RNG_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
def test_no_auth_presentation_ctx_invalid1(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = ndr32
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# Send a alter
|
|
req = self.generate_alter(call_id=1, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=2,
|
|
context_id=12345,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_UNKNOWN_IF)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# Send a alter again to prove the connection is still alive
|
|
req = self.generate_alter(call_id=3, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def test_no_auth_presentation_ctx_invalid2(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1a_list = []
|
|
ctx1a = dcerpc.ctx_list()
|
|
ctx1a.context_id = 1
|
|
ctx1a.num_transfer_syntaxes = len(tsf1a_list)
|
|
ctx1a.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1a.transfer_syntaxes = tsf1a_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1a])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_no_auth_presentation_ctx_invalid3(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1a_list = [zero_syntax, ndr32, ndr32, ndr32]
|
|
ctx1a = dcerpc.ctx_list()
|
|
ctx1a.context_id = 1
|
|
ctx1a.num_transfer_syntaxes = len(tsf1a_list)
|
|
ctx1a.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1a.transfer_syntaxes = tsf1a_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1a])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
tsf1b_list = []
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1b_list
|
|
|
|
# Send a alter
|
|
req = self.generate_alter(call_id=1, ctx_list=[ctx1b])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_no_auth_presentation_ctx_invalid4(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1a_list = [zero_syntax, ndr32, ndr32, ndr32]
|
|
ctx1a = dcerpc.ctx_list()
|
|
ctx1a.context_id = 1
|
|
ctx1a.num_transfer_syntaxes = len(tsf1a_list)
|
|
ctx1a.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1a.transfer_syntaxes = tsf1a_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1a])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# With a known but wrong syntax we get a protocol error
|
|
# see test_no_auth_presentation_ctx_valid2
|
|
tsf1b_list = [zero_syntax, samba.dcerpc.epmapper.abstract_syntax(), ndr64]
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1b_list
|
|
|
|
# Send a alter
|
|
req = self.generate_alter(call_id=1, ctx_list=[ctx1b])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_no_auth_presentation_ctx_valid2(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1a_list = [zero_syntax, ndr32, ndr32, ndr32]
|
|
ctx1a = dcerpc.ctx_list()
|
|
ctx1a.context_id = 1
|
|
ctx1a.num_transfer_syntaxes = len(tsf1a_list)
|
|
ctx1a.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1a.transfer_syntaxes = tsf1a_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1a])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# With a unknown but wrong syntaxes we get NO protocol error
|
|
# see test_no_auth_presentation_ctx_invalid4
|
|
tsf1b_list = [zero_syntax, samba.dcerpc.epmapper.abstract_syntax()]
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1b_list
|
|
|
|
# Send a alter
|
|
req = self.generate_alter(call_id=1, ctx_list=[ctx1b])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1a.context_id,
|
|
opnum=0xffff,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, ctx1a.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_OP_RNG_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
def test_no_auth_presentation_ctx_no_ndr64(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsfZ_list = [zero_syntax]
|
|
ctxZ = dcerpc.ctx_list()
|
|
ctxZ.context_id = 54321
|
|
ctxZ.num_transfer_syntaxes = len(tsfZ_list)
|
|
ctxZ.abstract_syntax = zero_syntax
|
|
ctxZ.transfer_syntaxes = tsfZ_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctxZ])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
tsf0_list = [ndr32]
|
|
ctx0 = dcerpc.ctx_list()
|
|
ctx0.context_id = 0
|
|
ctx0.num_transfer_syntaxes = len(tsf0_list)
|
|
ctx0.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx0.transfer_syntaxes = tsf0_list
|
|
|
|
req = self.generate_alter(call_id=0, ctx_list=[ctx0])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx0.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
tsf1_list = [zero_syntax, ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_alter(call_id=1, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
tsf2_list = [ndr32, ndr32]
|
|
ctx2 = dcerpc.ctx_list()
|
|
ctx2.context_id = 2
|
|
ctx2.num_transfer_syntaxes = len(tsf2_list)
|
|
ctx2.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx2.transfer_syntaxes = tsf2_list
|
|
|
|
req = self.generate_alter(call_id=2, ctx_list=[ctx2])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx2.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
tsf3_list = [ndr32]
|
|
ctx3 = dcerpc.ctx_list()
|
|
ctx3.context_id = 3
|
|
ctx3.num_transfer_syntaxes = len(tsf3_list)
|
|
ctx3.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx3.transfer_syntaxes = tsf3_list
|
|
|
|
tsf4_list = [ndr32]
|
|
ctx4 = dcerpc.ctx_list()
|
|
ctx4.context_id = 4
|
|
ctx4.num_transfer_syntaxes = len(tsf4_list)
|
|
ctx4.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx4.transfer_syntaxes = tsf4_list
|
|
|
|
req = self.generate_alter(call_id=34, ctx_list=[ctx3, ctx4])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 2)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.ctx_list[1].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[1].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[1].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx3.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_alter(call_id=43, ctx_list=[ctx4, ctx3])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 2)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.ctx_list[1].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[1].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[1].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx4.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx3.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_alter(call_id=44, ctx_list=[ctx4, ctx4])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 2)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.ctx_list[1].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[1].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[1].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx4.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx3.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
tsf5mgmt_list = [ndr32]
|
|
ctx5mgmt = dcerpc.ctx_list()
|
|
ctx5mgmt.context_id = 5
|
|
ctx5mgmt.num_transfer_syntaxes = len(tsf5mgmt_list)
|
|
ctx5mgmt.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx5mgmt.transfer_syntaxes = tsf5mgmt_list
|
|
|
|
tsf5epm_list = [ndr32]
|
|
ctx5epm = dcerpc.ctx_list()
|
|
ctx5epm.context_id = 5
|
|
ctx5epm.num_transfer_syntaxes = len(tsf5epm_list)
|
|
ctx5epm.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx5epm.transfer_syntaxes = tsf5epm_list
|
|
|
|
req = self.generate_alter(call_id=55, ctx_list=[ctx5mgmt, ctx5epm])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 2)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.ctx_list[1].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[1].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[1].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx5mgmt.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_alter(call_id=55, ctx_list=[ctx5mgmt, ctx5epm])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 2)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.ctx_list[1].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[1].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[1].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx5mgmt.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_no_auth_bind_time_none_simple(self):
|
|
features = 0
|
|
btf = base.bind_time_features_syntax(features)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1_list = [btf]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = zero_syntax
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_NEGOTIATE_ACK)
|
|
self.assertEqual(rep.u.ctx_list[0].reason, features)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def test_no_auth_bind_time_none_ignore_additional(self):
|
|
features1 = 0
|
|
btf1 = base.bind_time_features_syntax(features1)
|
|
|
|
features2 = dcerpc.DCERPC_BIND_TIME_KEEP_CONNECTION_ON_ORPHAN
|
|
features2 |= dcerpc.DCERPC_BIND_TIME_SECURITY_CONTEXT_MULTIPLEXING
|
|
btf2 = base.bind_time_features_syntax(features2)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [btf1, btf2, zero_syntax]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = ndr64
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_NEGOTIATE_ACK)
|
|
self.assertEqual(rep.u.ctx_list[0].reason, features1)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def test_no_auth_bind_time_only_first(self):
|
|
features1 = dcerpc.DCERPC_BIND_TIME_KEEP_CONNECTION_ON_ORPHAN
|
|
btf1 = base.bind_time_features_syntax(features1)
|
|
|
|
features2 = dcerpc.DCERPC_BIND_TIME_SECURITY_CONTEXT_MULTIPLEXING
|
|
btf2 = base.bind_time_features_syntax(features2)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1_list = [zero_syntax, btf1, btf2, zero_syntax]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = zero_syntax
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_PROVIDER_REJECTION)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def test_no_auth_bind_time_twice(self):
|
|
features1 = dcerpc.DCERPC_BIND_TIME_KEEP_CONNECTION_ON_ORPHAN
|
|
btf1 = base.bind_time_features_syntax(features1)
|
|
|
|
features2 = dcerpc.DCERPC_BIND_TIME_SECURITY_CONTEXT_MULTIPLEXING
|
|
btf2 = base.bind_time_features_syntax(features2)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1_list = [btf1]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = zero_syntax
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
tsf2_list = [btf2]
|
|
ctx2 = dcerpc.ctx_list()
|
|
ctx2.context_id = 2
|
|
ctx2.num_transfer_syntaxes = len(tsf2_list)
|
|
ctx2.abstract_syntax = zero_syntax
|
|
ctx2.transfer_syntaxes = tsf2_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1, ctx2])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_no_auth_bind_time_keep_on_orphan_simple(self):
|
|
features = dcerpc.DCERPC_BIND_TIME_KEEP_CONNECTION_ON_ORPHAN
|
|
btf = base.bind_time_features_syntax(features)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
|
|
tsf1_list = [btf]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = zero_syntax
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_NEGOTIATE_ACK)
|
|
self.assertEqual(rep.u.ctx_list[0].reason, features)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def test_no_auth_bind_time_keep_on_orphan_ignore_additional(self):
|
|
features1 = dcerpc.DCERPC_BIND_TIME_KEEP_CONNECTION_ON_ORPHAN
|
|
btf1 = base.bind_time_features_syntax(features1)
|
|
|
|
features2 = dcerpc.DCERPC_BIND_TIME_SECURITY_CONTEXT_MULTIPLEXING
|
|
btf2 = base.bind_time_features_syntax(features2)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [btf1, btf2, zero_syntax]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = ndr64
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_NEGOTIATE_ACK)
|
|
self.assertEqual(rep.u.ctx_list[0].reason, features1)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def test_no_auth_bind_time_sec_ctx_ignore_additional(self):
|
|
features1 = dcerpc.DCERPC_BIND_TIME_SECURITY_CONTEXT_MULTIPLEXING
|
|
btf1 = base.bind_time_features_syntax(features1)
|
|
|
|
features2 = dcerpc.DCERPC_BIND_TIME_KEEP_CONNECTION_ON_ORPHAN
|
|
btf2 = base.bind_time_features_syntax(features2)
|
|
|
|
zero_syntax = misc.ndr_syntax_id()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [btf1, btf2, zero_syntax]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = ndr64
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0, ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_NEGOTIATE_ACK)
|
|
self.assertEqual(rep.u.ctx_list[0].reason, features1)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, zero_syntax)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
def _test_auth_type_level_bind_nak(self, auth_type, auth_level, creds=None,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_INVALID_AUTH_TYPE):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
auth_context_id = 0
|
|
|
|
if creds is not None:
|
|
# We always start with DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context = self.get_auth_context_creds(creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
from_server = b""
|
|
(finished, to_server) = auth_context["gensec"].update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_context["auth_type"],
|
|
auth_level=auth_context["auth_level"],
|
|
auth_context_id=auth_context["auth_context_id"],
|
|
auth_blob=to_server)
|
|
else:
|
|
to_server = b"none"
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason, reason)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertPadding(rep.u._pad, 3)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def _test_auth_none_level_bind(self, auth_level,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_INVALID_AUTH_TYPE):
|
|
return self._test_auth_type_level_bind_nak(auth_type=dcerpc.DCERPC_AUTH_LEVEL_NONE,
|
|
auth_level=auth_level, reason=reason)
|
|
|
|
def test_auth_none_none_bind(self):
|
|
return self._test_auth_none_level_bind(dcerpc.DCERPC_AUTH_LEVEL_NONE,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_auth_none_connect_bind(self):
|
|
return self._test_auth_none_level_bind(dcerpc.DCERPC_AUTH_LEVEL_CONNECT)
|
|
|
|
def test_auth_none_call_bind(self):
|
|
return self._test_auth_none_level_bind(dcerpc.DCERPC_AUTH_LEVEL_CALL)
|
|
|
|
def test_auth_none_packet_bind(self):
|
|
return self._test_auth_none_level_bind(dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_auth_none_integrity_bind(self):
|
|
return self._test_auth_none_level_bind(dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def test_auth_none_privacy_bind(self):
|
|
return self._test_auth_none_level_bind(dcerpc.DCERPC_AUTH_LEVEL_PRIVACY)
|
|
|
|
def test_auth_none_0_bind(self):
|
|
return self._test_auth_none_level_bind(0,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_auth_none_7_bind(self):
|
|
return self._test_auth_none_level_bind(7,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_auth_none_255_bind(self):
|
|
return self._test_auth_none_level_bind(255,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def _test_auth_none_level_request(self, auth_level):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NONE
|
|
auth_context_id = 0
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(len(rep.u.auth_info), 0)
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"none")
|
|
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_auth_none_none_request(self):
|
|
return self._test_auth_none_level_request(dcerpc.DCERPC_AUTH_LEVEL_NONE)
|
|
|
|
def test_auth_none_connect_request(self):
|
|
return self._test_auth_none_level_request(dcerpc.DCERPC_AUTH_LEVEL_CONNECT)
|
|
|
|
def test_auth_none_call_request(self):
|
|
return self._test_auth_none_level_request(dcerpc.DCERPC_AUTH_LEVEL_CALL)
|
|
|
|
def test_auth_none_packet_request(self):
|
|
return self._test_auth_none_level_request(dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastSame2(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_FAULT_SEC_PKG_ERROR
|
|
auth_context_2nd = 2
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastNext2(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 2
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastSame111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = None
|
|
auth_context_2nd = 1
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastNext111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 1
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_lastNext111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 1
|
|
expected_call_id = 4
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastSameNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_lastSameNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = None
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastNextNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_lastNextNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = 4
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = 4
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastSameNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_lastSameNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_lastNextNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_lastNextNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = 4
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_last(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def _test_generic_auth_first_2nd(self,
|
|
auth_type,
|
|
pfc_flags_2nd,
|
|
expected_fault,
|
|
auth_context_2nd=2,
|
|
skip_first=False,
|
|
expected_call_id=None,
|
|
expected_context_id=None,
|
|
conc_mpx=False,
|
|
not_executed=False,
|
|
forced_call_id=None,
|
|
forced_context_id=None,
|
|
forced_opnum=None,
|
|
forced_auth_context_id=None,
|
|
forced_auth_type=None,
|
|
forced_auth_level=None):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id1=1
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_PACKET
|
|
auth_context_id2=2
|
|
|
|
creds = self.get_user_creds()
|
|
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
|
|
bind_pfc_flags = dcerpc.DCERPC_PFC_FLAG_FIRST | dcerpc.DCERPC_PFC_FLAG_LAST
|
|
if conc_mpx:
|
|
bind_pfc_flags |= dcerpc.DCERPC_PFC_FLAG_CONC_MPX
|
|
|
|
ack0 = self.do_generic_bind(call_id=0,
|
|
ctx=ctx,
|
|
pfc_flags=bind_pfc_flags)
|
|
|
|
ack1 = self.do_generic_bind(call_id=1,
|
|
ctx=ctx,
|
|
auth_context=auth_context1,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
if auth_context_2nd == 2:
|
|
ack2 = self.do_generic_bind(call_id=2,
|
|
ctx=ctx,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
ndr_print = self.do_ndr_print
|
|
hexdump = self.do_hexdump
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
io = inq_if_ids
|
|
if ndr_print:
|
|
sys.stderr.write("in: %s" % samba.ndr.ndr_print_in(io))
|
|
stub_in = samba.ndr.ndr_pack_in(io)
|
|
stub_in += b'\xfe'*45 # add some padding in order to have some payload
|
|
if hexdump:
|
|
sys.stderr.write("stub_in: %d\n%s" % (len(stub_in), self.hexdump(stub_in)))
|
|
|
|
call_id = 3
|
|
context_id = ctx.context_id
|
|
opnum = io.opnum()
|
|
|
|
if not skip_first:
|
|
pfc_flags = samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST
|
|
stub_in_tmp = stub_in[0:16]
|
|
req = self.generate_request_auth(call_id=call_id,
|
|
context_id=context_id,
|
|
pfc_flags=pfc_flags,
|
|
opnum=opnum,
|
|
alloc_hint=len(stub_in),
|
|
stub=stub_in_tmp,
|
|
auth_context=auth_context1)
|
|
self.send_pdu(req, ndr_print=ndr_print, hexdump=hexdump)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# context_id, opnum and auth header values are completely ignored
|
|
if auth_context_2nd == 1:
|
|
auth_context_copy = auth_context1.copy()
|
|
elif auth_context_2nd == 2:
|
|
auth_context_copy = auth_context2.copy()
|
|
else:
|
|
auth_context_copy = None
|
|
|
|
expected_pfc_flags = dcerpc.DCERPC_PFC_FLAG_FIRST | dcerpc.DCERPC_PFC_FLAG_LAST
|
|
if expected_context_id is None:
|
|
expected_context_id = context_id
|
|
if expected_call_id is None:
|
|
expected_call_id = call_id
|
|
if not_executed:
|
|
expected_pfc_flags |= dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE
|
|
|
|
if forced_call_id is not None:
|
|
call_id = forced_call_id
|
|
if forced_context_id is not None:
|
|
context_id = forced_context_id
|
|
if forced_opnum is not None:
|
|
opnum = forced_opnum
|
|
if forced_auth_context_id is not None:
|
|
auth_context_copy["auth_context_id"] = forced_auth_context_id
|
|
if forced_auth_type is not None:
|
|
auth_context_copy["auth_type"] = forced_auth_type
|
|
if forced_auth_level is not None:
|
|
auth_context_copy["auth_level"] = forced_auth_level
|
|
|
|
pfc_flags = samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST
|
|
stub_in_tmp = stub_in[16:-1]
|
|
req = self.generate_request_auth(call_id=call_id,
|
|
context_id=context_id,
|
|
pfc_flags=pfc_flags_2nd,
|
|
opnum=opnum,
|
|
alloc_hint=len(stub_in_tmp),
|
|
stub=stub_in_tmp,
|
|
auth_context=auth_context_copy)
|
|
self.send_pdu(req, ndr_print=ndr_print, hexdump=hexdump)
|
|
if expected_fault is None:
|
|
self.do_single_request(call_id=3, ctx=ctx, io=io, send_req=False, auth_context=auth_context1)
|
|
return
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, expected_call_id,
|
|
pfc_flags=expected_pfc_flags,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, expected_context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, expected_fault)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
if not_executed:
|
|
# still alive
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
return
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def _test_generic_auth_first_last(self,
|
|
auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=2,
|
|
expected_call_id=None,
|
|
expected_context_id=None,
|
|
conc_mpx=False,
|
|
not_executed=False,
|
|
forced_call_id=None,
|
|
forced_context_id=None,
|
|
forced_opnum=None,
|
|
forced_auth_context_id=None,
|
|
forced_auth_type=None,
|
|
forced_auth_level=None):
|
|
pfc_flags_2nd = samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_LAST
|
|
return self._test_generic_auth_first_2nd(auth_type,
|
|
pfc_flags_2nd,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def _test_generic_auth_first_first(self,
|
|
auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=2,
|
|
expected_call_id=None,
|
|
expected_context_id=None,
|
|
conc_mpx=False,
|
|
not_executed=False,
|
|
forced_call_id=None,
|
|
forced_context_id=None,
|
|
forced_opnum=None,
|
|
forced_auth_context_id=None,
|
|
forced_auth_type=None,
|
|
forced_auth_level=None):
|
|
pfc_flags_2nd = samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST
|
|
return self._test_generic_auth_first_2nd(auth_type,
|
|
pfc_flags_2nd,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstSame2(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_FAULT_SEC_PKG_ERROR
|
|
auth_context_2nd = 2
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstNext2(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 2
|
|
expected_call_id = 3
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstSame111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 1
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_firstSame111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 1
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstNext111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 1
|
|
expected_call_id = 3
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_firstNext111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = 1
|
|
expected_call_id = 4
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstSameNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_firstSameNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = None
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstNextNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_firstNextNone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = 4
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = 4
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstSameNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_firstSameNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = None
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_first1_firstNextNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = None
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_multi_auth_MPX_first1_firstNextNone111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
auth_context_2nd = None
|
|
expected_call_id = 4
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_call_id = 4
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_first_first(auth_type,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def _test_generic_auth_middle(self,
|
|
auth_type,
|
|
expected_fault,
|
|
expected_context_id=None,
|
|
not_executed=False,
|
|
conc_mpx=False,
|
|
forced_context_id=None,
|
|
forced_opnum=None,
|
|
forced_auth_context_id=None,
|
|
forced_auth_type=None,
|
|
forced_auth_level=None):
|
|
auth_context_2nd = 1
|
|
skip_first = True
|
|
pfc_flags_2nd = 0
|
|
expected_call_id = None
|
|
forced_call_id = None
|
|
return self._test_generic_auth_first_2nd(auth_type,
|
|
pfc_flags_2nd,
|
|
expected_fault,
|
|
auth_context_2nd=auth_context_2nd,
|
|
skip_first=skip_first,
|
|
expected_call_id=expected_call_id,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_call_id=forced_call_id,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_middle_alone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_MPX_middle_alone(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_middle_all_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_MPX_middle_all_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_UNKNOWN_IF
|
|
expected_context_id = 0
|
|
not_executed = True
|
|
conc_mpx = True
|
|
forced_context_id = 111
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_middle_auth_all_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_context_id = None
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_MPX_middle_auth_all_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_FAULT_ACCESS_DENIED
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_context_id = None
|
|
forced_opnum = 111
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = 111
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_middle_auth_context_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_MPX_middle_auth_context_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_FAULT_ACCESS_DENIED
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = 111
|
|
forced_auth_type = None
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_middle_auth_type_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = 111
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_MPX_middle_auth_type_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_FAULT_ACCESS_DENIED
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = 111
|
|
forced_auth_level = None
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_middle_auth_level_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
expected_context_id = 0
|
|
not_executed = False
|
|
conc_mpx = False
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def test_ntlmssp_auth_MPX_middle_auth_level_111(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
expected_fault = dcerpc.DCERPC_FAULT_ACCESS_DENIED
|
|
expected_context_id = None
|
|
not_executed = False
|
|
conc_mpx = True
|
|
forced_context_id = None
|
|
forced_opnum = None
|
|
forced_auth_context_id = None
|
|
forced_auth_type = None
|
|
forced_auth_level = 111
|
|
return self._test_generic_auth_middle(auth_type,
|
|
expected_fault,
|
|
expected_context_id=expected_context_id,
|
|
not_executed=not_executed,
|
|
conc_mpx=conc_mpx,
|
|
forced_context_id=forced_context_id,
|
|
forced_opnum=forced_opnum,
|
|
forced_auth_context_id=forced_auth_context_id,
|
|
forced_auth_type=forced_auth_type,
|
|
forced_auth_level=forced_auth_level)
|
|
|
|
def _test_neg_xmit_check_values(self,
|
|
req_xmit=None,
|
|
req_recv=None,
|
|
rep_both=None,
|
|
alter_xmit=None,
|
|
alter_recv=None):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
max_xmit_frag=req_xmit,
|
|
max_recv_frag=req_recv,
|
|
ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, rep_both)
|
|
self.assertEqual(rep.u.max_recv_frag, rep_both)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
assoc_group_id = rep.u.assoc_group_id
|
|
if alter_xmit is None:
|
|
alter_xmit = rep_both - 8
|
|
if alter_recv is None:
|
|
alter_recv = rep_both - 8
|
|
|
|
# max_{xmit,recv}_frag and assoc_group_id are completely
|
|
# ignored in alter_context requests
|
|
req = self.generate_alter(call_id=1,
|
|
max_xmit_frag=alter_xmit,
|
|
max_recv_frag=alter_recv,
|
|
assoc_group_id=0xffffffff - rep.u.assoc_group_id,
|
|
ctx_list=[ctx1])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, rep_both)
|
|
self.assertEqual(rep.u.max_recv_frag, rep_both)
|
|
self.assertEqual(rep.u.assoc_group_id, rep.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
chunk_size = rep_both - dcerpc.DCERPC_REQUEST_LENGTH
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
alloc_hint=0xffffffff,
|
|
stub=b"\00" * chunk_size)
|
|
self.send_pdu(req, ndr_print=True, hexdump=True)
|
|
rep = self.recv_pdu(ndr_print=True, hexdump=True)
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
chunk_size = 5840 - dcerpc.DCERPC_REQUEST_LENGTH
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
alloc_hint=0xffffffff,
|
|
stub=b"\00" * chunk_size)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
chunk_size += 1
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
alloc_hint=0xffffffff,
|
|
stub=b"\00" * chunk_size)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_neg_xmit_ffff_ffff(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=0xffff,
|
|
req_recv=0xffff,
|
|
rep_both=5840)
|
|
|
|
def test_neg_xmit_0_ffff(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=0,
|
|
req_recv=0xffff,
|
|
rep_both=2048,
|
|
alter_xmit=0xffff,
|
|
alter_recv=0xffff)
|
|
|
|
def test_neg_xmit_ffff_0(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=0xffff,
|
|
req_recv=0,
|
|
rep_both=2048)
|
|
|
|
def test_neg_xmit_0_0(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=0,
|
|
req_recv=0,
|
|
rep_both=2048,
|
|
alter_xmit=0xffff,
|
|
alter_recv=0xffff)
|
|
|
|
def test_neg_xmit_3199_0(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=3199,
|
|
req_recv=0,
|
|
rep_both=2048)
|
|
|
|
def test_neg_xmit_0_3199(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=0,
|
|
req_recv=3199,
|
|
rep_both=2048)
|
|
|
|
def test_neg_xmit_3199_ffff(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=3199,
|
|
req_recv=0xffff,
|
|
rep_both=3192)
|
|
|
|
def test_neg_xmit_ffff_3199(self):
|
|
return self._test_neg_xmit_check_values(req_xmit=0xffff,
|
|
req_recv=3199,
|
|
rep_both=3192)
|
|
|
|
def test_alloc_hint(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx = dcerpc.ctx_list()
|
|
ctx.context_id = 0
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertEqual(rep.u.auth_info, b'\0' * 0)
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
alloc_hint=0xffffffff,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx.context_id,
|
|
opnum=1,
|
|
alloc_hint=0xffffffff,
|
|
stub=b"\04\00\00\00\00\00\00\00")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
req = self.generate_request(call_id=4,
|
|
context_id=ctx.context_id,
|
|
opnum=1,
|
|
alloc_hint=1,
|
|
stub=b"\04\00\00\00\00\00\00\00")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def _get_netlogon_ctx(self):
|
|
abstract = samba.dcerpc.netlogon.abstract_syntax()
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
(ctx, ack) = self.prepare_presentation(abstract, ndr32, context_id=0,
|
|
epmap=True, return_ack=True)
|
|
|
|
server = '\\\\' + self.target_hostname
|
|
if isinstance(server, bytes):
|
|
server_utf16 = server.decode('utf-8').encode('utf-16-le')
|
|
else:
|
|
server_utf16 = server.encode('utf-16-le')
|
|
computer = 'UNKNOWNCOMPUTER'
|
|
if isinstance(server, bytes):
|
|
computer_utf16 = computer.decode('utf-8').encode('utf-16-le')
|
|
else:
|
|
computer_utf16 = computer.encode('utf-16-le')
|
|
|
|
real_stub = struct.pack('<IIII', 0x00200000,
|
|
len(server) + 1, 0, len(server) + 1)
|
|
real_stub += server_utf16 + b'\x00\x00'
|
|
mod_len = len(real_stub) % 4
|
|
if mod_len != 0:
|
|
real_stub += b'\x00' * (4 - mod_len)
|
|
real_stub += struct.pack('<III',
|
|
len(computer) + 1, 0, len(computer) + 1)
|
|
real_stub += computer_utf16 + b'\x00\x00'
|
|
real_stub += b'\x11\x22\x33\x44\x55\x66\x77\x88'
|
|
|
|
return (ctx, ack, real_stub)
|
|
|
|
def _test_fragmented_requests(self, remaining=None, alloc_hint=None,
|
|
fault_first=None, fault_last=None):
|
|
(ctx, rep, real_stub) = self._get_netlogon_ctx()
|
|
|
|
chunk = rep.u.max_recv_frag - dcerpc.DCERPC_REQUEST_LENGTH
|
|
|
|
total = 0
|
|
first = True
|
|
while remaining > 0:
|
|
thistime = min(remaining, chunk)
|
|
remaining -= thistime
|
|
total += thistime
|
|
|
|
pfc_flags = 0
|
|
if first:
|
|
pfc_flags |= dcerpc.DCERPC_PFC_FLAG_FIRST
|
|
first = False
|
|
stub = real_stub + b'\x00' * (thistime - len(real_stub))
|
|
else:
|
|
stub = b"\x00" * thistime
|
|
|
|
if remaining == 0:
|
|
pfc_flags |= dcerpc.DCERPC_PFC_FLAG_LAST
|
|
|
|
# And now try a request without auth_info
|
|
# netr_ServerReqChallenge()
|
|
req = self.generate_request(call_id=0x21234,
|
|
pfc_flags=pfc_flags,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
alloc_hint=alloc_hint,
|
|
stub=stub)
|
|
if alloc_hint >= thistime:
|
|
alloc_hint -= thistime
|
|
else:
|
|
alloc_hint = 0
|
|
self.send_pdu(req, hexdump=False)
|
|
if fault_first is not None:
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, fault_first)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
if remaining == 0:
|
|
break
|
|
if total >= 0x400000 and fault_last is not None:
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, fault_last)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
if total >= 0x400000 and fault_last is not None:
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, fault_last)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
self.assertEqual(len(rep.u.stub_and_verifier), 12)
|
|
status = struct.unpack_from("<I", rep.u.stub_and_verifier, len(rep.u.stub_and_verifier) - 4)
|
|
self.assertEqual(status[0], 0)
|
|
|
|
def test_fragmented_requests01(self):
|
|
return self._test_fragmented_requests(remaining=0x400000,
|
|
alloc_hint=0x400000)
|
|
|
|
def test_fragmented_requests02(self):
|
|
return self._test_fragmented_requests(remaining=0x400000,
|
|
alloc_hint=0x100000)
|
|
|
|
def test_fragmented_requests03(self):
|
|
return self._test_fragmented_requests(remaining=0x400000,
|
|
alloc_hint=0)
|
|
|
|
def test_fragmented_requests04(self):
|
|
return self._test_fragmented_requests(remaining=0x400000,
|
|
alloc_hint=0x400001,
|
|
fault_first=dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
|
|
def test_fragmented_requests05(self):
|
|
return self._test_fragmented_requests(remaining=0x500001,
|
|
alloc_hint=0,
|
|
fault_last=dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
|
|
def _test_same_requests(self, pfc_flags, fault_1st=False, fault_2nd=False):
|
|
(ctx, rep, real_stub) = self._get_netlogon_ctx()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=pfc_flags,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
if fault_1st:
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# netr_ServerReqChallenge without DCERPC_PFC_FLAG_LAST
|
|
# with the same call_id
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=pfc_flags,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
if fault_2nd:
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
def test_first_only_requests(self):
|
|
return self._test_same_requests(pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
fault_2nd=True)
|
|
|
|
def test_none_only_requests(self):
|
|
return self._test_same_requests(pfc_flags=0, fault_1st=True)
|
|
|
|
def test_last_only_requests(self):
|
|
return self._test_same_requests(pfc_flags=dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
fault_1st=True)
|
|
|
|
def test_first_maybe_requests(self):
|
|
return self._test_same_requests(pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_MAYBE,
|
|
fault_2nd=True)
|
|
|
|
def test_first_didnot_requests(self):
|
|
return self._test_same_requests(pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
fault_2nd=True)
|
|
|
|
def test_first_cmpx_requests(self):
|
|
return self._test_same_requests(pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_CONC_MPX,
|
|
fault_2nd=True)
|
|
|
|
def test_first_08_requests(self):
|
|
return self._test_same_requests(pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
0x08,
|
|
fault_2nd=True)
|
|
|
|
def test_first_cancel_requests(self):
|
|
(ctx, rep, real_stub) = self._get_netlogon_ctx()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_PENDING_CANCEL,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_NO_CALL_ACTIVE)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_2nd_cancel_requests(self):
|
|
(ctx, rep, real_stub) = self._get_netlogon_ctx()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_PENDING_CANCEL,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
self.assertEqual(len(rep.u.stub_and_verifier), 12)
|
|
status = struct.unpack_from("<I", rep.u.stub_and_verifier, len(rep.u.stub_and_verifier) - 4)
|
|
self.assertEqual(status[0], 0)
|
|
|
|
def test_last_cancel_requests(self):
|
|
(ctx, rep, real_stub) = self._get_netlogon_ctx()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub[:4])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=2,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_PENDING_CANCEL,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub[4:])
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
self.assertEqual(len(rep.u.stub_and_verifier), 12)
|
|
status = struct.unpack_from("<I", rep.u.stub_and_verifier, len(rep.u.stub_and_verifier) - 4)
|
|
self.assertEqual(status[0], 0)
|
|
|
|
def test_mix_requests(self):
|
|
(ctx, rep, real_stub) = self._get_netlogon_ctx()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=50,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# netr_ServerReqChallenge with given flags
|
|
req = self.generate_request(call_id=51,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=4,
|
|
stub=real_stub)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, 50,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
def test_co_cancel_no_request(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx = self.prepare_presentation(abstract, ndr32, context_id=0xff)
|
|
|
|
req = self.generate_co_cancel(call_id=3)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_co_cancel_request_after_first(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx = self.prepare_presentation(abstract, ndr32, context_id=0xff)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_co_cancel(call_id=1)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_orphaned_no_request(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx = self.prepare_presentation(abstract, ndr32)
|
|
|
|
req = self.generate_orphaned(call_id=3)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_orphaned_request_after_first_last(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx = self.prepare_presentation(abstract, ndr32)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_orphaned(call_id=1)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_orphaned_request_after_first_mpx_last(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
|
|
pfc_flags = samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST
|
|
pfc_flags |= samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_LAST
|
|
pfc_flags |= samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_CONC_MPX
|
|
ctx = self.prepare_presentation(abstract, ndr32, pfc_flags=pfc_flags)
|
|
|
|
req = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_orphaned(call_id=1)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_LAST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# And now try a request
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
def test_orphaned_request_after_first_no_last(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx = self.prepare_presentation(abstract, ndr32)
|
|
|
|
req1 = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req1)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_orphaned(call_id=1)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# And now try a new request
|
|
req2 = self.generate_request(call_id=2,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req2)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req1.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req1.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_orphaned_request_after_first_mpx_no_last(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
|
|
pfc_flags = samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST
|
|
pfc_flags |= samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_LAST
|
|
pfc_flags |= samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_CONC_MPX
|
|
ctx = self.prepare_presentation(abstract, ndr32,
|
|
pfc_flags=pfc_flags)
|
|
|
|
req1 = self.generate_request(call_id=1,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST,
|
|
context_id=ctx.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req1)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
req = self.generate_orphaned(call_id=1)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.1)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# And now try a new request
|
|
req2 = self.generate_request(call_id=2,
|
|
context_id=ctx.context_id - 1,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req2)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req2.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def _test_spnego_connect_upgrade_request(self, upgrade_auth_level):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" +b"\x00" *15)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We don't get an auth_info back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a request with auth_info upgrade_auth_level
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=upgrade_auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=4,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_connect_packet_upgrade(self):
|
|
return self._test_spnego_connect_upgrade_request(
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_spnego_connect_integrity_upgrade(self):
|
|
return self._test_spnego_connect_upgrade_request(
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def _test_spnego_connect_downgrade_request(self, initial_auth_level):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = initial_auth_level
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_packet_downgrade_connect(self):
|
|
return self._test_spnego_connect_downgrade_request(
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_spnego_integrity_downgrade_connect(self):
|
|
return self._test_spnego_connect_upgrade_request(
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def test_spnego_unfinished_request(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
assoc_group_id = rep.u.assoc_group_id
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=1,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_auth3(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_auth3(call_id=0,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_connect_reauth_alter(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We don't get an auth_info back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a reauth
|
|
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_connect_reauth_auth3(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We don't get an auth_info back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a reauth
|
|
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_auth3(call_id=0,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We get a fault
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_change_auth_level(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx1],
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_change_abstract(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.epmapper.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1_list
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx1],
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1b],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_change_transfer(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
tsf1b_list = [ndr32, ndr64]
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1b_list
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx1],
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
# We change ctx_list and auth_level
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1b],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_change_auth_type1(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx1],
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
# We change ctx_list and auth_level
|
|
auth_info = self.generate_auth(auth_type=dcerpc.DCERPC_AUTH_TYPE_KRB5,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_SEC_PKG_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_change_auth_type2(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
tsf1b_list = [ndr32, ndr64]
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1b_list
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx1],
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
# We change ctx_list and auth_level
|
|
auth_info = self.generate_auth(auth_type=dcerpc.DCERPC_AUTH_TYPE_KRB5,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1b],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_change_auth_type3(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
ndr64 = base.transfer_syntax_ndr64()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
tsf1b_list = [ndr32, ndr64]
|
|
ctx1b = dcerpc.ctx_list()
|
|
ctx1b.context_id = 1
|
|
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
|
|
ctx1b.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1b.transfer_syntaxes = tsf1b_list
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=[ctx1],
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
# We change ctx_list and auth_level
|
|
auth_info = self.generate_auth(auth_type=dcerpc.DCERPC_AUTH_TYPE_NONE,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=[ctx1b],
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_FAULT_ACCESS_DENIED)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_auth_pad_ok(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_ok,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_ok,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 0)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We don't get an auth_info back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
self._disconnect("disconnect")
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_auth_pad_fail_bind(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
auth_pad_bad = auth_pad_ok + 1
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_bad,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
|
|
auth_length=0)
|
|
self.assertEqual(rep.u.reject_reason,
|
|
dcerpc.DCERPC_BIND_NAK_REASON_PROTOCOL_VERSION_NOT_SUPPORTED)
|
|
self.assertEqual(rep.u.num_versions, 1)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers, req.rpc_vers)
|
|
self.assertEqual(rep.u.versions[0].rpc_vers_minor, req.rpc_vers_minor)
|
|
self.assertEqual(len(rep.u._pad), 3)
|
|
self.assertEqual(rep.u._pad, b'\0' * 3)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_auth_pad_fail_alter(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_ok,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
auth_pad_bad = auth_pad_ok + 1
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_bad,
|
|
auth_blob=to_server)
|
|
req = self.generate_alter(call_id=0,
|
|
ctx_list=ctx_list,
|
|
assoc_group_id=rep.u.assoc_group_id,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_PROTO_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_ntlmssp_auth_pad_ok(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_ok,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
auth_pad_ok = 0
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_ok,
|
|
auth_blob=to_server)
|
|
req = self.generate_auth3(call_id=0,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu(timeout=0.01)
|
|
self.assertIsNone(rep)
|
|
self.assertIsConnected()
|
|
|
|
# And now try a request without auth_info
|
|
req = self.generate_request(call_id=2,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"")
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
# Now a request with auth_info DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=b"\x01" + b"\x00" * 15)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=b"",
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
# We don't get an auth_info back
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
|
|
self._disconnect("disconnect")
|
|
self.assertNotConnected()
|
|
|
|
def test_ntlmssp_auth_pad_fail_auth3(self):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
c = self.get_anon_creds()
|
|
g = gensec.Security.start_client(self.settings)
|
|
g.set_credentials(c)
|
|
g.want_feature(gensec.FEATURE_DCE_STYLE)
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id = 2
|
|
g.start_mech_by_authtype(auth_type, auth_level)
|
|
from_server = b""
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertFalse(finished)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
req_pdu = samba.ndr.ndr_pack(req)
|
|
|
|
auth_pad_ok = len(req_pdu)
|
|
auth_pad_ok -= dcerpc.DCERPC_REQUEST_LENGTH
|
|
auth_pad_ok -= dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
auth_pad_ok -= len(to_server)
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_ok,
|
|
auth_blob=to_server)
|
|
|
|
req = self.generate_bind(call_id=0,
|
|
ctx_list=ctx_list,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_ACK, req.call_id)
|
|
self.assertEqual(rep.u.max_xmit_frag, req.u.max_xmit_frag)
|
|
self.assertEqual(rep.u.max_recv_frag, req.u.max_recv_frag)
|
|
self.assertNotEqual(rep.u.assoc_group_id, req.u.assoc_group_id)
|
|
self.assertEqual(rep.u.secondary_address_size, 4)
|
|
self.assertEqual(rep.u.secondary_address, "%d" % self.tcp_port)
|
|
self.assertPadding(rep.u._pad1, 2)
|
|
self.assertEqual(rep.u.num_results, 1)
|
|
self.assertEqual(rep.u.ctx_list[0].result,
|
|
dcerpc.DCERPC_BIND_ACK_RESULT_ACCEPTANCE)
|
|
self.assertEqual(rep.u.ctx_list[0].reason,
|
|
dcerpc.DCERPC_BIND_ACK_REASON_NOT_SPECIFIED)
|
|
self.assertNDRSyntaxEquals(rep.u.ctx_list[0].syntax, ndr32)
|
|
self.assertNotEqual(len(rep.u.auth_info), 0)
|
|
a = self.parse_auth(rep.u.auth_info)
|
|
|
|
from_server = a.credentials
|
|
(finished, to_server) = g.update(from_server)
|
|
self.assertTrue(finished)
|
|
|
|
auth_pad_bad = 1
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
auth_pad_length=auth_pad_bad,
|
|
auth_blob=to_server)
|
|
req = self.generate_auth3(call_id=0,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, 0)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_FAULT_REMOTE_NO_MEMORY)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def _test_auth_bind_auth_level(self, auth_type, auth_level, auth_context_id, ctx,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
hdr_signing=False,
|
|
alter_fault=None):
|
|
creds = self.get_user_creds()
|
|
auth_context = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
g_auth_level=g_auth_level,
|
|
hdr_signing=hdr_signing)
|
|
if auth_context is None:
|
|
return None
|
|
ack = self.do_generic_bind(ctx=ctx,
|
|
auth_context=auth_context,
|
|
alter_fault=alter_fault)
|
|
if ack is None:
|
|
return None
|
|
return auth_context
|
|
|
|
def _test_spnego_level_bind_nak(self, auth_level,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_INVALID_CHECKSUM):
|
|
c = self.get_user_creds()
|
|
return self._test_auth_type_level_bind_nak(auth_type=dcerpc.DCERPC_AUTH_TYPE_SPNEGO,
|
|
auth_level=auth_level, creds=c, reason=reason)
|
|
|
|
def _test_spnego_level_bind(self, auth_level,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
alter_fault=None,
|
|
request_fault=None,
|
|
response_fault_flags=0):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 0x1001
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_context_id = 2
|
|
|
|
auth_context = self._test_auth_bind_auth_level(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
ctx=ctx1,
|
|
g_auth_level=g_auth_level,
|
|
alter_fault=alter_fault)
|
|
if request_fault is None:
|
|
return
|
|
|
|
self.assertIsNotNone(auth_context)
|
|
g = auth_context["gensec"]
|
|
self.assertIsNotNone(g)
|
|
|
|
stub_bin = b'\x00' * 17
|
|
mod_len = len(stub_bin) % dcerpc.DCERPC_AUTH_PAD_ALIGNMENT
|
|
auth_pad_length = 0
|
|
if mod_len > 0:
|
|
auth_pad_length = dcerpc.DCERPC_AUTH_PAD_ALIGNMENT - mod_len
|
|
stub_bin += b'\x00' * auth_pad_length
|
|
|
|
if g_auth_level >= dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY:
|
|
sig_size = g.sig_size(len(stub_bin))
|
|
else:
|
|
sig_size = 16
|
|
zero_sig = b"\x00" * sig_size
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=zero_sig)
|
|
req = self.generate_request(call_id=4,
|
|
context_id=ctx1.context_id,
|
|
opnum=0xffff,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
if g_auth_level >= dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY:
|
|
req_blob = samba.ndr.ndr_pack(req)
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = len(req_blob) - req.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
req_data = req_blob[ofs_stub:ofs_trailer]
|
|
req_whole = req_blob[0:ofs_sig]
|
|
sig = g.sign_packet(req_data, req_whole)
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=sig)
|
|
req = self.generate_request(call_id=4,
|
|
context_id=ctx1.context_id,
|
|
opnum=0xffff,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags | response_fault_flags,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, ctx1.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, request_fault)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
if response_fault_flags & dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE:
|
|
return
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_spnego_none_bind(self):
|
|
return self._test_spnego_level_bind_nak(dcerpc.DCERPC_AUTH_LEVEL_NONE,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_spnego_call_bind(self):
|
|
return self._test_spnego_level_bind_nak(dcerpc.DCERPC_AUTH_LEVEL_CALL,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_INVALID_CHECKSUM)
|
|
|
|
def test_spnego_0_bind(self):
|
|
return self._test_spnego_level_bind_nak(0,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_spnego_7_bind(self):
|
|
return self._test_spnego_level_bind_nak(7,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_spnego_255_bind(self):
|
|
return self._test_spnego_level_bind_nak(255,
|
|
reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
|
|
def test_spnego_connect_bind_none(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT)
|
|
|
|
def test_spnego_connect_bind_sign(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def test_spnego_connect_bind_seal(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY)
|
|
|
|
def test_spnego_packet_bind_none(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_PACKET,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
request_fault=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR)
|
|
|
|
def test_spnego_packet_bind_sign(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_PACKET,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
request_fault=dcerpc.DCERPC_NCA_S_OP_RNG_ERROR,
|
|
response_fault_flags=dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE)
|
|
|
|
def test_spnego_packet_bind_seal(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_PACKET,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
request_fault=dcerpc.DCERPC_NCA_S_OP_RNG_ERROR,
|
|
response_fault_flags=dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE)
|
|
|
|
def test_spnego_integrity_bind_none(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
request_fault=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR)
|
|
|
|
def test_spnego_integrity_bind_sign(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
request_fault=dcerpc.DCERPC_NCA_S_OP_RNG_ERROR,
|
|
response_fault_flags=dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE)
|
|
|
|
def test_spnego_integrity_bind_seal(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
request_fault=dcerpc.DCERPC_NCA_S_OP_RNG_ERROR,
|
|
response_fault_flags=dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE)
|
|
|
|
def test_spnego_privacy_bind_none(self):
|
|
# This fails...
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_CONNECT,
|
|
alter_fault=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR)
|
|
|
|
def test_spnego_privacy_bind_sign(self):
|
|
# This fails...
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
alter_fault=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR)
|
|
|
|
def test_spnego_privacy_bind_seal(self):
|
|
return self._test_spnego_level_bind(auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY,
|
|
g_auth_level=dcerpc.DCERPC_AUTH_LEVEL_PRIVACY)
|
|
|
|
def _test_auth_signing_auth_level_request(self, auth_type, auth_level, hdr_sign=False):
|
|
ndr32 = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [ndr32]
|
|
ctx1 = dcerpc.ctx_list()
|
|
ctx1.context_id = 0x1001
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
ctx_list = [ctx1]
|
|
|
|
auth_context_id = 2
|
|
|
|
auth_context = self._test_auth_bind_auth_level(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
hdr_signing=hdr_sign,
|
|
ctx=ctx1)
|
|
self.assertIsNotNone(auth_context)
|
|
g = auth_context["gensec"]
|
|
self.assertIsNotNone(g)
|
|
|
|
stub_bin = b'\x00' * 0
|
|
mod_len = len(stub_bin) % dcerpc.DCERPC_AUTH_PAD_ALIGNMENT
|
|
auth_pad_length = 0
|
|
if mod_len > 0:
|
|
auth_pad_length = dcerpc.DCERPC_AUTH_PAD_ALIGNMENT - mod_len
|
|
stub_bin += b'\x00' * auth_pad_length
|
|
|
|
sig_size = g.sig_size(len(stub_bin))
|
|
zero_sig = b"\x00" * sig_size
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=zero_sig)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
req_blob = samba.ndr.ndr_pack(req)
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = len(req_blob) - req.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
req_data = req_blob[ofs_stub:ofs_trailer]
|
|
req_whole = req_blob[0:ofs_sig]
|
|
sig = g.sign_packet(req_data, req_whole)
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=sig)
|
|
req = self.generate_request(call_id=3,
|
|
context_id=ctx1.context_id,
|
|
opnum=0,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
(rep, rep_blob) = self.recv_pdu_raw()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=sig_size)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
self.assertEqual(rep.auth_length, sig_size)
|
|
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = rep.frag_length - rep.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
rep_data = rep_blob[ofs_stub:ofs_trailer]
|
|
rep_whole = rep_blob[0:ofs_sig]
|
|
rep_sig = rep_blob[ofs_sig:]
|
|
rep_auth_info_blob = rep_blob[ofs_trailer:]
|
|
|
|
rep_auth_info = self.parse_auth(rep_auth_info_blob)
|
|
self.assertEqual(rep_auth_info.auth_type, auth_type)
|
|
self.assertEqual(rep_auth_info.auth_level, auth_level)
|
|
# mgmt_inq_if_ids() returns no fixed size results
|
|
#self.assertEqual(rep_auth_info.auth_pad_length, 0)
|
|
self.assertEqual(rep_auth_info.auth_reserved, 0)
|
|
self.assertEqual(rep_auth_info.auth_context_id, auth_context_id)
|
|
self.assertEqual(rep_auth_info.credentials, rep_sig)
|
|
|
|
g.check_packet(rep_data, rep_whole, rep_sig)
|
|
|
|
stub_bin = b'\x00' * 17
|
|
mod_len = len(stub_bin) % dcerpc.DCERPC_AUTH_PAD_ALIGNMENT
|
|
auth_pad_length = 0
|
|
if mod_len > 0:
|
|
auth_pad_length = dcerpc.DCERPC_AUTH_PAD_ALIGNMENT - mod_len
|
|
stub_bin += b'\x00' * auth_pad_length
|
|
|
|
sig_size = g.sig_size(len(stub_bin))
|
|
zero_sig = b"\x00" * sig_size
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=zero_sig)
|
|
req = self.generate_request(call_id=4,
|
|
context_id=ctx1.context_id,
|
|
opnum=0xffff,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
req_blob = samba.ndr.ndr_pack(req)
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = len(req_blob) - req.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
req_data = req_blob[ofs_stub:ofs_trailer]
|
|
req_whole = req_blob[0:ofs_sig]
|
|
sig = g.sign_packet(req_data, req_whole)
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=sig)
|
|
req = self.generate_request(call_id=4,
|
|
context_id=ctx1.context_id,
|
|
opnum=0xffff,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
rep = self.recv_pdu()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_FAULT, req.call_id,
|
|
pfc_flags=req.pfc_flags |
|
|
dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE,
|
|
auth_length=0)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, ctx1.context_id)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertEqual(rep.u.flags, 0)
|
|
self.assertEqual(rep.u.status, dcerpc.DCERPC_NCA_S_OP_RNG_ERROR)
|
|
self.assertEqual(rep.u.reserved, 0)
|
|
self.assertEqual(len(rep.u.error_and_verifier), 0)
|
|
|
|
stub_bin = b'\x00' * 8
|
|
mod_len = len(stub_bin) % dcerpc.DCERPC_AUTH_PAD_ALIGNMENT
|
|
auth_pad_length = 0
|
|
if mod_len > 0:
|
|
auth_pad_length = dcerpc.DCERPC_AUTH_PAD_ALIGNMENT - mod_len
|
|
stub_bin += b'\x00' * auth_pad_length
|
|
|
|
sig_size = g.sig_size(len(stub_bin))
|
|
zero_sig = b"\x00" * sig_size
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=zero_sig)
|
|
req = self.generate_request(call_id=5,
|
|
context_id=ctx1.context_id,
|
|
opnum=1,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
req_blob = samba.ndr.ndr_pack(req)
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = len(req_blob) - req.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
req_data = req_blob[ofs_stub:ofs_trailer]
|
|
req_whole = req_blob[0:ofs_sig]
|
|
sig = g.sign_packet(req_data, req_whole)
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=sig)
|
|
req = self.generate_request(call_id=5,
|
|
context_id=ctx1.context_id,
|
|
opnum=1,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
(rep, rep_blob) = self.recv_pdu_raw()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=sig_size)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
self.assertEqual(rep.auth_length, sig_size)
|
|
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = rep.frag_length - rep.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
rep_data = rep_blob[ofs_stub:ofs_trailer]
|
|
rep_whole = rep_blob[0:ofs_sig]
|
|
rep_sig = rep_blob[ofs_sig:]
|
|
rep_auth_info_blob = rep_blob[ofs_trailer:]
|
|
|
|
rep_auth_info = self.parse_auth(rep_auth_info_blob)
|
|
self.assertEqual(rep_auth_info.auth_type, auth_type)
|
|
self.assertEqual(rep_auth_info.auth_level, auth_level)
|
|
self.assertEqual(rep_auth_info.auth_pad_length, 4)
|
|
self.assertEqual(rep_auth_info.auth_reserved, 0)
|
|
self.assertEqual(rep_auth_info.auth_context_id, auth_context_id)
|
|
self.assertEqual(rep_auth_info.credentials, rep_sig)
|
|
|
|
g.check_packet(rep_data, rep_whole, rep_sig)
|
|
|
|
stub_bin = b'\x00' * 8
|
|
mod_len = len(stub_bin) % dcerpc.DCERPC_AUTH_PAD_ALIGNMENT
|
|
auth_pad_length = 0
|
|
if mod_len > 0:
|
|
auth_pad_length = dcerpc.DCERPC_AUTH_PAD_ALIGNMENT - mod_len
|
|
stub_bin += b'\x00' * auth_pad_length
|
|
|
|
sig_size = g.sig_size(len(stub_bin))
|
|
zero_sig = b"\x00" * sig_size
|
|
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=zero_sig)
|
|
req = self.generate_request(call_id=6,
|
|
context_id=ctx1.context_id,
|
|
opnum=3,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
req_blob = samba.ndr.ndr_pack(req)
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = len(req_blob) - req.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
req_data = req_blob[ofs_stub:ofs_trailer]
|
|
req_whole = req_blob[0:ofs_sig]
|
|
sig = g.sign_packet(req_data, req_whole)
|
|
auth_info = self.generate_auth(auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_pad_length=auth_pad_length,
|
|
auth_context_id=auth_context_id,
|
|
auth_blob=sig)
|
|
req = self.generate_request(call_id=6,
|
|
context_id=ctx1.context_id,
|
|
opnum=3,
|
|
stub=stub_bin,
|
|
auth_info=auth_info)
|
|
self.send_pdu(req)
|
|
(rep, rep_blob) = self.recv_pdu_raw()
|
|
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
|
|
auth_length=sig_size)
|
|
self.assertNotEqual(rep.u.alloc_hint, 0)
|
|
self.assertEqual(rep.u.context_id, req.u.context_id & 0xff)
|
|
self.assertEqual(rep.u.cancel_count, 0)
|
|
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
|
|
self.assertEqual(rep.auth_length, sig_size)
|
|
|
|
ofs_stub = dcerpc.DCERPC_REQUEST_LENGTH
|
|
ofs_sig = rep.frag_length - rep.auth_length
|
|
ofs_trailer = ofs_sig - dcerpc.DCERPC_AUTH_TRAILER_LENGTH
|
|
rep_data = rep_blob[ofs_stub:ofs_trailer]
|
|
rep_whole = rep_blob[0:ofs_sig]
|
|
rep_sig = rep_blob[ofs_sig:]
|
|
rep_auth_info_blob = rep_blob[ofs_trailer:]
|
|
|
|
rep_auth_info = self.parse_auth(rep_auth_info_blob)
|
|
self.assertEqual(rep_auth_info.auth_type, auth_type)
|
|
self.assertEqual(rep_auth_info.auth_level, auth_level)
|
|
self.assertEqual(rep_auth_info.auth_pad_length, 12)
|
|
self.assertEqual(rep_auth_info.auth_reserved, 0)
|
|
self.assertEqual(rep_auth_info.auth_context_id, auth_context_id)
|
|
self.assertEqual(rep_auth_info.credentials, rep_sig)
|
|
|
|
g.check_packet(rep_data, rep_whole, rep_sig)
|
|
|
|
def test_spnego_signing_packet(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_SPNEGO,
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_spnego_hdr_signing_packet(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_SPNEGO,
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET,
|
|
hdr_sign=True)
|
|
|
|
def test_spnego_signing_integrity(self):
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_SPNEGO,
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def test_spnego_hdr_signing_integrity(self):
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_SPNEGO,
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
hdr_sign=True)
|
|
|
|
def test_ntlm_signing_packet(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_NTLMSSP,
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_ntlm_hdr_signing_packet(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_NTLMSSP,
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET,
|
|
hdr_sign=True)
|
|
|
|
def test_ntlm_signing_integrity(self):
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_NTLMSSP,
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def test_ntlm_hdr_signing_integrity(self):
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_NTLMSSP,
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
hdr_sign=True)
|
|
|
|
def test_krb5_signing_packet(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_KRB5,
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET)
|
|
|
|
def test_krb5_hdr_signing_packet(self):
|
|
# DCERPC_AUTH_LEVEL_PACKET is handled as alias of
|
|
# DCERPC_AUTH_LEVEL_INTEGRITY
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_KRB5,
|
|
dcerpc.DCERPC_AUTH_LEVEL_PACKET,
|
|
hdr_sign=True)
|
|
|
|
def test_krb5_signing_integrity(self):
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_KRB5,
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY)
|
|
|
|
def test_krb5_hdr_signing_integrity(self):
|
|
return self._test_auth_signing_auth_level_request(dcerpc.DCERPC_AUTH_TYPE_KRB5,
|
|
dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY,
|
|
hdr_sign=True)
|
|
|
|
def test_assoc_group_fail1(self):
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
ack = self.do_generic_bind(ctx=ctx, assoc_group_id=1,
|
|
nak_reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
return
|
|
|
|
def test_assoc_group_fail2(self):
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
ack = self.do_generic_bind(ctx=ctx)
|
|
|
|
self._disconnect("test_assoc_group_fail2")
|
|
self.assertNotConnected()
|
|
time.sleep(0.5)
|
|
self.connect()
|
|
|
|
ack2 = self.do_generic_bind(ctx=ctx, assoc_group_id=ack.u.assoc_group_id,
|
|
nak_reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
return
|
|
|
|
def test_assoc_group_diff1(self):
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
(ctx1, ack1) = self.prepare_presentation(abstract, transfer,
|
|
context_id=1, return_ack=True)
|
|
|
|
conn2 = self.second_connection()
|
|
(ctx2, ack2) = conn2.prepare_presentation(abstract, transfer,
|
|
context_id=2, return_ack=True)
|
|
self.assertNotEqual(ack2.u.assoc_group_id, ack1.u.assoc_group_id)
|
|
|
|
conn2._disconnect("End of Test")
|
|
return
|
|
|
|
def test_assoc_group_ok1(self):
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
(ctx1, ack1) = self.prepare_presentation(abstract, transfer,
|
|
context_id=1, return_ack=True)
|
|
|
|
conn2 = self.second_connection()
|
|
(ctx2, ack2) = conn2.prepare_presentation(abstract, transfer,
|
|
assoc_group_id=ack1.u.assoc_group_id,
|
|
context_id=2, return_ack=True)
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids)
|
|
conn2.do_single_request(call_id=1, ctx=ctx2, io=inq_if_ids)
|
|
|
|
conn2.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids,
|
|
fault_pfc_flags=(
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE),
|
|
fault_status=dcerpc.DCERPC_NCA_S_UNKNOWN_IF,
|
|
fault_context_id=0)
|
|
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids)
|
|
conn2.do_single_request(call_id=1, ctx=ctx2, io=inq_if_ids)
|
|
conn2._disconnect("End of Test")
|
|
return
|
|
|
|
def test_assoc_group_ok2(self):
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
self.reconnect_smb_pipe(primary_address='\\pipe\\lsarpc',
|
|
secondary_address='\\pipe\\lsass',
|
|
transport_creds=self.get_user_creds())
|
|
(ctx1, ack1) = self.prepare_presentation(abstract, transfer,
|
|
context_id=1, return_ack=True)
|
|
|
|
conn2 = self.second_connection()
|
|
(ctx2, ack2) = conn2.prepare_presentation(abstract, transfer,
|
|
assoc_group_id=ack1.u.assoc_group_id,
|
|
context_id=2, return_ack=True)
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids)
|
|
conn2.do_single_request(call_id=1, ctx=ctx2, io=inq_if_ids)
|
|
|
|
conn2.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids,
|
|
fault_pfc_flags=(
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE),
|
|
fault_status=dcerpc.DCERPC_NCA_S_UNKNOWN_IF,
|
|
fault_context_id=0)
|
|
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids)
|
|
conn2.do_single_request(call_id=1, ctx=ctx2, io=inq_if_ids)
|
|
conn2._disconnect("End of Test")
|
|
return
|
|
|
|
def test_assoc_group_fail3(self):
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
(ctx1, ack1) = self.prepare_presentation(abstract, transfer,
|
|
context_id=1, return_ack=True)
|
|
|
|
# assoc groups are per transport
|
|
connF = self.second_connection(primary_address="\\pipe\\lsarpc",
|
|
secondary_address="\\pipe\\lsass",
|
|
transport_creds=self.get_user_creds())
|
|
tsfF_list = [transfer]
|
|
ctxF = samba.dcerpc.dcerpc.ctx_list()
|
|
ctxF.context_id = 0xF
|
|
ctxF.num_transfer_syntaxes = len(tsfF_list)
|
|
ctxF.abstract_syntax = abstract
|
|
ctxF.transfer_syntaxes = tsfF_list
|
|
ack = connF.do_generic_bind(ctx=ctxF, assoc_group_id=ack1.u.assoc_group_id,
|
|
nak_reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
|
|
# wait for a disconnect
|
|
rep = connF.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
connF.assertNotConnected()
|
|
|
|
conn2 = self.second_connection()
|
|
(ctx2, ack2) = conn2.prepare_presentation(abstract, transfer,
|
|
assoc_group_id=ack1.u.assoc_group_id,
|
|
context_id=2, return_ack=True)
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids)
|
|
conn2.do_single_request(call_id=1, ctx=ctx2, io=inq_if_ids)
|
|
|
|
conn2.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids,
|
|
fault_pfc_flags=(
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
samba.dcerpc.dcerpc.DCERPC_PFC_FLAG_DID_NOT_EXECUTE),
|
|
fault_status=dcerpc.DCERPC_NCA_S_UNKNOWN_IF,
|
|
fault_context_id=0)
|
|
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=inq_if_ids)
|
|
conn2.do_single_request(call_id=1, ctx=ctx2, io=inq_if_ids)
|
|
conn2._disconnect("End of Test")
|
|
return
|
|
|
|
def _test_krb5_hdr_sign_delayed1(self, do_upgrade):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_KRB5
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 1
|
|
|
|
creds = self.get_user_creds()
|
|
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
hdr_signing=False)
|
|
|
|
ack = self.do_generic_bind(call_id=1,
|
|
ctx=ctx,
|
|
auth_context=auth_context)
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=2, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context)
|
|
|
|
#
|
|
# This is just an alter context without authentication
|
|
# But it can turn on header signing for the whole connection
|
|
#
|
|
ack2 = self.do_generic_bind(call_id=3, ctx=ctx,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN,
|
|
assoc_group_id = ack.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
self.assertFalse(auth_context['hdr_signing'])
|
|
if do_upgrade:
|
|
auth_context['hdr_signing'] = True
|
|
auth_context["gensec"].want_feature(gensec.FEATURE_SIGN_PKT_HEADER)
|
|
fault_status=None
|
|
else:
|
|
fault_status=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR
|
|
|
|
self.do_single_request(call_id=4, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context,
|
|
fault_status=fault_status)
|
|
|
|
if fault_status is not None:
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
|
|
self.do_single_request(call_id=5, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context)
|
|
return
|
|
|
|
def test_krb5_hdr_sign_delayed1_ok1(self):
|
|
return self._test_krb5_hdr_sign_delayed1(do_upgrade=True)
|
|
|
|
def test_krb5_hdr_sign_delayed1_fail1(self):
|
|
return self._test_krb5_hdr_sign_delayed1(do_upgrade=False)
|
|
|
|
def _test_krb5_hdr_sign_delayed2(self, do_upgrade):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_KRB5
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 1
|
|
|
|
creds = self.get_user_creds()
|
|
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
hdr_signing=False)
|
|
|
|
#
|
|
# SUPPORT_HEADER_SIGN on alter context activates header signing
|
|
#
|
|
ack = self.do_generic_bind(call_id=1,
|
|
ctx=ctx,
|
|
auth_context=auth_context,
|
|
pfc_flags_2nd=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN)
|
|
|
|
self.assertFalse(auth_context['hdr_signing'])
|
|
if do_upgrade:
|
|
auth_context['hdr_signing'] = True
|
|
auth_context["gensec"].want_feature(gensec.FEATURE_SIGN_PKT_HEADER)
|
|
fault_status=None
|
|
else:
|
|
fault_status=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=4, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context,
|
|
fault_status=fault_status)
|
|
|
|
if fault_status is not None:
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
|
|
self.do_single_request(call_id=5, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context)
|
|
return
|
|
|
|
def test_krb5_hdr_sign_delayed2_ok1(self):
|
|
return self._test_krb5_hdr_sign_delayed2(do_upgrade=True)
|
|
|
|
def test_krb5_hdr_sign_delayed2_fail1(self):
|
|
return self._test_krb5_hdr_sign_delayed2(do_upgrade=False)
|
|
|
|
def test_krb5_hdr_sign_delayed3_fail1(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_KRB5
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = 1
|
|
|
|
creds = self.get_user_creds()
|
|
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
hdr_signing=False)
|
|
|
|
#
|
|
# SUPPORT_HEADER_SIGN on auth3 doesn't activate header signing
|
|
#
|
|
ack = self.do_generic_bind(call_id=1,
|
|
ctx=ctx,
|
|
auth_context=auth_context,
|
|
pfc_flags_2nd=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN,
|
|
use_auth3=True)
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=2, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context)
|
|
|
|
self.assertFalse(auth_context['hdr_signing'])
|
|
auth_context['hdr_signing'] = True
|
|
auth_context["gensec"].want_feature(gensec.FEATURE_SIGN_PKT_HEADER)
|
|
fault_status=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR
|
|
|
|
self.do_single_request(call_id=4, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context,
|
|
fault_status=fault_status)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
|
|
def _test_lsa_multi_auth_connect1(self, smb_creds,
|
|
account_name0, authority_name0):
|
|
creds1 = self.get_anon_creds()
|
|
account_name1 = "ANONYMOUS LOGON"
|
|
authority_name1 = "NT AUTHORITY"
|
|
auth_type1 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id1 = 1
|
|
|
|
creds2 = self.get_user_creds()
|
|
account_name2 = creds2.get_username()
|
|
authority_name2 = creds2.get_domain()
|
|
auth_type2 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id2 = 2
|
|
|
|
abstract = samba.dcerpc.lsa.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
self.reconnect_smb_pipe(primary_address='\\pipe\\lsarpc',
|
|
secondary_address='\\pipe\\lsass',
|
|
transport_creds=smb_creds)
|
|
self.assertIsConnected()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx1 = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = abstract
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds1,
|
|
auth_type=auth_type1,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds2,
|
|
auth_type=auth_type2,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
|
|
get_user_name = samba.dcerpc.lsa.GetUserName()
|
|
get_user_name.in_system_name = self.target_hostname
|
|
get_user_name.in_account_name = None
|
|
get_user_name.in_authority_name = base.ndr_pointer(None)
|
|
|
|
ack1 = self.do_generic_bind(call_id=0,
|
|
ctx=ctx1,
|
|
auth_context=auth_context1)
|
|
|
|
#
|
|
# With just one explicit auth context and that
|
|
# uses AUTH_LEVEL_CONNECT context.
|
|
#
|
|
# We always get that by default instead of the one default one
|
|
# inherited from the transport
|
|
#
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=2, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
ack2 = self.do_generic_bind(call_id=3,
|
|
ctx=ctx1,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack1.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# Now we have two explicit auth contexts
|
|
#
|
|
# If we don't specify one of them we get the default one
|
|
# inherited from the transport
|
|
#
|
|
self.do_single_request(call_id=4, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
self.do_single_request(call_id=5, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=6, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context2)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
self.do_single_request(call_id=7, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
return
|
|
|
|
def test_lsa_multi_auth_connect1u(self):
|
|
smb_auth_creds = self.get_user_creds()
|
|
account_name0 = smb_auth_creds.get_username()
|
|
authority_name0 = smb_auth_creds.get_domain()
|
|
return self._test_lsa_multi_auth_connect1(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def test_lsa_multi_auth_connect1a(self):
|
|
smb_auth_creds = self.get_anon_creds()
|
|
account_name0 = "ANONYMOUS LOGON"
|
|
authority_name0 = "NT AUTHORITY"
|
|
return self._test_lsa_multi_auth_connect1(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def _test_lsa_multi_auth_connect2(self, smb_creds,
|
|
account_name0, authority_name0):
|
|
creds1 = self.get_anon_creds()
|
|
account_name1 = "ANONYMOUS LOGON"
|
|
authority_name1 = "NT AUTHORITY"
|
|
auth_type1 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id1 = 1
|
|
|
|
creds2 = self.get_user_creds()
|
|
account_name2 = creds2.get_username()
|
|
authority_name2 = creds2.get_domain()
|
|
auth_type2 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id2 = 2
|
|
|
|
abstract = samba.dcerpc.lsa.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
self.reconnect_smb_pipe(primary_address='\\pipe\\lsarpc',
|
|
secondary_address='\\pipe\\lsass',
|
|
transport_creds=smb_creds)
|
|
self.assertIsConnected()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx1 = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = abstract
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds1,
|
|
auth_type=auth_type1,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds2,
|
|
auth_type=auth_type2,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
|
|
get_user_name = samba.dcerpc.lsa.GetUserName()
|
|
get_user_name.in_system_name = self.target_hostname
|
|
get_user_name.in_account_name = None
|
|
get_user_name.in_authority_name = base.ndr_pointer(None)
|
|
|
|
ack0 = self.do_generic_bind(call_id=0, ctx=ctx1)
|
|
|
|
#
|
|
# We use the default auth context
|
|
# inherited from the transport
|
|
#
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
ack1 = self.do_generic_bind(call_id=2,
|
|
ctx=ctx1,
|
|
auth_context=auth_context1,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# With just one explicit auth context and that
|
|
# uses AUTH_LEVEL_CONNECT context.
|
|
#
|
|
# We always get that by default instead of the one default one
|
|
# inherited from the transport
|
|
#
|
|
self.do_single_request(call_id=3, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=4, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
ack2 = self.do_generic_bind(call_id=5,
|
|
ctx=ctx1,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# Now we have two explicit auth contexts
|
|
#
|
|
# If we don't specify one of them we get the default one
|
|
# inherited from the transport (again)
|
|
#
|
|
self.do_single_request(call_id=6, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
self.do_single_request(call_id=7, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=8, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context2)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
self.do_single_request(call_id=9, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
return
|
|
|
|
def test_lsa_multi_auth_connect2u(self):
|
|
smb_auth_creds = self.get_user_creds()
|
|
account_name0 = smb_auth_creds.get_username()
|
|
authority_name0 = smb_auth_creds.get_domain()
|
|
return self._test_lsa_multi_auth_connect2(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def test_lsa_multi_auth_connect2a(self):
|
|
smb_auth_creds = self.get_anon_creds()
|
|
account_name0 = "ANONYMOUS LOGON"
|
|
authority_name0 = "NT AUTHORITY"
|
|
return self._test_lsa_multi_auth_connect2(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def _test_lsa_multi_auth_connect3(self, smb_creds,
|
|
account_name0, authority_name0):
|
|
creds1 = self.get_anon_creds()
|
|
account_name1 = "ANONYMOUS LOGON"
|
|
authority_name1 = "NT AUTHORITY"
|
|
auth_type1 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id1 = 1
|
|
|
|
creds2 = self.get_user_creds()
|
|
account_name2 = creds2.get_username()
|
|
authority_name2 = creds2.get_domain()
|
|
auth_type2 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id2 = 2
|
|
|
|
abstract = samba.dcerpc.lsa.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
self.reconnect_smb_pipe(primary_address='\\pipe\\lsarpc',
|
|
secondary_address='\\pipe\\lsass',
|
|
transport_creds=smb_creds)
|
|
self.assertIsConnected()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx1 = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = abstract
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds1,
|
|
auth_type=auth_type1,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds2,
|
|
auth_type=auth_type2,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
|
|
get_user_name = samba.dcerpc.lsa.GetUserName()
|
|
get_user_name.in_system_name = self.target_hostname
|
|
get_user_name.in_account_name = None
|
|
get_user_name.in_authority_name = base.ndr_pointer(None)
|
|
|
|
ack0 = self.do_generic_bind(call_id=0, ctx=ctx1)
|
|
|
|
#
|
|
# We use the default auth context
|
|
# inherited from the transport
|
|
#
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
ack1 = self.do_generic_bind(call_id=2,
|
|
ctx=ctx1,
|
|
auth_context=auth_context1,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# With just one explicit auth context and that
|
|
# uses AUTH_LEVEL_CONNECT context.
|
|
#
|
|
# We always get that by default instead of the one default one
|
|
# inherited from the transport
|
|
#
|
|
# Until an explicit usage resets that mode
|
|
#
|
|
self.do_single_request(call_id=3, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=4, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=5, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=6, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
ack2 = self.do_generic_bind(call_id=7,
|
|
ctx=ctx1,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
#
|
|
# A new auth context won't change that mode again.
|
|
#
|
|
self.do_single_request(call_id=8, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
self.do_single_request(call_id=9, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=10, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context2)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
self.do_single_request(call_id=11, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
return
|
|
|
|
def test_lsa_multi_auth_connect3u(self):
|
|
smb_auth_creds = self.get_user_creds()
|
|
account_name0 = smb_auth_creds.get_username()
|
|
authority_name0 = smb_auth_creds.get_domain()
|
|
return self._test_lsa_multi_auth_connect3(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def test_lsa_multi_auth_connect3a(self):
|
|
smb_auth_creds = self.get_anon_creds()
|
|
account_name0 = "ANONYMOUS LOGON"
|
|
authority_name0 = "NT AUTHORITY"
|
|
return self._test_lsa_multi_auth_connect3(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def _test_lsa_multi_auth_connect4(self, smb_creds,
|
|
account_name0, authority_name0):
|
|
creds1 = self.get_anon_creds()
|
|
account_name1 = "ANONYMOUS LOGON"
|
|
authority_name1 = "NT AUTHORITY"
|
|
auth_type1 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id1 = 1
|
|
|
|
creds2 = self.get_user_creds()
|
|
account_name2 = creds2.get_username()
|
|
authority_name2 = creds2.get_domain()
|
|
auth_type2 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id2 = 2
|
|
|
|
creds3 = self.get_anon_creds()
|
|
account_name3 = "ANONYMOUS LOGON"
|
|
authority_name3 = "NT AUTHORITY"
|
|
auth_type3 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level3 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id3 = 3
|
|
|
|
creds4 = self.get_user_creds()
|
|
account_name4 = creds4.get_username()
|
|
authority_name4 = creds4.get_domain()
|
|
auth_type4 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level4 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id4 = 4
|
|
|
|
abstract = samba.dcerpc.lsa.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
self.reconnect_smb_pipe(primary_address='\\pipe\\lsarpc',
|
|
secondary_address='\\pipe\\lsass',
|
|
transport_creds=smb_creds)
|
|
self.assertIsConnected()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx1 = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = abstract
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds1,
|
|
auth_type=auth_type1,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds2,
|
|
auth_type=auth_type2,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
auth_context3 = self.get_auth_context_creds(creds=creds3,
|
|
auth_type=auth_type3,
|
|
auth_level=auth_level3,
|
|
auth_context_id=auth_context_id3,
|
|
hdr_signing=False)
|
|
auth_context4 = self.get_auth_context_creds(creds=creds4,
|
|
auth_type=auth_type4,
|
|
auth_level=auth_level4,
|
|
auth_context_id=auth_context_id4,
|
|
hdr_signing=False)
|
|
|
|
get_user_name = samba.dcerpc.lsa.GetUserName()
|
|
get_user_name.in_system_name = self.target_hostname
|
|
get_user_name.in_account_name = None
|
|
get_user_name.in_authority_name = base.ndr_pointer(None)
|
|
|
|
ack0 = self.do_generic_bind(call_id=0, ctx=ctx1)
|
|
|
|
#
|
|
# We use the default auth context
|
|
# inherited from the transport
|
|
#
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
ack1 = self.do_generic_bind(call_id=2,
|
|
ctx=ctx1,
|
|
auth_context=auth_context1,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# With just one explicit auth context and that
|
|
# uses AUTH_LEVEL_CONNECT context.
|
|
#
|
|
# We always get that by default instead of the one default one
|
|
# inherited from the transport
|
|
#
|
|
# Until a new explicit context resets the mode
|
|
#
|
|
self.do_single_request(call_id=3, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=4, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
ack2 = self.do_generic_bind(call_id=5,
|
|
ctx=ctx1,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# A new auth context with LEVEL_CONNECT resets the default.
|
|
#
|
|
self.do_single_request(call_id=6, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
self.do_single_request(call_id=7, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
ack3 = self.do_generic_bind(call_id=8,
|
|
ctx=ctx1,
|
|
auth_context=auth_context3,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# A new auth context with LEVEL_CONNECT resets the default.
|
|
#
|
|
self.do_single_request(call_id=9, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name3)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name3)
|
|
|
|
self.do_single_request(call_id=10, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name3)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name3)
|
|
|
|
ack4 = self.do_generic_bind(call_id=11,
|
|
ctx=ctx1,
|
|
auth_context=auth_context4,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# A new auth context with LEVEL_CONNECT resets the default.
|
|
#
|
|
self.do_single_request(call_id=12, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name4)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name4)
|
|
|
|
self.do_single_request(call_id=13, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name4)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name4)
|
|
|
|
#
|
|
# Only the explicit usage of any context reset that mode
|
|
#
|
|
self.do_single_request(call_id=14, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=15, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
self.do_single_request(call_id=16, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=17, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context2)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
self.do_single_request(call_id=18, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context3)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name3)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name3)
|
|
|
|
self.do_single_request(call_id=19, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context4)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name4)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name4)
|
|
|
|
self.do_single_request(call_id=20, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
return
|
|
|
|
def test_lsa_multi_auth_connect4u(self):
|
|
smb_auth_creds = self.get_user_creds()
|
|
account_name0 = smb_auth_creds.get_username()
|
|
authority_name0 = smb_auth_creds.get_domain()
|
|
return self._test_lsa_multi_auth_connect4(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def test_lsa_multi_auth_connect4a(self):
|
|
smb_auth_creds = self.get_anon_creds()
|
|
account_name0 = "ANONYMOUS LOGON"
|
|
authority_name0 = "NT AUTHORITY"
|
|
return self._test_lsa_multi_auth_connect4(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def _test_lsa_multi_auth_sign_connect1(self, smb_creds,
|
|
account_name0, authority_name0):
|
|
|
|
creds1 = self.get_user_creds()
|
|
account_name1 = creds1.get_username()
|
|
authority_name1 = creds1.get_domain()
|
|
auth_type1 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id1 = 1
|
|
|
|
creds2 = self.get_user_creds()
|
|
account_name2 = creds2.get_username()
|
|
authority_name2 = creds2.get_domain()
|
|
auth_type2 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id2 = 2
|
|
|
|
creds3 = self.get_anon_creds()
|
|
account_name3 = "ANONYMOUS LOGON"
|
|
authority_name3 = "NT AUTHORITY"
|
|
auth_type3 = dcerpc.DCERPC_AUTH_TYPE_NTLMSSP
|
|
auth_level3 = dcerpc.DCERPC_AUTH_LEVEL_CONNECT
|
|
auth_context_id3 = 3
|
|
|
|
abstract = samba.dcerpc.lsa.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
self.reconnect_smb_pipe(primary_address='\\pipe\\lsarpc',
|
|
secondary_address='\\pipe\\lsass',
|
|
transport_creds=smb_creds)
|
|
self.assertIsConnected()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx1 = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx1.context_id = 1
|
|
ctx1.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx1.abstract_syntax = abstract
|
|
ctx1.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds1,
|
|
auth_type=auth_type1,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds2,
|
|
auth_type=auth_type2,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
auth_context3 = self.get_auth_context_creds(creds=creds3,
|
|
auth_type=auth_type3,
|
|
auth_level=auth_level3,
|
|
auth_context_id=auth_context_id3,
|
|
hdr_signing=False)
|
|
|
|
get_user_name = samba.dcerpc.lsa.GetUserName()
|
|
get_user_name.in_system_name = self.target_hostname
|
|
get_user_name.in_account_name = None
|
|
get_user_name.in_authority_name = base.ndr_pointer(None)
|
|
|
|
ack1 = self.do_generic_bind(call_id=0,
|
|
ctx=ctx1,
|
|
auth_context=auth_context1)
|
|
|
|
#
|
|
# With just one explicit auth context and that
|
|
# *not* uses AUTH_LEVEL_CONNECT context.
|
|
#
|
|
# We don't get the by default (auth_context1)
|
|
#
|
|
self.do_single_request(call_id=1, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
self.do_single_request(call_id=2, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=3, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
ack2 = self.do_generic_bind(call_id=4,
|
|
ctx=ctx1,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack1.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# With just two explicit auth context and
|
|
# *none* uses AUTH_LEVEL_CONNECT context.
|
|
#
|
|
# We don't get auth_context1 or auth_context2 by default
|
|
#
|
|
self.do_single_request(call_id=5, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
self.do_single_request(call_id=6, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=7, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context2)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name2)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name2)
|
|
|
|
self.do_single_request(call_id=8, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
ack3 = self.do_generic_bind(call_id=9,
|
|
ctx=ctx1,
|
|
auth_context=auth_context3,
|
|
assoc_group_id = ack1.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
#
|
|
# Now we have tree explicit auth contexts,
|
|
# but just one with AUTH_LEVEL_CONNECT
|
|
#
|
|
# If we don't specify one of them we get
|
|
# that one auth_level_connect context.
|
|
#
|
|
# Until an explicit usage of any auth context reset that mode.
|
|
#
|
|
self.do_single_request(call_id=10, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name3)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name3)
|
|
|
|
self.do_single_request(call_id=11, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name3)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name3)
|
|
|
|
self.do_single_request(call_id=12, ctx=ctx1, io=get_user_name,
|
|
auth_context=auth_context1)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name1)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name1)
|
|
|
|
self.do_single_request(call_id=13, ctx=ctx1, io=get_user_name)
|
|
self.assertEqual(get_user_name.result[0], NT_STATUS_SUCCESS)
|
|
self.assertEqualsStrLower(get_user_name.out_account_name, account_name0)
|
|
self.assertEqualsStrLower(get_user_name.out_authority_name.value, authority_name0)
|
|
|
|
return
|
|
|
|
def test_lsa_multi_auth_sign_connect1u(self):
|
|
smb_auth_creds = self.get_user_creds()
|
|
account_name0 = smb_auth_creds.get_username()
|
|
authority_name0 = smb_auth_creds.get_domain()
|
|
return self._test_lsa_multi_auth_sign_connect1(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
def test_lsa_multi_auth_sign_connect1a(self):
|
|
smb_auth_creds = self.get_anon_creds()
|
|
account_name0 = "ANONYMOUS LOGON"
|
|
authority_name0 = "NT AUTHORITY"
|
|
return self._test_lsa_multi_auth_sign_connect1(smb_auth_creds,
|
|
account_name0,
|
|
authority_name0)
|
|
|
|
def test_spnego_multiple_auth_hdr_signing(self):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level1 = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id1=1
|
|
auth_level2 = dcerpc.DCERPC_AUTH_LEVEL_PACKET
|
|
auth_context_id2=2
|
|
|
|
creds = self.get_user_creds()
|
|
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
auth_context1 = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level1,
|
|
auth_context_id=auth_context_id1,
|
|
hdr_signing=False)
|
|
auth_context2 = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level2,
|
|
auth_context_id=auth_context_id2,
|
|
hdr_signing=False)
|
|
|
|
ack0 = self.do_generic_bind(call_id=1, ctx=ctx)
|
|
|
|
ack1 = self.do_generic_bind(call_id=2,
|
|
ctx=ctx,
|
|
auth_context=auth_context1,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
ack2 = self.do_generic_bind(call_id=3,
|
|
ctx=ctx,
|
|
auth_context=auth_context2,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
inq_if_ids = samba.dcerpc.mgmt.inq_if_ids()
|
|
self.do_single_request(call_id=4, ctx=ctx, io=inq_if_ids)
|
|
self.do_single_request(call_id=5, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context1)
|
|
self.do_single_request(call_id=6, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context2)
|
|
|
|
ack3 = self.do_generic_bind(call_id=7, ctx=ctx,
|
|
pfc_flags=dcerpc.DCERPC_PFC_FLAG_FIRST |
|
|
dcerpc.DCERPC_PFC_FLAG_LAST |
|
|
dcerpc.DCERPC_PFC_FLAG_SUPPORT_HEADER_SIGN,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
start_with_alter=True)
|
|
|
|
self.assertFalse(auth_context1['hdr_signing'])
|
|
auth_context1['hdr_signing'] = True
|
|
auth_context1["gensec"].want_feature(gensec.FEATURE_SIGN_PKT_HEADER)
|
|
|
|
self.do_single_request(call_id=8, ctx=ctx, io=inq_if_ids)
|
|
self.do_single_request(call_id=9, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context1)
|
|
self.do_single_request(call_id=10, ctx=ctx, io=inq_if_ids,
|
|
auth_context=auth_context2,
|
|
fault_status=dcerpc.DCERPC_FAULT_SEC_PKG_ERROR)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
|
|
def test_multiple_auth_limit(self):
|
|
creds = self.get_user_creds()
|
|
|
|
abstract = samba.dcerpc.mgmt.abstract_syntax()
|
|
transfer = base.transfer_syntax_ndr()
|
|
|
|
tsf1_list = [transfer]
|
|
ctx = samba.dcerpc.dcerpc.ctx_list()
|
|
ctx.context_id = 1
|
|
ctx.num_transfer_syntaxes = len(tsf1_list)
|
|
ctx.abstract_syntax = abstract
|
|
ctx.transfer_syntaxes = tsf1_list
|
|
|
|
ack0 = self.do_generic_bind(call_id=0, ctx=ctx)
|
|
|
|
is_server_listening = samba.dcerpc.mgmt.is_server_listening()
|
|
|
|
max_num_auth_str = samba.tests.env_get_var_value('MAX_NUM_AUTH', allow_missing=True)
|
|
if max_num_auth_str is not None:
|
|
max_num_auth = int(max_num_auth_str)
|
|
else:
|
|
max_num_auth = 2049
|
|
|
|
for i in range(1, max_num_auth+2):
|
|
auth_type = dcerpc.DCERPC_AUTH_TYPE_SPNEGO
|
|
auth_level = dcerpc.DCERPC_AUTH_LEVEL_INTEGRITY
|
|
auth_context_id = i
|
|
|
|
auth_context = self.get_auth_context_creds(creds=creds,
|
|
auth_type=auth_type,
|
|
auth_level=auth_level,
|
|
auth_context_id=auth_context_id,
|
|
hdr_signing=False)
|
|
|
|
alter_fault = None
|
|
if i > max_num_auth:
|
|
alter_fault = dcerpc.DCERPC_NCA_S_PROTO_ERROR
|
|
|
|
ack = self.do_generic_bind(call_id=auth_context_id,
|
|
ctx=ctx,
|
|
auth_context=auth_context,
|
|
assoc_group_id = ack0.u.assoc_group_id,
|
|
alter_fault=alter_fault,
|
|
start_with_alter=True,
|
|
)
|
|
if alter_fault is not None:
|
|
break
|
|
|
|
|
|
self.do_single_request(call_id=auth_context_id,
|
|
ctx=ctx, io=is_server_listening,
|
|
auth_context=auth_context)
|
|
|
|
# wait for a disconnect
|
|
rep = self.recv_pdu()
|
|
self.assertIsNone(rep)
|
|
self.assertNotConnected()
|
|
return
|
|
|
|
|
|
if __name__ == "__main__":
|
|
global_ndr_print = True
|
|
global_hexdump = True
|
|
import unittest
|
|
unittest.main()
|