1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-27 03:21:53 +03:00
samba-mirror/python/samba/tests/ntlm_auth.py
Andrew Bartlett d0b922bd51 ntlm_auth: Adapt --diagnostics mode to expect that the DC does not support LANMAN by default
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Stefan Metzmacher <metze@samba.org>
2022-03-17 01:57:38 +00:00

343 lines
14 KiB
Python

# Unix SMB/CIFS implementation.
#
# Copyright (C) Samuel Cabrero <scabrero@suse.de> 2018
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import os
from subprocess import Popen, PIPE
from samba.tests import BlackboxProcessError
from samba.tests.ntlm_auth_base import NTLMAuthTestCase
from samba.common import get_string
class NTLMAuthHelpersTests(NTLMAuthTestCase):
def setUp(self):
super(NTLMAuthHelpersTests, self).setUp()
self.username = os.environ["DC_USERNAME"]
self.password = os.environ["DC_PASSWORD"]
self.domain = os.environ["DOMAIN"]
out = get_string(self.check_output("wbinfo -n %s" % self.username))
self.group_sid = out.split(" ")[0]
self.assertTrue(self.group_sid.startswith("S-1-5-21-"))
self.bad_group_sid = self.group_sid[:-2]
def test_specified_domain(self):
""" ntlm_auth with specified domain """
username = "foo"
password = "secret"
domain = "FOO"
ret = self.run_helper(client_username=username,
client_password=password,
client_domain=domain,
server_username=username,
server_password=password,
server_domain=domain,
server_use_winbind=False)
self.assertTrue(ret)
username = "foo"
password = "secret"
domain = "fOo"
ret = self.run_helper(client_username=username,
client_password=password,
client_domain=domain,
server_username=username,
server_password=password,
server_domain=domain,
server_use_winbind=False)
self.assertTrue(ret)
def test_against_winbind(self):
""" ntlm_auth against winbindd """
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
server_use_winbind=True)
self.assertTrue(ret)
def test_ntlmssp_gss_spnego(self):
""" ntlm_auth with NTLMSSP client and gss-spnego server """
username = "foo"
password = "secret"
domain = "fOo"
ret = self.run_helper(client_username=username,
client_password=password,
client_domain=domain,
server_username=username,
server_password=password,
server_domain=domain,
client_helper="ntlmssp-client-1",
server_helper="gss-spnego",
server_use_winbind=False)
self.assertTrue(ret)
def test_gss_spnego(self):
""" ntlm_auth with NTLMSSP gss-spnego-client and gss-spnego server """
username = "foo"
password = "secret"
domain = "fOo"
ret = self.run_helper(client_username=username,
client_password=password,
client_domain=domain,
server_username=username,
server_password=password,
server_domain=domain,
client_helper="gss-spnego-client",
server_helper="gss-spnego",
server_use_winbind=False)
self.assertTrue(ret)
def test_gss_spnego_winbind(self):
""" ntlm_auth with NTLMSSP gss-spnego-client and gss-spnego server
against winbind """
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
client_helper="gss-spnego-client",
server_helper="gss-spnego",
server_use_winbind=True)
self.assertTrue(ret)
def test_ntlmssp_gss_spnego_cached_creds(self):
""" ntlm_auth with NTLMSSP client and gss-spnego server against
winbind with cached credentials """
param = "--ccache-save=%s%s%s%%%s" % (self.domain,
self.winbind_separator,
self.username,
self.password)
cache_cmd = ["wbinfo",
param]
self.check_exit_code(cache_cmd, 0)
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
client_use_cached_creds=True,
client_helper="ntlmssp-client-1",
server_helper="gss-spnego",
server_use_winbind=True)
self.assertTrue(ret)
def test_require_membership(self):
""" ntlm_auth against winbindd with require-membership-of """
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
require_membership=self.group_sid,
server_use_winbind=True)
self.assertTrue(ret)
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
require_membership=self.bad_group_sid,
server_use_winbind=True)
self.assertFalse(ret)
def test_require_membership_gss_spnego(self):
""" ntlm_auth with NTLMSSP gss-spnego-client and gss-spnego server
against winbind with require-membership-of """
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
require_membership=self.group_sid,
client_helper="gss-spnego-client",
server_helper="gss-spnego",
server_use_winbind=True)
self.assertTrue(ret)
ret = self.run_helper(client_username=self.username,
client_password=self.password,
client_domain=self.domain,
require_membership=self.bad_group_sid,
client_helper="gss-spnego-client",
server_helper="gss-spnego",
server_use_winbind=True)
self.assertFalse(ret)
def test_plaintext_with_membership(self):
""" ntlm_auth plaintext authentication with require-membership-of """
proc = Popen([self.ntlm_auth_path,
"--require-membership-of", self.group_sid,
"--helper-protocol", "squid-2.5-basic"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
creds = "%s%s%s %s\n" % (self.domain, self.winbind_separator,
self.username,
self.password)
(out, err) = proc.communicate(input=creds.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
self.assertTrue(out.startswith(b"OK\n"))
# Check membership failure
proc = Popen([self.ntlm_auth_path,
"--require-membership-of", self.bad_group_sid,
"--helper-protocol", "squid-2.5-basic"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
creds = "%s%s%s %s\n" % (self.domain,
self.winbind_separator,
self.username,
self.password)
(out, err) = proc.communicate(input=creds.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
self.assertTrue(out.startswith(b"ERR\n"))
def test_ntlm_server_1_with_fixed_password(self):
""" ntlm_auth ntlm-server-1 with fixed password """
ntlm_cmds = [
"LANMAN-Challenge: 0123456789abcdef",
"NT-Response: 25a98c1c31e81847466b29b2df4680f39958fb8c213a9cc6",
"NT-Domain: TEST",
"Username: testuser",
"Request-User-Session-Key: Yes",
".\n" ]
proc = Popen([self.ntlm_auth_path,
"--password", "SecREt01",
"--helper-protocol", "ntlm-server-1"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
buf = "\n".join(ntlm_cmds)
(out, err) = proc.communicate(input=buf.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
lines = out.split(b"\n")
self.assertEqual(len(lines), 4)
self.assertEqual(lines[0], b"Authenticated: Yes")
self.assertEqual(
lines[1], b"User-Session-Key: 3F373EA8E4AF954F14FAA506F8EEBDC4")
self.assertEqual(lines[2], b".")
self.assertEqual(lines[3], b"")
# Break the password with a leading A on the challenge
ntlm_cmds[0] = "LANMAN-Challenge: A123456789abcdef"
proc = Popen([self.ntlm_auth_path,
"--password", "SecREt01",
"--helper-protocol", "ntlm-server-1"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
buf = "\n".join(ntlm_cmds)
(out, err) = proc.communicate(input=buf.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
lines = out.split(b"\n")
self.assertEqual(len(lines), 5)
self.assertEqual(lines[0], b"Authenticated: No")
def test_ntlm_server_1_with_plaintext_winbind(self):
""" ntlm_auth ntlm-server-1 with plaintext password against winbind """
ntlm_cmds = [
"Password: %s" % self.password,
"NT-Domain: %s" % self.domain,
"Username: %s" % self.username,
"Request-User-Session-Key: Yes",
".\n" ]
proc = Popen([self.ntlm_auth_path,
"--require-membership-of", self.group_sid,
"--helper-protocol", "ntlm-server-1"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
buf = "\n".join(ntlm_cmds)
(out, err) = proc.communicate(input=buf.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
lines = out.split(b"\n")
self.assertEqual(len(lines), 3)
self.assertEqual(lines[0], b"Authenticated: Yes")
self.assertEqual(lines[1], b".")
self.assertEqual(lines[2], b"")
# Check membership failure
proc = Popen([self.ntlm_auth_path,
"--require-membership-of", self.bad_group_sid,
"--helper-protocol", "ntlm-server-1"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
buf = "\n".join(ntlm_cmds)
(out, err) = proc.communicate(input=buf.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
lines = out.split(b"\n")
self.assertEqual(len(lines), 3)
self.assertEqual(lines[0], b"Authenticated: No")
self.assertEqual(lines[1], b".")
self.assertEqual(lines[2], b"")
def test_ntlm_server_1_with_incorrect_password_winbind(self):
""" ntlm_auth ntlm-server-1 with incorrect fixed password against
winbind """
ntlm_cmds = [
"LANMAN-Challenge: 0123456789abcdef",
"NT-Response: 25a98c1c31e81847466b29b2df4680f39958fb8c213a9cc6",
"NT-Domain: %s" % self.domain,
"Username: %s" % self.username,
"Request-User-Session-Key: Yes",
".\n" ]
proc = Popen([self.ntlm_auth_path,
"--helper-protocol", "ntlm-server-1"],
stdout=PIPE, stdin=PIPE, stderr=PIPE)
buf = "\n".join(ntlm_cmds)
(out, err) = proc.communicate(input=buf.encode('utf-8'))
self.assertEqual(proc.returncode, 0)
lines = out.split(b"\n")
self.assertEqual(len(lines), 5)
self.assertEqual(lines[0], b"Authenticated: No")
def test_diagnostics(self):
""" ntlm_auth diagnostics """
cmd_line = [self.ntlm_auth_path,
"--username", self.username,
"--password", self.password,
"--domain", self.domain,
"--diagnostics"]
try:
self.check_exit_code(cmd_line, 0)
except BlackboxProcessError as e:
self.fail(e)
def test_diagnostics_lm(self):
""" ntlm_auth diagnostics """
cmd_line = [self.ntlm_auth_path,
"--username", self.username,
"--password", self.password,
"--domain", self.domain,
"--diagnostics",
"--request-lm-key"]
try:
self.check_exit_code(cmd_line, 0)
except BlackboxProcessError as e:
self.fail(e)