1
0
mirror of https://github.com/samba-team/samba.git synced 2025-03-05 20:58:40 +03:00
samba-mirror/python/samba/tests/dsdb_quiet_provision_tests.py
Andrew Bartlett 06912de3b2 dsdb: Add API tests for new_gkdi_root_key()
These show that the new root key should be based on the server
configuration object, not just hardcoded defaults.

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
2024-03-28 01:50:41 +00:00

281 lines
13 KiB
Python

# Unix SMB/CIFS implementation. Tests for dsdb
# Copyright (C) Matthieu Patou <mat@matws.net> 2010
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
"""These tests want to be run on a freshly provisioned domain that has
not been greatly modified by other tests (which at the time of writing
probably means 'chgdcpass').
Tests here should only read the database.
This is to avoid flapping tests.
"""
from samba.credentials import Credentials
from samba.samdb import SamDB
from samba.auth import system_session
from samba.tests import TestCase
from samba.gkdi import (
KEY_CYCLE_DURATION,
MAX_CLOCK_SKEW
)
from samba.nt_time import nt_now
import ldb
import samba
class DsdbQuietProvisionTests(TestCase):
@classmethod
def setUpClass(cls):
super().setUpClass()
cls.lp = samba.tests.env_loadparm()
cls.creds = Credentials()
cls.creds.guess(cls.lp)
cls.session = system_session()
cls.samdb = SamDB(session_info=cls.session,
credentials=cls.creds,
lp=cls.lp)
def test_dsdb_dn_gkdi_gmsa_root_keys_exist(self):
"""In provision we set up a GKDI root key.
There should always be at least one that is already valid
"""
current_time = nt_now()
# We need the GKDI key to be already available for use
min_use_start_time = current_time \
- KEY_CYCLE_DURATION - MAX_CLOCK_SKEW
dn = self.samdb.get_config_basedn()
dn.add_child("CN=Master Root Keys,CN=Group Key Distribution Service,CN=Services")
res = self.samdb.search(dn,
scope=ldb.SCOPE_SUBTREE,
expression=f"(&(objectClass = msKds-ProvRootKey)(msKds-UseStartTime<={min_use_start_time}))")
self.assertGreater(len(res), 0)
def test_gkdi_create_root_key_wrong_version(self):
server_config_dn = self.samdb.get_config_basedn()
server_config_dn.add_child("CN=Group Key Distribution Service Server Configuration," +
"CN=Server Configuration," +
"CN=Group Key Distribution Service," +
"CN=Services")
res = self.samdb.search(base=server_config_dn,
scope=ldb.SCOPE_BASE,
attrs=["msKds-Version"])
self.assertEqual(len(res), 1)
msg = res[0]
version = int(msg["msKds-Version"][0])
self.assertEqual(version, 1)
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-Version": [str(version)]},
ldb.FLAG_MOD_REPLACE))
self.samdb.modify(ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-Version": ["2"]},
ldb.FLAG_MOD_REPLACE))
try:
self.samdb.new_gkdi_root_key()
self.fail("Creating key with invalid version should fail")
except ldb.LdbError as e:
(enum, estr) = e.args
self.assertEqual(enum, ldb.ERR_CONSTRAINT_VIOLATION)
def test_gkdi_create_root_key_4096(self):
server_config_dn = self.samdb.get_config_basedn()
server_config_dn.add_child("CN=Group Key Distribution Service Server Configuration," +
"CN=Server Configuration," +
"CN=Group Key Distribution Service," +
"CN=Services")
res = self.samdb.search(base=server_config_dn,
scope=ldb.SCOPE_BASE,
attrs=["msKds-PublicKeyLength"])
self.assertEqual(len(res), 1)
msg = res[0]
if "msKds-PublicKeyLength" in msg:
keylen = msg[0]["msKds-PublicKeyLength"]
# Ensure test still tests something in the future, if the default changes
self.assertNotEqual(keylen, 4096)
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-PublicKeyLength": [str(keylen)]},
ldb.FLAG_MOD_REPLACE))
else:
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-PublicKeyLength": []},
ldb.FLAG_MOD_DELETE))
self.samdb.modify(ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-PublicKeyLength": ["4096"]},
ldb.FLAG_MOD_REPLACE))
dn = self.samdb.new_gkdi_root_key()
root_key_res = self.samdb.search(base=dn,
scope=ldb.SCOPE_BASE)
self.assertEqual(len(root_key_res), 1)
root_key = root_key_res[0]
self.assertEqual(int(root_key["msKds-PublicKeyLength"][0]), 4096)
self.assertEqual(str(root_key["msKds-KDFAlgorithmID"][0]), "SP800_108_CTR_HMAC")
self.assertEqual(str(root_key["msKds-SecretAgreementAlgorithmID"][0]), "DH")
self.assertEqual(int(root_key["msKds-Version"][0]), 1)
def test_gkdi_create_root_key_priv_1024(self):
server_config_dn = self.samdb.get_config_basedn()
server_config_dn.add_child("CN=Group Key Distribution Service Server Configuration," +
"CN=Server Configuration," +
"CN=Group Key Distribution Service," +
"CN=Services")
res = self.samdb.search(base=server_config_dn,
scope=ldb.SCOPE_BASE,
attrs=["msKds-PrivateKeyLength"])
self.assertEqual(len(res), 1)
msg = res[0]
if "msKds-PrivateKeyLength" in msg:
keylen = msg["msKds-PrivateKeyLength"]
# Ensure test still tests something in the future, if the default changes
self.assertNotEqual(keylen, 1024)
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-PrivateKeyLength": [str(keylen)]},
ldb.FLAG_MOD_REPLACE))
else:
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-PrivateKeyLength": []},
ldb.FLAG_MOD_DELETE))
self.samdb.modify(ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-PrivateKeyLength": ["1024"]},
ldb.FLAG_MOD_REPLACE))
dn = self.samdb.new_gkdi_root_key()
root_key_res = self.samdb.search(base=dn,
scope=ldb.SCOPE_BASE)
self.assertEqual(len(root_key_res), 1)
root_key = root_key_res[0]
self.assertEqual(int(root_key["msKds-PrivateKeyLength"][0]), 1024)
self.assertEqual(str(root_key["msKds-KDFAlgorithmID"][0]), "SP800_108_CTR_HMAC")
self.assertEqual(str(root_key["msKds-SecretAgreementAlgorithmID"][0]), "DH")
self.assertEqual(int(root_key["msKds-Version"][0]), 1)
def test_gkdi_create_root_key_bad_alg(self):
server_config_dn = self.samdb.get_config_basedn()
server_config_dn.add_child("CN=Group Key Distribution Service Server Configuration," +
"CN=Server Configuration," +
"CN=Group Key Distribution Service," +
"CN=Services")
res = self.samdb.search(base=server_config_dn,
scope=ldb.SCOPE_BASE,
attrs=["msKds-KDFAlgorithmID"])
self.assertEqual(len(res), 1)
msg = res[0]
if "msKds-KDFAlgorithmID" in msg:
alg = msg["msKds-KDFAlgorithmID"][0]
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-KDFAlgorithmID": [alg]},
ldb.FLAG_MOD_REPLACE))
else:
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-KDFAlgorithmID": []},
ldb.FLAG_MOD_DELETE))
self.samdb.modify(ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-KDFAlgorithmID": ["NO_AN_ALG"]},
ldb.FLAG_MOD_REPLACE))
try:
self.samdb.new_gkdi_root_key()
self.fail("Creating key with invalid algorithm should fail")
except ldb.LdbError as e:
(enum, estr) = e.args
self.assertEqual(enum, ldb.ERR_CONSTRAINT_VIOLATION)
def test_gkdi_create_root_key_good_alg(self):
server_config_dn = self.samdb.get_config_basedn()
server_config_dn.add_child("CN=Group Key Distribution Service Server Configuration," +
"CN=Server Configuration," +
"CN=Group Key Distribution Service," +
"CN=Services")
res = self.samdb.search(base=server_config_dn,
scope=ldb.SCOPE_BASE,
attrs=["msKds-KDFAlgorithmID"])
self.assertEqual(len(res), 1)
msg = res[0]
if "msKds-KDFAlgorithmID" in msg:
alg = msg["msKds-KDFAlgorithmID"][0]
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-KDFAlgorithmID": [alg]},
ldb.FLAG_MOD_REPLACE))
else:
self.addCleanup(self.samdb.modify,
ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-KDFAlgorithmID": []},
ldb.FLAG_MOD_DELETE))
self.samdb.modify(ldb.Message.from_dict(self.samdb,
{"dn": msg["dn"],
"msKds-KDFAlgorithmID": ["SP800_108_CTR_HMAC"]},
ldb.FLAG_MOD_REPLACE))
dn = self.samdb.new_gkdi_root_key()
root_key_res = self.samdb.search(base=dn,
scope=ldb.SCOPE_BASE)
self.assertEqual(len(root_key_res), 1)
root_key = root_key_res[0]
self.assertEqual(int(root_key["msKds-PublicKeyLength"][0]), 2048)
self.assertEqual(str(root_key["msKds-KDFAlgorithmID"][0]), "SP800_108_CTR_HMAC")
self.assertEqual(str(root_key["msKds-SecretAgreementAlgorithmID"][0]), "DH")
self.assertEqual(int(root_key["msKds-Version"][0]), 1)