diff options
author | Andrew Bartlett <abartlet@samba.org> | 2006-02-07 23:49:35 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:51:51 -0500 |
commit | d32b14c2bc1fa5ee80bc52feb9094edccc462674 (patch) | |
tree | b9bce61a6f45196d6c7579a725542818c1b5ac85 | |
parent | e45ce50a61a1438a219d2554308aa94915b7020f (diff) | |
download | samba-d32b14c2bc1fa5ee80bc52feb9094edccc462674.tar.gz samba-d32b14c2bc1fa5ee80bc52feb9094edccc462674.tar.bz2 samba-d32b14c2bc1fa5ee80bc52feb9094edccc462674.zip |
r13381: Test the SamLogonEx SamLogon call in the schannel test. This is only
available under schannel, and performs a netlogon authentication.
Andrew Bartlett
(This used to be commit 561a690915f9d3ca2fbb76f16c47cf2f6be1b825)
-rw-r--r-- | source4/torture/rpc/schannel.c | 117 |
1 files changed, 117 insertions, 0 deletions
diff --git a/source4/torture/rpc/schannel.c b/source4/torture/rpc/schannel.c index 9341fc4a93..8e2aa41281 100644 --- a/source4/torture/rpc/schannel.c +++ b/source4/torture/rpc/schannel.c @@ -23,10 +23,90 @@ #include "includes.h" #include "librpc/gen_ndr/ndr_netlogon.h" #include "torture/rpc/proto.h" +#include "lib/cmdline/popt_common.h" #define TEST_MACHINE_NAME "schannel" /* + try a netlogon SamLogon +*/ +BOOL test_netlogon_ex_ops(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct cli_credentials *credentials, + struct creds_CredentialState *creds) +{ + NTSTATUS status; + struct netr_LogonSamLogonEx r; + struct netr_NetworkInfo ninfo; + DATA_BLOB names_blob, chal, lm_resp, nt_resp; + int i; + BOOL ret = True; + int flags = CLI_CRED_NTLM_AUTH; + if (lp_client_lanman_auth()) { + flags |= CLI_CRED_LANMAN_AUTH; + } + + if (lp_client_ntlmv2_auth()) { + flags |= CLI_CRED_NTLMv2_AUTH; + } + + cli_credentials_get_ntlm_username_domain(cmdline_credentials, mem_ctx, + &ninfo.identity_info.account_name.string, + &ninfo.identity_info.domain_name.string); + + generate_random_buffer(ninfo.challenge, + sizeof(ninfo.challenge)); + chal = data_blob_const(ninfo.challenge, + sizeof(ninfo.challenge)); + + names_blob = NTLMv2_generate_names_blob(mem_ctx, cli_credentials_get_workstation(credentials), + cli_credentials_get_domain(credentials)); + + status = cli_credentials_get_ntlm_response(cmdline_credentials, mem_ctx, + &flags, + chal, + names_blob, + &lm_resp, &nt_resp, + NULL, NULL); + if (!NT_STATUS_IS_OK(status)) { + printf("cli_credentials_get_ntlm_response failed: %s\n", + nt_errstr(status)); + return False; + } + + ninfo.lm.data = lm_resp.data; + ninfo.lm.length = lm_resp.length; + + ninfo.nt.data = nt_resp.data; + ninfo.nt.length = nt_resp.length; + + ninfo.identity_info.parameter_control = 0; + ninfo.identity_info.logon_id_low = 0; + ninfo.identity_info.logon_id_high = 0; + ninfo.identity_info.workstation.string = cli_credentials_get_workstation(credentials); + + r.in.server_name = talloc_asprintf(mem_ctx, "\\\\%s", dcerpc_server_name(p)); + r.in.workstation = cli_credentials_get_workstation(credentials); + r.in.logon_level = 2; + r.in.logon.network = &ninfo; + r.in.flags = 0; + + printf("Testing LogonSamLogonEx with name %s\n", ninfo.identity_info.account_name.string); + + for (i=2;i<3;i++) { + r.in.validation_level = i; + + status = dcerpc_netr_LogonSamLogonEx(p, mem_ctx, &r); + if (!NT_STATUS_IS_OK(status)) { + printf("LogonSamLogon failed: %s\n", + nt_errstr(status)); + return False; + } + } + + return ret; +} + +/* do some samr ops using the schannel connection */ static BOOL test_samr_ops(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) @@ -157,6 +237,7 @@ static BOOL test_schannel(TALLOC_CTX *mem_ctx, struct dcerpc_binding *b; struct dcerpc_pipe *p = NULL; struct dcerpc_pipe *p_netlogon = NULL; + struct dcerpc_pipe *p_netlogon2 = NULL; struct dcerpc_pipe *p_samr2 = NULL; struct dcerpc_pipe *p_lsa = NULL; struct creds_CredentialState *creds; @@ -230,6 +311,11 @@ static BOOL test_schannel(TALLOC_CTX *mem_ctx, ret = False; } + if (!test_netlogon_ex_ops(p_netlogon, test_ctx, credentials, creds)) { + printf("Failed to process schannel secured NETLOGON EX ops\n"); + ret = False; + } + /* Swap the binding details from SAMR to LSARPC */ status = dcerpc_epm_map_binding(test_ctx, b, &dcerpc_table_lsarpc, NULL); if (!NT_STATUS_IS_OK(status)) { @@ -282,6 +368,37 @@ static BOOL test_schannel(TALLOC_CTX *mem_ctx, /* do a couple of logins. We have *not* done a new serverauthenticate */ if (!test_samr_ops(p_samr2, test_ctx)) { printf("Failed to process schannel secured SAMR ops (on fresh connection)\n"); + goto failed; + } + + /* Swap the binding details from SAMR to NETLOGON */ + status = dcerpc_epm_map_binding(test_ctx, b, &dcerpc_table_netlogon, NULL); + if (!NT_STATUS_IS_OK(status)) { + goto failed; + } + + status = dcerpc_secondary_connection(p_samr2, &p_netlogon2, + b); + + if (!NT_STATUS_IS_OK(status)) { + goto failed; + } + + status = dcerpc_bind_auth(p_netlogon2, &dcerpc_table_netlogon, + credentials, DCERPC_AUTH_TYPE_SCHANNEL, + dcerpc_auth_level(p_samr2->conn), + NULL); + + if (!NT_STATUS_IS_OK(status)) { + goto failed; + } + + /* We can only do the 'ex' ops, because the original SamLogon + * call does shared credentials stuff Samba4 doesn't pass + * yet */ + + if (!test_netlogon_ex_ops(p_netlogon2, test_ctx, credentials, creds)) { + printf("Failed to process schannel secured NETLOGON EX ops\n"); ret = False; } |