From 7350d994096efa62031f4f75cf92fb4ade2b2655 Mon Sep 17 00:00:00 2001 From: Matthieu Patou Date: Sun, 29 Jan 2012 22:12:40 -0800 Subject: s3: check that a user in a bogus domain name is mapped to the localnetbios name of a domain member This means that if we authentify for BOGUS\administrator in AD domain FOREST with samba being domain member with the netbiosname MEMBER then BOGUS\administrator will be mapped to MEMBER\administrator if the password match. --- source4/selftest/tests.py | 1 + testprogs/blackbox/bogus.sh | 20 ++++++++++++++++++++ 2 files changed, 21 insertions(+) create mode 100755 testprogs/blackbox/bogus.sh diff --git a/source4/selftest/tests.py b/source4/selftest/tests.py index 82f0ae9872..ccc899bd1e 100755 --- a/source4/selftest/tests.py +++ b/source4/selftest/tests.py @@ -367,6 +367,7 @@ for mech in [ plansmbtorturetestsuite('base.xcopy', "plugin_s4_dc", ['//$NETBIOSNAME/xcopy_share', signoptions, '-U$DC_USERNAME%$DC_PASSWORD'], "samba4.%s administrator" % name) +plantestsuite("samba4.blackbox.bogusdomain", "s3member", ["testprogs/blackbox/bogus.sh", "$NETBIOSNAME", "xcopy_share", '$DC_USERNAME', '$DC_PASSWORD'], allow_empty_output=True) for mech in [ "-k no", "-k no --option=usespnego=no", diff --git a/testprogs/blackbox/bogus.sh b/testprogs/blackbox/bogus.sh new file mode 100755 index 0000000000..019957bf70 --- /dev/null +++ b/testprogs/blackbox/bogus.sh @@ -0,0 +1,20 @@ +#!/bin/sh + +if [ $# -lt 1 ]; then +cat <