The branch, master has been updated
       via  45465cb... s4:selftest: add the samr-passwords-lockout test to 
knownfail
       via  9764db8... torture: add new test RPC-SAMR-PASSWORDS-LOCKOUT
      from  e1e6b19... s3-docs: Fix typos.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 45465cb7da75645f656e9c5dda136d782477ee68
Author: Michael Adam <[email protected]>
Date:   Wed Jan 20 16:38:00 2010 +0100

    s4:selftest: add the samr-passwords-lockout test to knownfail
    
    This is not implemented completely yet.
    Needs fixing in the future.
    
    Michael

commit 9764db806fe169cc3a3797b6785868922d5d7a80
Author: Michael Adam <[email protected]>
Date:   Fri Jan 15 18:08:57 2010 +0100

    torture: add new test RPC-SAMR-PASSWORDS-LOCKOUT
    
    This tests account lockout features.
    Windows 2003r2 and Windows 2008r2 survice this test.
    
    Note: Windows does not set the ACB_AUTOLOCK account flag when it
    locks out an account.
    One thing that could/should be added to this test is a check of
    the lockout time property.
    
    Michael

-----------------------------------------------------------------------

Summary of changes:
 source4/selftest/knownfail |    1 +
 source4/torture/rpc/rpc.c  |    1 +
 source4/torture/rpc/samr.c |  451 ++++++++++++++++++++++++++++++++++++++++++++
 3 files changed, 453 insertions(+), 0 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source4/selftest/knownfail b/source4/selftest/knownfail
index a891f03..31c1e2c 100644
--- a/source4/selftest/knownfail
+++ b/source4/selftest/knownfail
@@ -41,6 +41,7 @@ rpc.netlogon.*.ServerGetTrustInfo
 rpc.netlogon.*.GetDomainInfo # Also fails against W2K8 (but in a different way)
 samba4.rpc.samr.passwords.pwdlastset # Not provided by Samba 4 yet
 samba4.rpc.samr.passwords.badpwdcount # Not provided by Samba 4 yet
+samba4.rpc.samr.passwords.lockout
 samba4.rpc.samr.users.privileges
 samba4.rpc.spoolss # Not provided by Samba 4 yet
 base.charset.*.Testing partial surrogate
diff --git a/source4/torture/rpc/rpc.c b/source4/torture/rpc/rpc.c
index 6e2e40d..1973440 100644
--- a/source4/torture/rpc/rpc.c
+++ b/source4/torture/rpc/rpc.c
@@ -463,6 +463,7 @@ NTSTATUS torture_rpc_init(void)
        torture_suite_add_suite(suite, 
torture_rpc_samr_workstation_auth(suite));
        torture_suite_add_suite(suite, 
torture_rpc_samr_passwords_pwdlastset(suite));
        torture_suite_add_suite(suite, 
torture_rpc_samr_passwords_badpwdcount(suite));
+       torture_suite_add_suite(suite, 
torture_rpc_samr_passwords_lockout(suite));
        torture_suite_add_suite(suite, torture_rpc_samr_user_privileges(suite));
        torture_suite_add_suite(suite, torture_rpc_samr_large_dc(suite));
        torture_suite_add_suite(suite, torture_rpc_epmapper(suite));
diff --git a/source4/torture/rpc/samr.c b/source4/torture/rpc/samr.c
index 0e76017..c2b973e 100644
--- a/source4/torture/rpc/samr.c
+++ b/source4/torture/rpc/samr.c
@@ -51,6 +51,7 @@ enum torture_samr_choice {
        TORTURE_SAMR_PASSWORDS,
        TORTURE_SAMR_PASSWORDS_PWDLASTSET,
        TORTURE_SAMR_PASSWORDS_BADPWDCOUNT,
+       TORTURE_SAMR_PASSWORDS_LOCKOUT,
        TORTURE_SAMR_USER_ATTRIBUTES,
        TORTURE_SAMR_USER_PRIVILEGES,
        TORTURE_SAMR_OTHER,
@@ -3790,6 +3791,390 @@ static bool test_Password_badpwdcount_wrap(struct 
dcerpc_pipe *p,
        return ret;
 }
 
+static bool test_QueryUserInfo_acct_flags(struct dcerpc_pipe *p,
+                                         struct torture_context *tctx,
+                                         struct policy_handle *handle,
+                                         uint32_t *acct_flags)
+{
+       union samr_UserInfo *info;
+       struct samr_QueryUserInfo r;
+
+       r.in.user_handle = handle;
+       r.in.level = 16;
+       r.out.info = &info;
+
+       torture_comment(tctx, "Testing QueryUserInfo level %d", r.in.level);
+
+       torture_assert_ntstatus_ok(tctx, dcerpc_samr_QueryUserInfo(p, tctx, &r),
+               "failed to query userinfo");
+
+       *acct_flags = info->info16.acct_flags;
+
+       torture_comment(tctx, "  (acct_flags: 0x%08x)\n", *acct_flags);
+
+       return true;
+}
+
+static bool test_Password_lockout(struct dcerpc_pipe *p,
+                                 struct dcerpc_pipe *np,
+                                 struct torture_context *tctx,
+                                 uint32_t acct_flags,
+                                 const char *acct_name,
+                                 struct policy_handle *domain_handle,
+                                 struct policy_handle *user_handle,
+                                 char **password,
+                                 struct cli_credentials *machine_credentials,
+                                 const char *comment,
+                                 bool disable,
+                                 bool interactive,
+                                 NTSTATUS expected_success_status,
+                                 struct samr_DomInfo1 *info1,
+                                 struct samr_DomInfo12 *info12)
+{
+       union samr_DomainInfo info;
+       uint32_t badpwdcount;
+       uint32_t password_history_length = 1;
+       uint64_t lockout_threshold = 1;
+       uint32_t lockout_seconds = 5;
+       uint64_t delta_time_factor = 10 * 1000 * 1000;
+
+       torture_comment(tctx, "\nTesting account lockout: %s\n", comment);
+
+       /* set policies */
+
+       info.info1 = *info1;
+
+       torture_comment(tctx, "setting password history lenght.\n");
+       info.info1.password_history_length = password_history_length;
+
+       {
+               struct samr_SetDomainInfo r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainPasswordInformation;
+               r.in.info = &info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_SetDomainInfo(p, tctx, &r),
+                       "failed to set domain info level 1");
+       }
+
+       info.info12 = *info12;
+
+       info.info12.lockout_threshold = lockout_threshold;
+
+       /* set lockout duration < lockout window: should fail */
+       info.info12.lockout_duration = ~(lockout_seconds * delta_time_factor);
+       info.info12.lockout_window = ~((lockout_seconds + 1) * 
delta_time_factor);
+
+       {
+               struct samr_SetDomainInfo r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainLockoutInformation;
+               r.in.info = &info;
+
+               torture_assert_ntstatus_equal(tctx,
+                       dcerpc_samr_SetDomainInfo(p, tctx, &r),
+                       NT_STATUS_INVALID_PARAMETER,
+                       "succeeded setting lockout duration < lockout window");
+       }
+
+       info.info12.lockout_duration = 0;
+       info.info12.lockout_window = 0;
+
+       {
+               struct samr_SetDomainInfo r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainLockoutInformation;
+               r.in.info = &info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_SetDomainInfo(p, tctx, &r),
+                       "failed to set lockout window and duration to 0");
+       }
+
+       /* set lockout duration of 5 seconds */
+       info.info12.lockout_duration = ~(lockout_seconds * delta_time_factor);
+       info.info12.lockout_window = ~(lockout_seconds * delta_time_factor);
+
+       {
+               struct samr_SetDomainInfo r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainLockoutInformation;
+               r.in.info = &info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_SetDomainInfo(p, tctx, &r),
+                       "failed to set domain info level 12");
+       }
+
+       /* reset bad pwd count */
+
+       torture_assert(tctx,
+               test_reset_badpwdcount(p, tctx, user_handle, acct_flags, 
password), "");
+
+
+       /* enable or disable account */
+       {
+               struct samr_SetUserInfo r;
+               union samr_UserInfo user_info;
+
+               torture_comment(tctx, "Testing SetUserInfo level 16 (%s 
account)\n",
+                       disable ? "disable" : "enable");
+
+               user_info.info16.acct_flags = acct_flags;
+               if (disable) {
+                       user_info.info16.acct_flags |= ACB_DISABLED;
+               } else {
+                       user_info.info16.acct_flags &= ~ACB_DISABLED;
+               }
+
+               r.in.user_handle = user_handle;
+               r.in.level = 16;
+               r.in.info = &user_info;
+
+               torture_assert_ntstatus_ok(tctx, dcerpc_samr_SetUserInfo(p, 
tctx, &r),
+                       "failed to enable user");
+       }
+
+       /* test logon with right password */
+
+       if (!test_SamLogon_with_creds(tctx, np, machine_credentials,
+                                     acct_name, *password,
+                                     expected_success_status, interactive)) {
+               torture_fail(tctx, "failed to auth with latest password");
+       }
+
+       torture_assert(tctx,
+               test_QueryUserInfo_badpwdcount(p, tctx, user_handle, 
&badpwdcount), "");
+       torture_assert_int_equal(tctx, badpwdcount, 0, "expected badpwdcount to 
be 0");
+
+
+       /* test with wrong password ==> lockout */
+
+       if (!test_SamLogon_with_creds(tctx, np, machine_credentials,
+                                     acct_name, "random_crap",
+                                     NT_STATUS_WRONG_PASSWORD, interactive)) {
+               torture_fail(tctx, "succeeded to authenticate with wrong 
password");
+       }
+
+       torture_assert(tctx,
+               test_QueryUserInfo_badpwdcount(p, tctx, user_handle, 
&badpwdcount), "");
+       torture_assert_int_equal(tctx, badpwdcount, 1, "expected badpwdcount to 
be 1");
+
+       torture_assert(tctx,
+               test_QueryUserInfo_acct_flags(p, tctx, user_handle, 
&acct_flags), "");
+       torture_assert_int_equal(tctx, acct_flags & ACB_AUTOLOCK, 0,
+                                "expected account to be locked");
+
+
+       /* test with good password */
+
+       if (!test_SamLogon_with_creds(tctx, np, machine_credentials, acct_name,
+                                    *password,
+                                    NT_STATUS_ACCOUNT_LOCKED_OUT, interactive))
+       {
+               torture_fail(tctx, "authenticate did not return 
NT_STATUS_ACCOUNT_LOCKED_OUT");
+       }
+
+       /* bad pwd count should not get updated */
+       torture_assert(tctx,
+               test_QueryUserInfo_badpwdcount(p, tctx, user_handle, 
&badpwdcount), "");
+       torture_assert_int_equal(tctx, badpwdcount, 1, "expected badpwdcount to 
be 1");
+
+       /* curiously, windows does _not_ set the autlock flag */
+       torture_assert(tctx,
+               test_QueryUserInfo_acct_flags(p, tctx, user_handle, 
&acct_flags), "");
+       torture_assert_int_equal(tctx, acct_flags & ACB_AUTOLOCK, 0,
+                                "expected account to be locked");
+
+
+       /* with bad password */
+
+       if (!test_SamLogon_with_creds(tctx, np, machine_credentials,
+                                     acct_name, "random_crap2",
+                                     NT_STATUS_ACCOUNT_LOCKED_OUT, 
interactive))
+       {
+               torture_fail(tctx, "authenticate did not return 
NT_STATUS_ACCOUNT_LOCKED_OUT");
+       }
+
+       /* bad pwd count should not get updated */
+       torture_assert(tctx,
+               test_QueryUserInfo_badpwdcount(p, tctx, user_handle, 
&badpwdcount), "");
+       torture_assert_int_equal(tctx, badpwdcount, 1, "expected badpwdcount to 
be 1");
+
+       /* curiously, windows does _not_ set the autlock flag */
+       torture_assert(tctx,
+               test_QueryUserInfo_acct_flags(p, tctx, user_handle, 
&acct_flags), "");
+       torture_assert_int_equal(tctx, acct_flags & ACB_AUTOLOCK, 0,
+                                "expected account to be locked");
+
+
+       /* let lockout duration expire ==> unlock */
+
+       torture_comment(tctx, "let lockout duration expire...\n");
+       sleep(lockout_seconds + 1);
+
+       if (!test_SamLogon_with_creds(tctx, np, machine_credentials, acct_name,
+                                    *password,
+                                    expected_success_status, interactive))
+       {
+               torture_fail(tctx, "failed to authenticate after lockout 
expired");
+       }
+
+       torture_assert(tctx,
+               test_QueryUserInfo_acct_flags(p, tctx, user_handle, 
&acct_flags), "");
+       torture_assert_int_equal(tctx, acct_flags & ACB_AUTOLOCK, 0,
+                                "expected account not to be locked");
+
+       return true;
+}
+
+static bool test_Password_lockout_wrap(struct dcerpc_pipe *p,
+                                      struct torture_context *tctx,
+                                      uint32_t acct_flags,
+                                      const char *acct_name,
+                                      struct policy_handle *domain_handle,
+                                      struct policy_handle *user_handle,
+                                      char **password,
+                                      struct cli_credentials 
*machine_credentials)
+{
+       union samr_DomainInfo *q_info, s_info;
+       struct samr_DomInfo1 info1, _info1;
+       struct samr_DomInfo12 info12, _info12;
+       bool ret = true;
+       struct dcerpc_pipe *np;
+       int i;
+
+       struct {
+               const char *comment;
+               bool disabled;
+               bool interactive;
+               NTSTATUS expected_success_status;
+       } creds[] = {
+               {
+                       .comment                = "network logon (disabled 
account)",
+                       .disabled               = true,
+                       .interactive            = false,
+                       .expected_success_status= NT_STATUS_ACCOUNT_DISABLED
+               },
+               {
+                       .comment                = "network logon (enabled 
account)",
+                       .disabled               = false,
+                       .interactive            = false,
+                       .expected_success_status= NT_STATUS_OK
+               },
+               {
+                       .comment                = "interactive logon (disabled 
account)",
+                       .disabled               = true,
+                       .interactive            = true,
+                       .expected_success_status= NT_STATUS_ACCOUNT_DISABLED
+               },
+               {
+                       .comment                = "interactive logon (enabled 
account)",
+                       .disabled               = false,
+                       .interactive            = true,
+                       .expected_success_status= NT_STATUS_OK
+               },
+       };
+
+       torture_assert(tctx, setup_schannel_netlogon_pipe(tctx, 
machine_credentials, &np), "");
+
+       /* backup old policies */
+
+       {
+               struct samr_QueryDomainInfo2 r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainPasswordInformation;
+               r.out.info = &q_info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_QueryDomainInfo2(p, tctx, &r),
+                       "failed to query domain info level 1");
+
+               info1 = q_info->info1;
+       }
+
+       {
+               struct samr_QueryDomainInfo2 r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainLockoutInformation;
+               r.out.info = &q_info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_QueryDomainInfo2(p, tctx, &r),
+                       "failed to query domain info level 12");
+
+               info12 = q_info->info12;
+       }
+
+       _info1 = info1;
+       _info12 = info12;
+
+       /* run tests */
+
+       for (i=0; i < ARRAY_SIZE(creds); i++) {
+
+               /* skip trust tests for now */
+               if (acct_flags & ACB_WSTRUST ||
+                   acct_flags & ACB_SVRTRUST ||
+                   acct_flags & ACB_DOMTRUST) {
+                       continue;
+               }
+
+               ret &= test_Password_lockout(p, np, tctx, acct_flags, acct_name,
+                                            domain_handle, user_handle, 
password,
+                                            machine_credentials,
+                                            creds[i].comment,
+                                            creds[i].disabled,
+                                            creds[i].interactive,
+                                            creds[i].expected_success_status,
+                                            &_info1, &_info12);
+               if (!ret) {
+                       torture_warning(tctx, "TEST #%d (%s) failed\n", i, 
creds[i].comment);
+               } else {
+                       torture_comment(tctx, "TEST #%d (%s) succeeded\n", i, 
creds[i].comment);
+               }
+       }
+
+       /* restore policies */
+
+       s_info.info1 = info1;
+
+       {
+               struct samr_SetDomainInfo r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainPasswordInformation;
+               r.in.info = &s_info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_SetDomainInfo(p, tctx, &r),
+                       "failed to set domain info level 1");
+       }
+
+       s_info.info12 = info12;
+
+       {
+               struct samr_SetDomainInfo r;
+
+               r.in.domain_handle = domain_handle;
+               r.in.level = DomainLockoutInformation;
+               r.in.info = &s_info;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_SetDomainInfo(p, tctx, &r),
+                       "failed to set domain info level 12");
+       }
+
+       return ret;
+}
+
 static bool test_DeleteUser_with_privs(struct dcerpc_pipe *p,
                                       struct dcerpc_pipe *lp,
                                       struct torture_context *tctx,
@@ -4308,6 +4693,26 @@ static bool test_user_ops(struct dcerpc_pipe *p,
 
                break;
 
+       case TORTURE_SAMR_PASSWORDS_LOCKOUT:
+
+               if (!test_Password_lockout_wrap(p, tctx, base_acct_flags,
+                                               base_acct_name,
+                                               domain_handle,
+                                               user_handle, &password,
+                                               machine_credentials))
+               {
+                       ret = false;
+               }
+
+               if (ret == true) {
+                       torture_comment(tctx, "lockout test succeeded\n");
+               } else {
+                       torture_warning(tctx, "lockout test failed\n");
+               }
+
+               break;
+
+
        case TORTURE_SAMR_USER_PRIVILEGES: {
 
                struct dcerpc_pipe *lp;
@@ -7000,6 +7405,7 @@ static bool test_OpenDomain(struct dcerpc_pipe *p, struct 
torture_context *tctx,
                break;
        case TORTURE_SAMR_PASSWORDS_PWDLASTSET:
        case TORTURE_SAMR_PASSWORDS_BADPWDCOUNT:
+       case TORTURE_SAMR_PASSWORDS_LOCKOUT:
                if (!torture_setting_bool(tctx, "samba3", false)) {
                        ret &= test_CreateUser2(p, tctx, &domain_handle, sid, 
ctx->choice, ctx->machine_credentials);
                }
@@ -7639,3 +8045,48 @@ struct torture_suite 
*torture_rpc_samr_passwords_badpwdcount(TALLOC_CTX *mem_ctx
 
        return suite;
 }
+
+static bool torture_rpc_samr_lockout(struct torture_context *torture,
+                                    struct dcerpc_pipe *p2,
+                                    struct cli_credentials 
*machine_credentials)
+{
+       NTSTATUS status;
+       struct dcerpc_pipe *p;
+       bool ret = true;
+       struct torture_samr_context *ctx;
+
+       status = torture_rpc_connection(torture, &p, &ndr_table_samr);
+       if (!NT_STATUS_IS_OK(status)) {
+               return false;
+       }
+
+       ctx = talloc_zero(torture, struct torture_samr_context);
+
+       ctx->choice = TORTURE_SAMR_PASSWORDS_LOCKOUT;
+       ctx->machine_credentials = machine_credentials;
+
+       ret &= test_Connect(p, torture, &ctx->handle);
+
+       ret &= test_EnumDomains(p, torture, ctx);
+
+       ret &= test_samr_handle_Close(p, torture, &ctx->handle);
+
+       return ret;
+}
+
+struct torture_suite *torture_rpc_samr_passwords_lockout(TALLOC_CTX *mem_ctx)
+{
+       struct torture_suite *suite = torture_suite_create(mem_ctx, 
"SAMR-PASSWORDS-LOCKOUT");
+       struct torture_rpc_tcase *tcase;
+


-- 
Samba Shared Repository

Reply via email to