1 # Tests for Tests for source4/dsdb/samdb/ldb_modules/password_hash.c
3 # Copyright (C) Catalyst IT Ltd. 2017
5 # This program is free software; you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation; either version 3 of the License, or
8 # (at your option) any later version.
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
20 Tests for source4/dsdb/samdb/ldb_modules/password_hash.c
21 These tests need to be run in an environment in which
22 io->ac->gpg_key_ids != NULL, so that the gpg supplemental credentials
23 are generated. The functional level needs to be >= 2008 so that the
24 kerberos newer keys are generated.
28 from samba.tests.password_hash import (
34 from samba.ndr import ndr_unpack
35 from samba.dcerpc import drsblobs
37 from samba.tests.pso import PasswordSettings
40 class PassWordHashGpgmeTests(PassWordHashTests):
43 super(PassWordHashGpgmeTests, self).setUp()
45 def test_default_supplementalCredentials(self):
47 if not self.lp.get("password hash gpg key ids"):
48 self.skipTest("No password hash gpg key ids, " +
49 "Primary:SambaGPG will not be generated");
51 sc = self.get_supplemental_creds()
53 # Check that we got all the expected supplemental credentials
54 # And they are in the expected order.
55 size = len(sc.sub.packages)
56 self.assertEquals(5, size)
57 (pos, package) = get_package(sc, "Primary:Kerberos-Newer-Keys")
58 self.assertEquals(1, pos)
59 self.assertEquals("Primary:Kerberos-Newer-Keys", package.name)
61 (pos, package) = get_package(sc, "Primary:Kerberos")
62 self.assertEquals(2, pos)
63 self.assertEquals("Primary:Kerberos", package.name)
65 (pos, wd_package) = get_package(sc, "Primary:WDigest")
66 self.assertEquals(3, pos)
67 self.assertEquals("Primary:WDigest", wd_package.name)
69 (pos, package) = get_package(sc, "Packages")
70 self.assertEquals(4, pos)
71 self.assertEquals("Packages", package.name)
73 (pos, package) = get_package(sc, "Primary:SambaGPG")
74 self.assertEquals(5, pos)
75 self.assertEquals("Primary:SambaGPG", package.name)
77 # Check that the WDigest values are correct.
79 digests = ndr_unpack(drsblobs.package_PrimaryWDigestBlob,
80 binascii.a2b_hex(wd_package.data))
81 self.check_wdigests(digests)
83 def test_supplementalCredentials_cleartext(self):
84 self.add_user(clear_text=True)
85 if not self.lp.get("password hash gpg key ids"):
86 self.skipTest("No password hash gpg key ids, " +
87 "Primary:SambaGPG will not be generated");
89 sc = self.get_supplemental_creds()
91 # Check that we got all the expected supplemental credentials
92 # And they are in the expected order.
93 size = len(sc.sub.packages)
94 self.assertEquals(6, size)
95 (pos, package) = get_package(sc, "Primary:Kerberos-Newer-Keys")
96 self.assertEquals(1, pos)
97 self.assertEquals("Primary:Kerberos-Newer-Keys", package.name)
99 (pos, package) = get_package(sc, "Primary:Kerberos")
100 self.assertEquals(2, pos)
101 self.assertEquals("Primary:Kerberos", package.name)
103 (pos, wd_package) = get_package(sc, "Primary:WDigest")
104 self.assertEquals(3, pos)
105 self.assertEquals("Primary:WDigest", wd_package.name)
107 (pos, ct_package) = get_package(sc, "Primary:CLEARTEXT")
108 self.assertEquals(4, pos)
109 self.assertEquals("Primary:CLEARTEXT", ct_package.name)
111 (pos, package) = get_package(sc, "Packages")
112 self.assertEquals(5, pos)
113 self.assertEquals("Packages", package.name)
115 (pos, package) = get_package(sc, "Primary:SambaGPG")
116 self.assertEquals(6, pos)
117 self.assertEquals("Primary:SambaGPG", package.name)
119 # Check that the WDigest values are correct.
121 digests = ndr_unpack(drsblobs.package_PrimaryWDigestBlob,
122 binascii.a2b_hex(wd_package.data))
123 self.check_wdigests(digests)
125 # Check the clear text value is correct.
126 ct = ndr_unpack(drsblobs.package_PrimaryCLEARTEXTBlob,
127 binascii.a2b_hex(ct_package.data))
128 self.assertEquals(USER_PASS.encode('utf-16-le'), ct.cleartext)
130 def assert_cleartext(self, expect_cleartext, password=None):
131 """Checks cleartext is (or isn't) returned as expected"""
132 sc = self.get_supplemental_creds()
134 (pos, ct_package) = get_package(sc, "Primary:CLEARTEXT")
135 self.assertTrue(ct_package != None, "Failed to retrieve cleartext")
137 # Check the clear-text value is correct.
138 ct = ndr_unpack(drsblobs.package_PrimaryCLEARTEXTBlob,
139 binascii.a2b_hex(ct_package.data))
140 self.assertEquals(password.encode('utf-16-le'), ct.cleartext)
142 ct_package = get_package(sc, "Primary:CLEARTEXT")
143 self.assertTrue(ct_package == None,
144 "Got cleartext when we shouldn't have")
146 def test_supplementalCredentials_cleartext_pso(self):
147 """Checks that a PSO's cleartext setting can override the domain's"""
149 # create a user that stores plain-text passwords
150 self.add_user(clear_text=True)
152 # check that clear-text is present in the supplementary-credentials
153 self.assert_cleartext(expect_cleartext=True, password=USER_PASS)
155 # create a PSO overriding the plain-text setting & apply it to the user
156 no_plaintext_pso = PasswordSettings("no-plaintext-PSO", self.ldb,
158 store_plaintext=False)
159 self.addCleanup(self.ldb.delete, no_plaintext_pso.dn)
160 userdn = "cn=" + USER_NAME + ",cn=users," + self.base_dn
161 no_plaintext_pso.apply_to(userdn)
163 # set the password to update the cleartext password stored
164 new_password = samba.generate_random_password(32, 32)
165 self.ldb.setpassword("(sAMAccountName=%s)" % USER_NAME, new_password)
167 # this time cleartext shouldn't be in the supplementary creds
168 self.assert_cleartext(expect_cleartext=False)
170 # unapply PSO, update password, and check we get the cleartext again
171 no_plaintext_pso.unapply(userdn)
172 new_password = samba.generate_random_password(32, 32)
173 self.ldb.setpassword("(sAMAccountName=%s)" % USER_NAME, new_password)
174 self.assert_cleartext(expect_cleartext=True, password=new_password)
176 # Now update the domain setting and check we no longer get cleartext
177 self.set_store_cleartext(False)
178 new_password = samba.generate_random_password(32, 32)
179 self.ldb.setpassword("(sAMAccountName=%s)" % USER_NAME, new_password)
180 self.assert_cleartext(expect_cleartext=False)
182 # create a PSO overriding the domain setting & apply it to the user
183 plaintext_pso = PasswordSettings("plaintext-PSO", self.ldb,
184 precedence=100, store_plaintext=True)
185 self.addCleanup(self.ldb.delete, plaintext_pso.dn)
186 plaintext_pso.apply_to(userdn)
187 new_password = samba.generate_random_password(32, 32)
188 self.ldb.setpassword("(sAMAccountName=%s)" % USER_NAME, new_password)
189 self.assert_cleartext(expect_cleartext=True, password=new_password)
191 def test_userPassword_multiple_hashes(self):
192 self.add_user(options=[(
193 "password hash userPassword schemes",
194 "CryptSHA512 CryptSHA256 CryptSHA512")])
196 sc = self.get_supplemental_creds()
198 # Check that we got all the expected supplemental credentials
199 # And they are in the expected order.
200 size = len(sc.sub.packages)
201 self.assertEquals(6, size)
203 (pos, package) = get_package(sc, "Primary:Kerberos-Newer-Keys")
204 self.assertEquals(1, pos)
205 self.assertEquals("Primary:Kerberos-Newer-Keys", package.name)
207 (pos, package) = get_package(sc, "Primary:Kerberos")
208 self.assertEquals(2, pos)
209 self.assertEquals("Primary:Kerberos", package.name)
211 (pos, wp_package) = get_package(sc, "Primary:WDigest")
212 self.assertEquals(3, pos)
213 self.assertEquals("Primary:WDigest", wp_package.name)
215 (pos, up_package) = get_package(sc, "Primary:userPassword")
216 self.assertEquals(4, pos)
217 self.assertEquals("Primary:userPassword", up_package.name)
219 (pos, package) = get_package(sc, "Packages")
220 self.assertEquals(5, pos)
221 self.assertEquals("Packages", package.name)
223 (pos, package) = get_package(sc, "Primary:SambaGPG")
224 self.assertEquals(6, pos)
225 self.assertEquals("Primary:SambaGPG", package.name)
227 # Check that the WDigest values are correct.
229 digests = ndr_unpack(drsblobs.package_PrimaryWDigestBlob,
230 binascii.a2b_hex(wp_package.data))
231 self.check_wdigests(digests)
233 # Check that the userPassword hashes are computed correctly
234 # Expect three hashes to be calculated
235 up = ndr_unpack(drsblobs.package_PrimaryUserPasswordBlob,
236 binascii.a2b_hex(up_package.data))
237 self.checkUserPassword(up, [
238 ("{CRYPT}", "6", None),
239 ("{CRYPT}", "5", None),
240 ("{CRYPT}", "6", None)
242 self.checkNtHash(USER_PASS, up.current_nt_hash.hash)
244 def test_userPassword_multiple_hashes_rounds_specified(self):
245 self.add_user(options=[(
246 "password hash userPassword schemes",
247 "CryptSHA512:rounds=5120 CryptSHA256:rounds=2560 CryptSHA512:rounds=5122")])
249 sc = self.get_supplemental_creds()
251 # Check that we got all the expected supplemental credentials
252 # And they are in the expected order.
253 size = len(sc.sub.packages)
254 self.assertEquals(6, size)
256 (pos, package) = get_package(sc, "Primary:Kerberos-Newer-Keys")
257 self.assertEquals(1, pos)
258 self.assertEquals("Primary:Kerberos-Newer-Keys", package.name)
260 (pos, package) = get_package(sc, "Primary:Kerberos")
261 self.assertEquals(2, pos)
262 self.assertEquals("Primary:Kerberos", package.name)
264 (pos, wp_package) = get_package(sc, "Primary:WDigest")
265 self.assertEquals(3, pos)
266 self.assertEquals("Primary:WDigest", wp_package.name)
268 (pos, up_package) = get_package(sc, "Primary:userPassword")
269 self.assertEquals(4, pos)
270 self.assertEquals("Primary:userPassword", up_package.name)
272 (pos, package) = get_package(sc, "Packages")
273 self.assertEquals(5, pos)
274 self.assertEquals("Packages", package.name)
276 (pos, package) = get_package(sc, "Primary:SambaGPG")
277 self.assertEquals(6, pos)
278 self.assertEquals("Primary:SambaGPG", package.name)
280 # Check that the WDigest values are correct.
282 digests = ndr_unpack(drsblobs.package_PrimaryWDigestBlob,
283 binascii.a2b_hex(wp_package.data))
284 self.check_wdigests(digests)
286 # Check that the userPassword hashes are computed correctly
287 # Expect three hashes to be calculated
288 up = ndr_unpack(drsblobs.package_PrimaryUserPasswordBlob,
289 binascii.a2b_hex(up_package.data))
290 self.checkUserPassword(up, [
291 ("{CRYPT}", "6", 5120),
292 ("{CRYPT}", "5", 2560),
293 ("{CRYPT}", "6", 5122)
295 self.checkNtHash(USER_PASS, up.current_nt_hash.hash)