3 # Blackbox tests for an exported keytab with kinit
5 # Copyright (C) 2006-2007 Jelmer Vernooij <jelmer@samba.org>
6 # Copyright (C) 2006-2008 Andrew Bartlett <abartlet@samba.org>
7 # Copyright (C) Andreas Schneider <asn@cryptomilk.org>
11 Usage: test_extract_keytab.sh SERVER USERNAME REALM DOMAIN PREFIX SMBCLIENT CONFIGURATION
26 .
"$(dirname "${0}")/subunit.sh"
27 .
"$(dirname "${0}")/common_test_fns.inc"
29 samba_bindir
="${BINDIR}"
30 samba_tool
="$samba_bindir/samba-tool"
31 samba_newuser
="$samba_tool user create"
32 samba_ktutil
="${BINDIR}/samba4ktutil"
34 samba_kinit
=$
(system_or_builddir_binary kinit
"${BINDIR}" samba4kinit
)
36 DNSDOMAIN
=$
(echo "${REALM}" |
tr '[:upper:]' '[:lower:]')
37 SERVER_FQDN
="${SERVER}.$(echo "${REALM}" | tr '[:upper:]' '[:lower:]')"
38 SMBCLIENT_UNC
="//${SERVER}/tmp"
40 TEST_USER
="$(mktemp -u keytabtest-XXXXXX)"
41 TEST_PASSWORD
=testPaSS@
01%
45 kbase
="$(basename "${samba_kinit}")"
46 if [ "${kbase}" != "samba4kinit" ]; then
47 krb5_version
="$(krb5-config --version | cut -d ' ' -f 4)"
48 krb5_major_version
="$(echo "${krb5_version}" | awk -F. '{ print $1; }')"
49 krb5_minor_version
="$(echo "${krb5_version}" | awk -F. '{ print $2; }')"
51 # MIT Kerberos < 1.18 has support for DES keys
52 if [ "${krb5_major_version}" -eq 1 ] && [ "${krb5_minor_version}" -lt 18 ]; then
57 if [ "${kbase}" = "samba4kinit" ]; then
59 OPTION_RENEWABLE
="--renewable"
60 OPTION_RENEW_TICKET
="--renew"
61 OPTION_ENTERPRISE_NAME
="--enterprise"
62 OPTION_CANONICALIZATION
=""
63 OPTION_WINDOWS
="--windows"
65 OPTION_USE_KEYTAB
="-k"
66 OPTION_KEYTAB_FILENAME
="-t"
68 KEYTAB_GREP
="[aes|arcfour]"
71 OPTION_RENEWABLE
="-r 1h"
72 OPTION_RENEW_TICKET
="-R"
73 OPTION_ENTERPRISE_NAME
="-E"
74 OPTION_CANONICALIZATION
="-C"
77 OPTION_USE_KEYTAB
="-k"
78 OPTION_KEYTAB_FILENAME
="-t"
80 KEYTAB_GREP
="[DES|AES|ArcFour]"
90 subunit_start_test
"$testname"
92 if [ ! -r "${keytab}" ]; then
93 echo "Could not read keytab: ${keytab}" | \
94 subunit_fail_test
"${testname}"
98 output
=$
($VALGRIND "${samba_ktutil}" "${keytab}" 2>&1)
100 if [ ${status} -ne 0 ]; then
101 echo "${output}" | subunit_fail_test
"${testname}"
105 NKEYS
=$
(echo "${output}" |
grep -i "${principal}" | \
106 grep -c -e "${KEYTAB_GREP}")
107 if [ "${NKEYS}" -ne "${expected_nkeys}" ]; then
108 echo "Unexpected number of keys passed ${NKEYS} != ${expected_nkeys}" | \
109 subunit_fail_test
"${testname}"
113 subunit_pass_test
"${testname}"
117 testit
"create local user ${TEST_USER}" \
118 "${VALGRIND}" "${PYTHON}" "${samba_newuser}" "${TEST_USER}" "${TEST_PASSWORD}" \
119 "${CONFIGURATION}" "$@" || \
120 failed
=$
((failed
+ 1))
122 testit
"dump keytab from domain" \
123 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
124 "${PREFIX}/tmpkeytab-all" \
125 "${CONFIGURATION}" "$@" || \
126 failed
=$
((failed
+ 1))
128 test_keytab
"read keytab from domain" \
129 "${PREFIX}/tmpkeytab-all" "${SERVER}\\\$" "${EXPECTED_NKEYS}" || \
130 failed
=$
((failed
+ 1))
132 testit
"dump keytab from domain (2nd time)" \
133 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
134 "${PREFIX}/tmpkeytab-all" "${CONFIGURATION}" "$@" || \
135 failed
=$
((failed
+ 1))
137 test_keytab
"read keytab from domain (2nd time)" \
138 "${PREFIX}/tmpkeytab-all" "${SERVER}\\\$" "${EXPECTED_NKEYS}" || \
139 failed
=$
((failed
+ 1))
141 testit
"dump keytab from domain for cifs service principal" \
142 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
143 "${PREFIX}/tmpkeytab-server" --principal="cifs/$SERVER_FQDN" \
144 "${CONFIGURATION}" "$@" || \
145 failed
=$
((failed
+ 1))
147 test_keytab
"read keytab from domain for cifs service principal" \
148 "${PREFIX}/tmpkeytab-server" "cifs/${SERVER_FQDN}" \
149 "${EXPECTED_NKEYS}" || \
150 failed
=$
((failed
+ 1))
152 testit
"dump keytab from domain for cifs service principal (2nd time)" \
153 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
154 "$PREFIX/tmpkeytab-server" --principal="cifs/$SERVER_FQDN" \
155 "${CONFIGURATION}" "$@" || \
156 failed
=$
((failed
+ 1))
158 test_keytab
"read keytab from domain for cifs service principal (2nd time)" \
159 "${PREFIX}/tmpkeytab-server" "cifs/${SERVER_FQDN}" \
160 "${EXPECTED_NKEYS}" || \
161 failed
=$
((failed
+ 1))
163 testit
"dump keytab from domain for user principal" \
164 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
165 "${PREFIX}/tmpkeytab-user-princ" --principal="${TEST_USER}" \
166 "${CONFIGURATION}" "$@" || \
167 failed
=$
((failed
+ 1))
169 test_keytab
"read keytab from domain for user principal" \
170 "${PREFIX}/tmpkeytab-user-princ" "${TEST_USER}@${REALM}" \
171 "${EXPECTED_NKEYS}" || \
172 failed
=$
((failed
+ 1))
174 testit
"dump keytab from domain for user principal (2nd time)" \
175 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
176 "${PREFIX}/tmpkeytab-user-princ-2" --principal="${TEST_USER}@${REALM}" \
177 "${CONFIGURATION}" "$@" || \
178 failed
=$
((failed
+ 1))
180 test_keytab
"read keytab from domain for user principal (2nd time)" \
181 "${PREFIX}/tmpkeytab-user-princ-2" "${TEST_USER}@${REALM}" \
182 "${EXPECTED_NKEYS}" || \
183 failed
=$
((failed
+ 1))
185 testit
"dump keytab from domain for user principal with SPN as UPN" \
186 "${VALGRIND}" "${PYTHON}" "${samba_tool}" domain exportkeytab \
187 "${PREFIX}/tmpkeytab-spn-upn" \
188 --principal="http/testupnspn.${DNSDOMAIN}" "${CONFIGURATION}" "$@" || \
189 failed
=$
((failed
+ 1))
191 test_keytab
"read keytab from domain for user principal with SPN as UPN" \
192 "${PREFIX}/tmpkeytab-spn-upn" "http/testupnspn.${DNSDOMAIN}@${REALM}" \
195 KRB5CCNAME_PATH
="${PREFIX}/tmpuserccache"
196 KRB5CCNAME
="FILE:${PREFIX}/tmpuserccache"
199 testit
"kinit with keytab as user" \
200 "${VALGRIND}" "${samba_kinit}" \
201 "${OPTION_USE_KEYTAB}" \
202 "${OPTION_KEYTAB_FILENAME}" "${PREFIX}/tmpkeytab-all" \
203 "${TEST_USER}@${REALM}" || \
204 failed
=$
((failed
+ 1))
206 test_smbclient
"Test login with user kerberos ccache" \
207 "ls" "${SMBCLIENT_UNC}" --use-krb5-ccache="${KRB5CCNAME}" || \
208 failed
=$
((failed
+ 1))
210 testit
"kinit with keytab as user (one princ)" \
211 "${VALGRIND}" "$samba_kinit" \
212 "${OPTION_USE_KEYTAB}" \
213 "${OPTION_KEYTAB_FILENAME}" "${PREFIX}/tmpkeytab-user-princ" \
214 "${TEST_USER}@$REALM" || \
215 failed
=$
((failed
+ 1))
217 test_smbclient
"Test login with user kerberos ccache (one princ)" \
218 "ls" "${SMBCLIENT_UNC}" --use-krb5-ccache="${KRB5CCNAME}" || \
219 failed
=$
((failed
+ 1))
221 rm -f "${KRB5CCNAME_PATH}"
223 KRB5CCNAME_PATH
="${PREFIX}/tmpadminccache"
224 KRB5CCNAME
="FILE:${PREFIX}/tmpadminccache"
227 testit
"kinit with keytab as ${USERNAME}" \
228 "${VALGRIND}" "${samba_kinit}" \
229 "${OPTION_USE_KEYTAB}" \
230 "${OPTION_KEYTAB_FILENAME}" "${PREFIX}/tmpkeytab-all" \
231 "${USERNAME}@${REALM}" || \
232 failed
=$
((failed
+ 1))
234 rm -f "${KRB5CCNAME_PATH}"
236 KRB5CCNAME_PATH
="${PREFIX}/tmpserverccache"
237 KRB5CCNAME
="FILE:${PREFIX}/tmpserverccache"
240 testit
"kinit with SPN from keytab" \
241 "${VALGRIND}" "${samba_kinit}" \
242 "${OPTION_USE_KEYTAB}" \
243 "${OPTION_KEYTAB_FILENAME}" "${PREFIX}/tmpkeytab-spn-upn" \
244 "http/testupnspn.${DNSDOMAIN}" || \
245 failed
=$
((failed
+ 1))
248 testit
"delete user ${TEST_USER}" \
249 "${VALGRIND}" "${PYTHON}" "${samba_tool}" user delete "${TEST_USER}" \
250 --use-krb5-ccache="${KRB5CCNAME}" "${CONFIGURATION}" "$@" || \
251 failed
=$
((failed
+ 1))
253 rm -f "${KRB5CCNAME_PATH}"
254 rm -f "${PREFIX}/tmpadminccache" \
255 "${PREFIX}/tmpuserccache" \
256 "${PREFIX}/tmpkeytab" \
257 "${PREFIX}/tmpkeytab-user-princ" \
258 "${PREFIX}/tmpkeytab-user-princ-2" \
259 "${PREFIX}/tmpkeytab-server" \
260 "${PREFIX}/tmpkeytab-spn-upn" \
261 "${PREFIX}/tmpkeytab-all"