2 Unix SMB/CIFS implementation.
3 test suite for session setup operations
4 Copyright (C) Gregor Beck 2012
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "torture/raw/proto.h"
24 #include "smb_composite/smb_composite.h"
25 #include "lib/cmdline/popt_common.h"
26 #include "param/param.h"
27 #include "torture/util.h"
28 #include "auth/credentials/credentials.h"
29 #include "libcli/resolve/resolve.h"
32 static bool test_session_reauth1(struct torture_context
*tctx
,
33 struct smbcli_state
*cli
)
36 struct smb_composite_sesssetup io
;
43 uint16_t vuid1
= cli
->session
->vuid
;
45 data
= generate_random_str(tctx
, dlen
);
46 torture_assert(tctx
, (data
!= NULL
), "memory allocation failed");
47 snprintf(fname
, sizeof(fname
), "raw_session_reconnect_%.8s.dat", data
);
49 fnum
= smbcli_nt_create_full(cli
->tree
, fname
, 0,
51 FILE_ATTRIBUTE_NORMAL
,
52 NTCREATEX_SHARE_ACCESS_NONE
,
53 NTCREATEX_DISP_OPEN_IF
,
54 NTCREATEX_OPTIONS_DELETE_ON_CLOSE
,
56 torture_assert_ntstatus_ok_goto(tctx
, smbcli_nt_error(cli
->tree
), ok
,
58 torture_assert_goto(tctx
, fnum
> 0, ok
, done
, "create file");
60 num
= smbcli_smbwrite(cli
->tree
, fnum
, data
, 0, dlen
);
61 torture_assert_int_equal_goto(tctx
, num
, dlen
, ok
, done
, "write file");
64 io
.in
.sesskey
= cli
->transport
->negotiate
.sesskey
;
65 io
.in
.capabilities
= cli
->transport
->negotiate
.capabilities
;
66 io
.in
.credentials
= cmdline_credentials
;
67 io
.in
.workgroup
= lpcfg_workgroup(tctx
->lp_ctx
);
68 io
.in
.gensec_settings
= lpcfg_gensec_settings(tctx
, tctx
->lp_ctx
);
69 status
= smb_composite_sesssetup(cli
->session
, &io
);
70 torture_assert_ntstatus_ok_goto(tctx
, status
, ok
, done
, "setup2");
71 torture_assert_int_equal_goto(tctx
, io
.out
.vuid
, vuid1
, ok
, done
, "setup2");
75 num
= smbcli_read(cli
->tree
, fnum
, &buf
, 0, dlen
);
76 torture_assert_int_equal_goto(tctx
, num
, dlen
, ok
, done
, "read file");
77 torture_assert_str_equal_goto(tctx
, buf
, data
, ok
, done
, "read file");
83 status
= smbcli_close(cli
->tree
, fnum
);
84 torture_assert_ntstatus_ok(tctx
, status
, "close");
89 static bool test_session_reauth2_oplock_timeout(
90 struct smbcli_transport
*transport
, uint16_t tid
, uint16_t fnum
,
91 uint8_t level
, void *private_data
)
96 static bool test_session_reauth2(struct torture_context
*tctx
,
97 struct smbcli_state
*cli
)
101 union smb_open io_open
;
102 struct smb_composite_sesssetup io_sesssetup
;
103 union smb_fileinfo io_qsecdesc
;
104 struct smbcli_request
*req
;
105 struct cli_credentials
*anon_creds
;
109 uint16_t vuid1
= cli
->session
->vuid
;
111 random_string
= generate_random_str(tctx
, 8);
112 torture_assert(tctx
, (random_string
!= NULL
),
113 "memory allocation failed");
114 fname
= talloc_asprintf(tctx
, "raw_session_reauth2_%s.dat",
116 talloc_free(random_string
);
117 torture_assert(tctx
, (fname
!= NULL
), "memory allocation failed");
119 smbcli_unlink(cli
->tree
, fname
);
120 smbcli_oplock_handler(cli
->transport
,
121 test_session_reauth2_oplock_timeout
,
127 ZERO_STRUCT(io_open
);
128 io_open
.generic
.level
= RAW_OPEN_NTCREATEX
;
129 io_open
.ntcreatex
.in
.root_fid
.fnum
= 0;
130 io_open
.ntcreatex
.in
.access_mask
= SEC_RIGHTS_FILE_READ
|
131 SEC_RIGHTS_FILE_WRITE
| SEC_STD_DELETE
;
132 io_open
.ntcreatex
.in
.alloc_size
= 0;
133 io_open
.ntcreatex
.in
.file_attr
= FILE_ATTRIBUTE_NORMAL
;
134 io_open
.ntcreatex
.in
.share_access
= NTCREATEX_SHARE_ACCESS_READ
|
135 NTCREATEX_SHARE_ACCESS_WRITE
;
136 io_open
.ntcreatex
.in
.open_disposition
= NTCREATEX_DISP_OPEN_IF
;
137 io_open
.ntcreatex
.in
.create_options
= 0;
138 io_open
.ntcreatex
.in
.impersonation
= NTCREATEX_IMPERSONATION_ANONYMOUS
;
139 io_open
.ntcreatex
.in
.security_flags
= 0;
140 io_open
.ntcreatex
.in
.fname
= fname
;
142 torture_comment(tctx
, "open with batch oplock\n");
143 io_open
.ntcreatex
.in
.flags
= NTCREATEX_FLAGS_EXTENDED
|
144 NTCREATEX_FLAGS_REQUEST_OPLOCK
|
145 NTCREATEX_FLAGS_REQUEST_BATCH_OPLOCK
;
147 status
= smb_raw_open(cli
->tree
, tctx
, &io_open
);
148 torture_assert_ntstatus_ok(tctx
, status
, "smb_raw_open failed");
150 fnum
= io_open
.ntcreatex
.out
.file
.fnum
;
153 (io_open
.ntcreatex
.out
.oplock_level
== BATCH_OPLOCK_RETURN
),
154 "did not get batch oplock");
156 io_open
.ntcreatex
.in
.flags
= NTCREATEX_FLAGS_EXTENDED
;
157 req
= smb_raw_open_send(cli
->tree
, &io_open
);
158 torture_assert(tctx
, (req
!= NULL
), "memory allocation failed");
161 * Make sure the open went through
163 status
= smbcli_chkpath(cli
->tree
, "\\");
164 torture_assert_ntstatus_ok(tctx
, status
, "smb_chkpath failed");
166 status
= smbcli_nt_delete_on_close(cli
->tree
, fnum
, true);
167 torture_assert_ntstatus_ok(tctx
, status
, "could not set delete on "
170 anon_creds
= cli_credentials_init_anon(tctx
);
171 torture_assert(tctx
, (anon_creds
!= NULL
), "memory allocation failed");
173 ZERO_STRUCT(io_sesssetup
);
174 io_sesssetup
.in
.sesskey
= cli
->transport
->negotiate
.sesskey
;
175 io_sesssetup
.in
.capabilities
= cli
->transport
->negotiate
.capabilities
;
176 io_sesssetup
.in
.credentials
= anon_creds
;
177 io_sesssetup
.in
.workgroup
= lpcfg_workgroup(tctx
->lp_ctx
);
178 io_sesssetup
.in
.gensec_settings
= lpcfg_gensec_settings(
180 status
= smb_composite_sesssetup(cli
->session
, &io_sesssetup
);
181 torture_assert_ntstatus_ok(tctx
, status
, "setup2 failed");
182 torture_assert_int_equal(tctx
, io_sesssetup
.out
.vuid
, vuid1
, "setup2");
184 status
= smbcli_close(cli
->tree
, fnum
);
185 torture_assert_ntstatus_ok(tctx
, status
, "close failed");
187 status
= smb_raw_open_recv(req
, tctx
, &io_open
);
188 torture_assert_ntstatus_ok(tctx
, status
, "2nd open failed");
190 fnum
= io_open
.ntcreatex
.out
.file
.fnum
;
192 nwritten
= smbcli_write(cli
->tree
, fnum
, 0, fname
, 0, strlen(fname
));
193 torture_assert(tctx
, (nwritten
== strlen(fname
)),
194 "smbcli_write failed");
196 ZERO_STRUCT(io_qsecdesc
);
197 io_qsecdesc
.query_secdesc
.level
= RAW_FILEINFO_SEC_DESC
;
198 io_qsecdesc
.query_secdesc
.in
.file
.fnum
= fnum
;
199 io_qsecdesc
.query_secdesc
.in
.secinfo_flags
= SECINFO_OWNER
;
200 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &io_qsecdesc
);
201 torture_assert_ntstatus_equal(
202 tctx
, status
, NT_STATUS_ACCESS_DENIED
,
203 "anon qsecdesc did not return ACCESS_DENIED");
205 ZERO_STRUCT(io_sesssetup
);
206 io_sesssetup
.in
.sesskey
= cli
->transport
->negotiate
.sesskey
;
207 io_sesssetup
.in
.capabilities
= cli
->transport
->negotiate
.capabilities
;
208 io_sesssetup
.in
.credentials
= cmdline_credentials
;
209 io_sesssetup
.in
.workgroup
= lpcfg_workgroup(tctx
->lp_ctx
);
210 io_sesssetup
.in
.gensec_settings
= lpcfg_gensec_settings(
212 status
= smb_composite_sesssetup(cli
->session
, &io_sesssetup
);
213 torture_assert_ntstatus_ok(tctx
, status
, "setup3 failed");
214 torture_assert_int_equal(tctx
, io_sesssetup
.out
.vuid
, vuid1
, "setup2");
216 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &io_qsecdesc
);
217 torture_assert_ntstatus_ok(tctx
, status
, "2nd qsecdesc failed");
219 status
= smbcli_nt_delete_on_close(cli
->tree
, fnum
, true);
220 torture_assert_ntstatus_ok(tctx
, status
, "could not set delete on "
223 status
= smbcli_close(cli
->tree
, fnum
);
224 torture_assert_ntstatus_ok(tctx
, status
, "close failed");
229 static bool test_session_expire1(struct torture_context
*tctx
)
233 struct smbcli_options options
;
234 struct smbcli_session_options session_options
;
235 const char *host
= torture_setting_string(tctx
, "host", NULL
);
236 const char *share
= torture_setting_string(tctx
, "share", NULL
);
237 struct cli_credentials
*credentials
= cmdline_credentials
;
238 struct smbcli_state
*cli
= NULL
;
239 enum credentials_use_kerberos use_kerberos
;
241 union smb_fileinfo qfinfo
;
244 struct smb_composite_sesssetup io_sesssetup
;
247 use_kerberos
= cli_credentials_get_kerberos_state(credentials
);
248 if (use_kerberos
!= CRED_MUST_USE_KERBEROS
) {
249 torture_warning(tctx
, "smb2.session.expire1 requires -k yes!");
250 torture_skip(tctx
, "smb2.session.expire1 requires -k yes!");
253 torture_assert_int_equal(tctx
, use_kerberos
, CRED_MUST_USE_KERBEROS
,
254 "please use -k yes");
256 lpcfg_set_option(tctx
->lp_ctx
, "gensec_gssapi:requested_life_time=4");
258 lpcfg_smbcli_options(tctx
->lp_ctx
, &options
);
260 lpcfg_smbcli_session_options(tctx
->lp_ctx
, &session_options
);
262 status
= smbcli_full_connection(tctx
, &cli
,
264 lpcfg_smb_ports(tctx
->lp_ctx
),
266 lpcfg_socket_options(tctx
->lp_ctx
),
268 lpcfg_resolve_context(tctx
->lp_ctx
),
269 tctx
->ev
, &options
, &session_options
,
270 lpcfg_gensec_settings(tctx
, tctx
->lp_ctx
));
271 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
272 "smbcli_full_connection failed");
274 vuid
= cli
->session
->vuid
;
276 /* Add some random component to the file name. */
277 snprintf(fname
, 256, "session_expire1_%s.dat",
278 generate_random_str(tctx
, 8));
280 smbcli_unlink(cli
->tree
, fname
);
282 fnum
= smbcli_nt_create_full(cli
->tree
, fname
, 0,
284 FILE_ATTRIBUTE_NORMAL
,
285 NTCREATEX_SHARE_ACCESS_NONE
,
286 NTCREATEX_DISP_OPEN_IF
,
287 NTCREATEX_OPTIONS_DELETE_ON_CLOSE
,
289 torture_assert_ntstatus_ok_goto(tctx
, smbcli_nt_error(cli
->tree
), ret
,
290 done
, "create file");
291 torture_assert_goto(tctx
, fnum
> 0, ret
, done
, "create file");
293 /* get the access information */
297 qfinfo
.access_information
.level
= RAW_FILEINFO_ACCESS_INFORMATION
;
298 qfinfo
.access_information
.in
.file
.fnum
= fnum
;
300 for (i
=0; i
< 2; i
++) {
301 torture_comment(tctx
, "query info => OK\n");
302 ZERO_STRUCT(qfinfo
.access_information
.out
);
303 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &qfinfo
);
304 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
305 "raw_fileinfo failed");
307 torture_comment(tctx
, "sleep 5 seconds\n");
312 * the krb5 library may not handle expired creds
313 * well, lets start with an empty ccache.
315 cli_credentials_invalidate_ccache(credentials
, CRED_SPECIFIED
);
318 * now with CAP_DYNAMIC_REAUTH
320 * This should trigger NT_STATUS_NETWORK_SESSION_EXPIRED
322 ZERO_STRUCT(io_sesssetup
);
323 io_sesssetup
.in
.sesskey
= cli
->transport
->negotiate
.sesskey
;
324 io_sesssetup
.in
.capabilities
= cli
->transport
->negotiate
.capabilities
;
325 io_sesssetup
.in
.capabilities
|= CAP_DYNAMIC_REAUTH
;
326 io_sesssetup
.in
.credentials
= credentials
;
327 io_sesssetup
.in
.workgroup
= lpcfg_workgroup(tctx
->lp_ctx
);
328 io_sesssetup
.in
.gensec_settings
= lpcfg_gensec_settings(tctx
,
331 torture_comment(tctx
, "reauth with CAP_DYNAMIC_REAUTH => OK\n");
332 ZERO_STRUCT(io_sesssetup
.out
);
333 status
= smb_composite_sesssetup(cli
->session
, &io_sesssetup
);
334 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
336 torture_assert_int_equal_goto(tctx
, io_sesssetup
.out
.vuid
, vuid
,
337 ret
, done
, "reauth");
339 for (i
=0; i
< 2; i
++) {
340 torture_comment(tctx
, "query info => OK\n");
341 ZERO_STRUCT(qfinfo
.access_information
.out
);
342 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &qfinfo
);
343 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
344 "raw_fileinfo failed");
346 torture_comment(tctx
, "sleep 5 seconds\n");
349 torture_comment(tctx
, "query info => EXPIRED\n");
350 ZERO_STRUCT(qfinfo
.access_information
.out
);
351 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &qfinfo
);
352 torture_assert_ntstatus_equal_goto(tctx
, status
,
353 NT_STATUS_NETWORK_SESSION_EXPIRED
,
354 ret
, done
, "raw_fileinfo expired");
357 * the krb5 library may not handle expired creds
358 * well, lets start with an empty ccache.
360 cli_credentials_invalidate_ccache(credentials
, CRED_SPECIFIED
);
362 torture_comment(tctx
, "reauth with CAP_DYNAMIC_REAUTH => OK\n");
363 ZERO_STRUCT(io_sesssetup
.out
);
364 status
= smb_composite_sesssetup(cli
->session
, &io_sesssetup
);
365 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
367 torture_assert_int_equal_goto(tctx
, io_sesssetup
.out
.vuid
, vuid
,
368 ret
, done
, "reauth");
371 torture_comment(tctx
, "query info => OK\n");
372 ZERO_STRUCT(qfinfo
.access_information
.out
);
373 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &qfinfo
);
374 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
375 "raw_fileinfo failed");
378 * the krb5 library may not handle expired creds
379 * well, lets start with an empty ccache.
381 cli_credentials_invalidate_ccache(credentials
, CRED_SPECIFIED
);
384 * now without CAP_DYNAMIC_REAUTH
386 * This should not trigger NT_STATUS_NETWORK_SESSION_EXPIRED
388 torture_comment(tctx
, "reauth without CAP_DYNAMIC_REAUTH => OK\n");
389 io_sesssetup
.in
.capabilities
&= ~CAP_DYNAMIC_REAUTH
;
391 ZERO_STRUCT(io_sesssetup
.out
);
392 status
= smb_composite_sesssetup(cli
->session
, &io_sesssetup
);
393 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
395 torture_assert_int_equal_goto(tctx
, io_sesssetup
.out
.vuid
, vuid
,
396 ret
, done
, "reauth");
398 for (i
=0; i
< 2; i
++) {
399 torture_comment(tctx
, "query info => OK\n");
401 ZERO_STRUCT(qfinfo
.access_information
.out
);
402 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &qfinfo
);
403 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
404 "raw_fileinfo failed");
406 torture_comment(tctx
, "sleep 5 seconds\n");
410 torture_comment(tctx
, "query info => OK\n");
411 ZERO_STRUCT(qfinfo
.access_information
.out
);
412 status
= smb_raw_fileinfo(cli
->tree
, tctx
, &qfinfo
);
413 torture_assert_ntstatus_ok_goto(tctx
, status
, ret
, done
,
414 "raw_fileinfo failed");
419 smbcli_close(cli
->tree
, fnum
);
423 lpcfg_set_option(tctx
->lp_ctx
, "gensec_gssapi:requested_life_time=0");
427 struct torture_suite
*torture_raw_session(TALLOC_CTX
*mem_ctx
)
429 struct torture_suite
*suite
= torture_suite_create(mem_ctx
, "session");
430 suite
->description
= talloc_strdup(suite
, "RAW-SESSION tests");
432 torture_suite_add_1smb_test(suite
, "reauth1", test_session_reauth1
);
433 torture_suite_add_1smb_test(suite
, "reauth2", test_session_reauth2
);
434 torture_suite_add_simple_test(suite
, "expire1", test_session_expire1
);