| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344 |
- # --- BEGIN COPYRIGHT BLOCK ---
- # Copyright (C) 2015 Red Hat, Inc.
- # All rights reserved.
- #
- # License: GPL (version 3 or any later version).
- # See LICENSE for details.
- # --- END COPYRIGHT BLOCK ---
- #
- import os
- import sys
- import time
- import ldap
- import logging
- import pytest
- from lib389 import DirSrv, Entry, tools
- from lib389.tools import DirSrvTools
- from lib389._constants import *
- from lib389.properties import *
- log = logging.getLogger(__name__)
- installation_prefix = None
- CONFIG_DN = 'cn=config'
- ADMIN_NAME = 'passwd_admin'
- ADMIN_DN = 'cn=%s,%s' % (ADMIN_NAME, SUFFIX)
- ADMIN_PWD = 'adminPassword_1'
- ENTRY_NAME = 'Joe Schmo'
- ENTRY_DN = 'cn=%s,%s' % (ENTRY_NAME, SUFFIX)
- INVALID_PWDS = ('2_Short', 'No_Number', 'N0Special', '{SSHA}bBy8UdtPZwu8uZna9QOYG3Pr41RpIRVDl8wddw==')
- class TopologyStandalone(object):
- def __init__(self, standalone):
- standalone.open()
- self.standalone = standalone
- @pytest.fixture(scope="module")
- def topology(request):
- '''
- This fixture is used to standalone topology for the 'module'.
- '''
- global installation_prefix
- if installation_prefix:
- args_instance[SER_DEPLOYED_DIR] = installation_prefix
- standalone = DirSrv(verbose=False)
- # Args for the standalone instance
- args_instance[SER_HOST] = HOST_STANDALONE
- args_instance[SER_PORT] = PORT_STANDALONE
- args_instance[SER_SERVERID_PROP] = SERVERID_STANDALONE
- args_standalone = args_instance.copy()
- standalone.allocate(args_standalone)
- # Get the status of the instance and restart it if it exists
- instance_standalone = standalone.exists()
- # Remove the instance
- if instance_standalone:
- standalone.delete()
- # Create the instance
- standalone.create()
- # Used to retrieve configuration information (dbdir, confdir...)
- standalone.open()
- # clear the tmp directory
- standalone.clearTmpDir(__file__)
- # Here we have standalone instance up and running
- return TopologyStandalone(standalone)
- def test_ticket47900(topology):
- """
- Test that password administrators/root DN can
- bypass password syntax/policy.
- We need to test how passwords are modified in
- existing entries, and when adding new entries.
- Create the Password Admin entry, but do not set
- it as an admin yet. Use the entry to verify invalid
- passwords are caught. Then activate the password
- admin and make sure it can bypass password policy.
- """
- # Prepare the Password Administator
- entry = Entry(ADMIN_DN)
- entry.setValues('objectclass', 'top', 'person')
- entry.setValues('sn', ADMIN_NAME)
- entry.setValues('cn', ADMIN_NAME)
- entry.setValues('userpassword', ADMIN_PWD)
- topology.standalone.log.info("Creating Password Administator entry %s..." % ADMIN_DN)
- try:
- topology.standalone.add_s(entry)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Unexpected result ' + e.message['desc'])
- assert False
- topology.standalone.log.error("Failed to add Password Administator %s, error: %s "
- % (ADMIN_DN, e.message['desc']))
- assert False
- topology.standalone.log.info("Configuring password policy...")
- try:
- topology.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-pwpolicy-local' , 'on'),
- (ldap.MOD_REPLACE, 'passwordCheckSyntax', 'on'),
- (ldap.MOD_REPLACE, 'passwordMinCategories' , '1'),
- (ldap.MOD_REPLACE, 'passwordMinTokenLength' , '1'),
- (ldap.MOD_REPLACE, 'passwordExp' , 'on'),
- (ldap.MOD_REPLACE, 'passwordMinDigits' , '1'),
- (ldap.MOD_REPLACE, 'passwordMinSpecials' , '1')])
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed configure password policy: ' + e.message['desc'])
- assert False
- #
- # Add an aci to allow everyone all access (just makes things easier)
- #
- topology.standalone.log.info("Add aci to allow password admin to add/update entries...")
- ACI_TARGET = "(target = \"ldap:///%s\")" % SUFFIX
- ACI_TARGETATTR = "(targetattr = *)"
- ACI_ALLOW = "(version 3.0; acl \"Password Admin Access\"; allow (all) "
- ACI_SUBJECT = "(userdn = \"ldap:///anyone\");)"
- ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- try:
- topology.standalone.modify_s(SUFFIX, mod)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to add aci for password admin: ' + e.message['desc'])
- assert False
- #
- # Bind as the Password Admin
- #
- topology.standalone.log.info("Bind as the Password Administator (before activating)...")
- try:
- topology.standalone.simple_bind_s(ADMIN_DN, ADMIN_PWD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to bind as the Password Admin: ' + e.message['desc'])
- assert False
- #
- # Setup our test entry, and test password policy is working
- #
- entry = Entry(ENTRY_DN)
- entry.setValues('objectclass', 'top', 'person')
- entry.setValues('sn', ENTRY_NAME)
- entry.setValues('cn', ENTRY_NAME)
- #
- # Start by attempting to add an entry with an invalid password
- #
- topology.standalone.log.info("Attempt to add entries with invalid passwords, these adds should fail...")
- for passwd in INVALID_PWDS:
- failed_as_expected = False
- entry.setValues('userpassword', passwd)
- topology.standalone.log.info("Create a regular user entry %s with password (%s)..." % (ENTRY_DN, passwd))
- try:
- topology.standalone.add_s(entry)
- except ldap.LDAPError as e:
- # We failed as expected
- failed_as_expected = True
- topology.standalone.log.info('Add failed as expected: password (%s) result (%s)'
- % (passwd, e.message['desc']))
- if not failed_as_expected:
- topology.standalone.log.error("We were incorrectly able to add an entry " +
- "with an invalid password (%s)" % (passwd))
- assert False
- #
- # Now activate a password administator, bind as root dn to do the config
- # update, then rebind as the password admin
- #
- topology.standalone.log.info("Activate the Password Administator...")
- # Bind as Root DN
- try:
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Root DN failed to authenticate: ' + e.message['desc'])
- assert False
- # Update config
- try:
- topology.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'passwordAdminDN', ADMIN_DN)])
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to add password admin to config: ' + e.message['desc'])
- assert False
- # Bind as Password Admin
- try:
- topology.standalone.simple_bind_s(ADMIN_DN, ADMIN_PWD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to bind as the Password Admin: ' + e.message['desc'])
- assert False
- #
- # Start adding entries with invalid passwords, delete the entry after each pass.
- #
- for passwd in INVALID_PWDS:
- entry.setValues('userpassword', passwd)
- topology.standalone.log.info("Create a regular user entry %s with password (%s)..." % (ENTRY_DN, passwd))
- try:
- topology.standalone.add_s(entry)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to add entry with password (%s) result (%s)'
- % (passwd, e.message['desc']))
- assert False
- topology.standalone.log.info('Succesfully added entry (%s)' % ENTRY_DN)
- # Delete entry for the next pass
- try:
- topology.standalone.delete_s(ENTRY_DN)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to delete entry: %s' % (e.message['desc']))
- assert False
- #
- # Add the entry for the next round of testing (modify password)
- #
- entry.setValues('userpassword', ADMIN_PWD)
- try:
- topology.standalone.add_s(entry)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to add entry with valid password (%s) result (%s)'
- % (passwd, e.message['desc']))
- assert False
- #
- # Deactivate the password admin and make sure invalid password updates fail
- #
- topology.standalone.log.info("Deactivate Password Administator and try invalid password updates...")
- # Bind as root DN
- try:
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Root DN failed to authenticate: ' + e.message['desc'])
- assert False
- # Update config
- try:
- topology.standalone.modify_s(CONFIG_DN, [(ldap.MOD_DELETE, 'passwordAdminDN', None)])
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to remove password admin from config: ' + e.message['desc'])
- assert False
- # Bind as Password Admin
- try:
- topology.standalone.simple_bind_s(ADMIN_DN, ADMIN_PWD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to bind as the Password Admin: ' + e.message['desc'])
- assert False
- #
- # Make invalid password updates that should fail
- #
- for passwd in INVALID_PWDS:
- failed_as_expected = False
- entry.setValues('userpassword', passwd)
- try:
- topology.standalone.modify_s(ENTRY_DN, [(ldap.MOD_REPLACE, 'userpassword', passwd)])
- except ldap.LDAPError as e:
- # We failed as expected
- failed_as_expected = True
- topology.standalone.log.info('Password update failed as expected: password (%s) result (%s)'
- % (passwd, e.message['desc']))
- if not failed_as_expected:
- topology.standalone.log.error("We were incorrectly able to add an invalid password (%s)"
- % (passwd))
- assert False
- #
- # Now activate a password administator
- #
- topology.standalone.log.info("Activate Password Administator and try updates again...")
- # Bind as root DN
- try:
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Root DN failed to authenticate: ' + e.message['desc'])
- assert False
- # Update config
- try:
- topology.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'passwordAdminDN', ADMIN_DN)])
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to add password admin to config: ' + e.message['desc'])
- assert False
- # Bind as Password Admin
- try:
- topology.standalone.simple_bind_s(ADMIN_DN, ADMIN_PWD)
- except ldap.LDAPError as e:
- topology.standalone.log.error('Failed to bind as the Password Admin: ' + e.message['desc'])
- assert False
- #
- # Make the same password updates, but this time they should succeed
- #
- for passwd in INVALID_PWDS:
- entry.setValues('userpassword', passwd)
- try:
- topology.standalone.modify_s(ENTRY_DN, [(ldap.MOD_REPLACE, 'userpassword', passwd)])
- except ldap.LDAPError as e:
- topology.standalone.log.error('Password update failed unexpectedly: password (%s) result (%s)'
- % (passwd, e.message['desc']))
- assert False
- topology.standalone.log.info('Password update succeeded (%s)' % passwd)
- def test_ticket47900_final(topology):
- topology.standalone.delete()
- log.info('Testcase PASSED')
- def run_isolated():
- '''
- run_isolated is used to run these test cases independently of a test scheduler (xunit, py.test..)
- To run isolated without py.test, you need to
- - edit this file and comment '@pytest.fixture' line before 'topology' function.
- - set the installation prefix
- - run this program
- '''
- global installation_prefix
- installation_prefix = None
- topo = topology(True)
- test_ticket47900(topo)
- test_ticket47900_final(topo)
- if __name__ == '__main__':
- run_isolated()
|