Skip to content

Commit 193f92a

Browse files
test(sspi): add client-server smoke test (#407)
1 parent d7b9ff6 commit 193f92a

File tree

7 files changed

+244
-32
lines changed

7 files changed

+244
-32
lines changed

src/credssp/mod.rs

+37-28
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ impl EarlyUserAuthResult {
125125
EarlyUserAuthResult::from_u32(result).ok_or_else(|| {
126126
io::Error::new(
127127
io::ErrorKind::InvalidData,
128-
format!("Got invalid Early User Authorization Result: {:x}", result),
128+
format!("got invalid Early User Authorization Result: {:x}", result),
129129
)
130130
})
131131
}
@@ -345,7 +345,7 @@ impl CredSspClient {
345345
let pub_key_auth = ts_request.pub_key_auth.take().ok_or_else(|| {
346346
crate::Error::new(
347347
crate::ErrorKind::InvalidToken,
348-
String::from("Expected an encrypted public key"),
348+
String::from("expected an encrypted public key"),
349349
)
350350
})?;
351351
let peer_version = self
@@ -480,7 +480,7 @@ impl<C: CredentialsProxy<AuthenticationData = AuthIdentity>> CredSspServer<C> {
480480
ts_request.auth_info.take().ok_or_else(|| {
481481
crate::Error::new(
482482
crate::ErrorKind::InvalidToken,
483-
String::from("Expected an encrypted ts credentials"),
483+
String::from("expected an encrypted ts credentials"),
484484
)
485485
}),
486486
ts_request
@@ -558,13 +558,13 @@ impl<C: CredentialsProxy<AuthenticationData = AuthIdentity>> CredSspServer<C> {
558558
ts_request.pub_key_auth.take().ok_or_else(|| {
559559
crate::Error::new(
560560
crate::ErrorKind::InvalidToken,
561-
String::from("Expected an encrypted public key"),
561+
String::from("expected an encrypted public key"),
562562
)
563563
}),
564564
ts_request
565565
);
566566
let peer_version = self.context.as_ref().unwrap().peer_version.expect(
567-
"An decrypt public key server function cannot be fired without any incoming TSRequest",
567+
"an decrypt public key server function cannot be fired without any incoming TSRequest",
568568
);
569569
try_cred_ssp_server!(
570570
self.context.as_mut().unwrap().decrypt_public_key(
@@ -641,16 +641,18 @@ impl SspiImpl for SspiContext {
641641
) -> crate::Result<AcquireCredentialsHandleResult<Self::CredentialsHandle>> {
642642
Ok(match self {
643643
SspiContext::Ntlm(ntlm) => {
644-
let auth_identity = if let Some(Credentials::AuthIdentity(identity)) = builder.auth_data {
645-
identity
646-
} else {
647-
return Err(Error::new(
648-
ErrorKind::NoCredentials,
649-
"Auth identity is not provided for the Ntlm",
650-
));
644+
let auth_identity = match builder.auth_data {
645+
Some(Credentials::AuthIdentity(identity)) => Some(identity),
646+
Some(_) => {
647+
return Err(Error::new(
648+
ErrorKind::UnknownCredentials,
649+
"only password-based auth is supported in NTLM",
650+
))
651+
}
652+
None => None,
651653
};
652654
builder
653-
.full_transform(Some(auth_identity))
655+
.full_transform(auth_identity)
654656
.execute(ntlm)?
655657
.transform_credentials_handle(&|a: Option<AuthIdentityBuffers>| {
656658
a.map(CredentialsBuffers::AuthIdentity)
@@ -664,7 +666,7 @@ impl SspiImpl for SspiContext {
664666
} else {
665667
return Err(Error::new(
666668
ErrorKind::NoCredentials,
667-
"Auth identity is not provided for the Pku2u",
669+
"auth identity is not provided for the Pku2u",
668670
));
669671
};
670672
builder
@@ -686,16 +688,23 @@ impl SspiImpl for SspiContext {
686688
) -> crate::Result<AcceptSecurityContextResult> {
687689
match self {
688690
SspiContext::Ntlm(ntlm) => {
689-
let auth_identity =
690-
if let Some(Some(CredentialsBuffers::AuthIdentity(identity))) = builder.credentials_handle {
691-
identity.clone()
692-
} else {
691+
let mut auth_identity = match builder.credentials_handle {
692+
Some(Some(CredentialsBuffers::AuthIdentity(identity))) => Some(identity.clone()),
693+
Some(Some(_)) => {
694+
return Err(Error::new(
695+
ErrorKind::UnknownCredentials,
696+
"only password-based auth is supported in NTLM",
697+
))
698+
}
699+
Some(None) => None,
700+
None => {
693701
return Err(Error::new(
694702
ErrorKind::NoCredentials,
695-
"Auth identity is not provided for the Ntlm",
696-
));
697-
};
698-
builder.full_transform(Some(&mut Some(auth_identity))).execute(ntlm)
703+
"credentials handle is not provided for the NTLM",
704+
))
705+
}
706+
};
707+
builder.full_transform(Some(&mut auth_identity)).execute(ntlm)
699708
}
700709
SspiContext::Kerberos(kerberos) => builder.transform().execute(kerberos),
701710
SspiContext::Negotiate(negotiate) => builder.transform().execute(negotiate),
@@ -706,7 +715,7 @@ impl SspiImpl for SspiContext {
706715
} else {
707716
return Err(Error::new(
708717
ErrorKind::NoCredentials,
709-
"Auth identity is not provided for the Pku2u",
718+
"auth identity is not provided for the Pku2u",
710719
));
711720
};
712721
builder.full_transform(Some(&mut Some(auth_identity))).execute(pku2u)
@@ -738,7 +747,7 @@ impl<'a> SspiContext {
738747
SspiContext::Negotiate(negotiate) => negotiate.change_password(yield_point, change_password).await,
739748
_ => Err(crate::Error::new(
740749
ErrorKind::UnsupportedFunction,
741-
"Change password not supported for this protocol",
750+
"change password not supported for this protocol",
742751
)),
743752
}
744753
}
@@ -983,15 +992,15 @@ impl SspiEx for SspiContext {
983992
SspiContext::Ntlm(ntlm) => ntlm.custom_set_auth_identity(identity.auth_identity().ok_or_else(|| {
984993
Error::new(
985994
ErrorKind::IncompleteCredentials,
986-
"Provided credentials are not password-based",
995+
"provided credentials are not password-based",
987996
)
988997
})?),
989998
SspiContext::Kerberos(kerberos) => kerberos.custom_set_auth_identity(identity),
990999
SspiContext::Negotiate(negotiate) => negotiate.custom_set_auth_identity(identity),
9911000
SspiContext::Pku2u(pku2u) => pku2u.custom_set_auth_identity(identity.auth_identity().ok_or_else(|| {
9921001
Error::new(
9931002
ErrorKind::IncompleteCredentials,
994-
"Provided credentials are not password-based",
1003+
"provided credentials are not password-based",
9951004
)
9961005
})?),
9971006
#[cfg(feature = "tsssp")]
@@ -1133,7 +1142,7 @@ impl CredSspContext {
11331142

11341143
return Err(crate::Error::new(
11351144
crate::ErrorKind::MessageAltered,
1136-
String::from("Could not verify a public key echo"),
1145+
String::from("could not verify a public key echo"),
11371146
));
11381147
}
11391148

@@ -1159,7 +1168,7 @@ impl CredSspContext {
11591168

11601169
return Err(crate::Error::new(
11611170
crate::ErrorKind::MessageAltered,
1162-
String::from("Could not verify a public key hash"),
1171+
String::from("could not verify a public key hash"),
11631172
));
11641173
}
11651174

tests/sspi/client_server/credssp.rs

+83
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
use std::mem;
2+
3+
use sspi::credssp::{ClientMode, ClientState, CredSspClient, CredSspMode, CredSspServer, ServerState, TsRequest};
4+
use sspi::ntlm::NtlmConfig;
5+
use sspi::{AuthIdentity, Credentials, Secret, Username};
6+
7+
use crate::common::CredentialsProxyImpl;
8+
9+
#[test]
10+
fn run_credssp() {
11+
let auth_identity = AuthIdentity {
12+
username: Username::parse("test_user").unwrap(),
13+
password: Secret::from("test_password".to_owned()),
14+
};
15+
let credentials = Credentials::AuthIdentity(auth_identity.clone());
16+
let public_key = [
17+
48, 130, 2, 34, 48, 13, 6, 9, 42, 134, 72, 134, 247, 13, 1, 1, 1, 5, 0, 3, 130, 2, 15, 0, 48, 130, 2, 10, 2,
18+
130, 2, 1, 0, 153, 85, 210, 206, 231, 176, 16, 84, 146, 20, 255, 201, 74, 62, 122, 183, 157, 210, 202, 111, 17,
19+
50, 30, 181, 14, 13, 193, 242, 152, 41, 178, 93, 237, 151, 133, 122, 29, 233, 73, 139, 182, 23, 93, 149, 119,
20+
56, 5, 156, 180, 217, 84, 109, 88, 242, 117, 103, 167, 173, 81, 14, 171, 69, 18, 6, 149, 163, 35, 39, 128, 183,
21+
73, 157, 200, 229, 17, 156, 115, 197, 187, 141, 211, 156, 148, 207, 94, 14, 119, 210, 166, 59, 242, 214, 224,
22+
159, 51, 41, 55, 78, 250, 170, 175, 133, 213, 24, 173, 39, 234, 10, 216, 60, 238, 204, 157, 149, 186, 144, 203,
23+
231, 241, 239, 41, 118, 35, 14, 245, 183, 29, 229, 209, 198, 182, 174, 34, 66, 146, 20, 214, 109, 119, 19, 8,
24+
207, 231, 222, 119, 155, 192, 76, 15, 221, 210, 78, 132, 112, 33, 213, 87, 153, 25, 38, 190, 161, 178, 130,
25+
108, 140, 75, 75, 22, 74, 28, 0, 164, 72, 103, 14, 57, 202, 58, 91, 94, 235, 177, 68, 209, 252, 254, 173, 97,
26+
101, 156, 128, 139, 58, 140, 226, 73, 26, 232, 234, 178, 220, 193, 89, 196, 236, 89, 173, 235, 92, 39, 13, 1,
27+
0, 93, 43, 252, 89, 236, 123, 140, 108, 144, 215, 171, 46, 211, 144, 236, 202, 59, 87, 177, 225, 162, 70, 144,
28+
109, 113, 237, 2, 152, 115, 52, 166, 112, 249, 30, 53, 62, 239, 228, 226, 97, 56, 246, 27, 64, 43, 153, 195,
29+
79, 176, 38, 178, 188, 192, 207, 0, 179, 255, 17, 173, 250, 152, 140, 8, 198, 9, 2, 50, 151, 16, 176, 125, 175,
30+
161, 118, 185, 166, 34, 217, 189, 160, 27, 145, 91, 113, 71, 71, 220, 4, 195, 210, 242, 185, 14, 108, 61, 61,
31+
5, 45, 27, 38, 56, 245, 49, 55, 196, 230, 22, 8, 155, 27, 3, 79, 252, 108, 199, 189, 29, 98, 220, 118, 212, 5,
32+
0, 129, 59, 110, 131, 188, 159, 249, 56, 37, 69, 106, 185, 215, 38, 54, 36, 196, 28, 39, 81, 27, 255, 249, 155,
33+
197, 237, 125, 92, 147, 108, 248, 238, 115, 101, 170, 27, 203, 193, 180, 33, 146, 208, 216, 113, 174, 158, 84,
34+
100, 32, 200, 49, 30, 28, 31, 112, 247, 68, 190, 181, 247, 54, 117, 131, 215, 100, 13, 170, 52, 12, 137, 61,
35+
253, 114, 120, 116, 124, 238, 3, 234, 95, 242, 208, 224, 96, 132, 150, 152, 186, 81, 85, 50, 179, 216, 191,
36+
125, 25, 148, 232, 235, 234, 193, 150, 186, 41, 18, 38, 220, 144, 104, 97, 127, 215, 215, 49, 92, 81, 21, 232,
37+
67, 145, 164, 179, 156, 220, 175, 154, 70, 144, 218, 31, 106, 84, 78, 218, 238, 15, 29, 207, 34, 33, 68, 121,
38+
213, 114, 203, 80, 32, 42, 224, 115, 86, 161, 42, 78, 246, 183, 203, 213, 198, 110, 71, 22, 137, 164, 4, 163,
39+
206, 239, 57, 197, 112, 179, 191, 160, 5, 2, 3, 1, 0, 1,
40+
];
41+
42+
let mut client = CredSspClient::new(
43+
public_key.to_vec(),
44+
credentials.clone(),
45+
CredSspMode::WithCredentials,
46+
ClientMode::Ntlm(NtlmConfig {
47+
client_computer_name: Some("DESKTOP-3D83IAN.example.com".to_owned()),
48+
}),
49+
"TERMSRV/DESKTOP-8F33RFH.example.com".to_owned(),
50+
)
51+
.unwrap();
52+
let mut server = CredSspServer::new(
53+
public_key.to_vec(),
54+
CredentialsProxyImpl::new(&auth_identity),
55+
ClientMode::Ntlm(NtlmConfig {
56+
client_computer_name: Some("DESKTOP-3D83IAN.example.com".to_owned()),
57+
}),
58+
)
59+
.unwrap();
60+
61+
let mut ts_request = TsRequest::default();
62+
63+
for _ in 0..3 {
64+
ts_request = match client
65+
.process(mem::take(&mut ts_request))
66+
.resolve_with_default_network_client()
67+
.unwrap()
68+
{
69+
ClientState::ReplyNeeded(ts_request) => ts_request,
70+
ClientState::FinalMessage(ts_request) => ts_request,
71+
};
72+
73+
match server.process(ts_request).unwrap() {
74+
ServerState::ReplyNeeded(server_ts_request) => ts_request = server_ts_request,
75+
ServerState::Finished(received_auth_identity) => {
76+
assert_eq!(auth_identity, received_auth_identity);
77+
return;
78+
}
79+
};
80+
}
81+
82+
panic!("CredSSP authentication should not exceed 3 steps")
83+
}

tests/sspi/client_server/mod.rs

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
mod credssp;
2+
mod ntlm;
3+
4+
// TODO(@TheBestTvarynka): add Kerberos test when the Kerberos server-side is implemented.

tests/sspi/client_server/ntlm.rs

+114
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
use sspi::builders::{AcquireCredentialsHandle, WithoutCredentialUse};
2+
use sspi::credssp::SspiContext;
3+
use sspi::ntlm::NtlmConfig;
4+
use sspi::{
5+
AcquireCredentialsHandleResult, AuthIdentity, BufferType, ClientRequestFlags, CredentialUse, Credentials,
6+
DataRepresentation, EncryptionFlags, InitializeSecurityContextResult, Ntlm, Secret, SecurityBuffer,
7+
SecurityBufferRef, SecurityStatus, ServerRequestFlags, Sspi, Username,
8+
};
9+
10+
fn test_ntlm_encryption(client: &mut SspiContext, server: &mut SspiContext) {
11+
let plain_message = b"Devolutions/sspi-rs";
12+
13+
let mut token = [0; 1024];
14+
let mut data = plain_message.to_vec();
15+
16+
let mut message = vec![
17+
SecurityBufferRef::token_buf(token.as_mut_slice()),
18+
SecurityBufferRef::data_buf(data.as_mut_slice()),
19+
];
20+
21+
client
22+
.encrypt_message(EncryptionFlags::empty(), &mut message, 0)
23+
.unwrap();
24+
server.decrypt_message(&mut message, 0).unwrap();
25+
26+
assert_eq!(plain_message, message[1].data());
27+
}
28+
29+
fn run_ntlm(config: NtlmConfig) {
30+
let credentials = Credentials::AuthIdentity(AuthIdentity {
31+
username: Username::parse("test_user").unwrap(),
32+
password: Secret::from("test_password".to_owned()),
33+
});
34+
let target_name = "TERMSRV/DESKTOP-8F33RFH.example.com";
35+
36+
let mut client = SspiContext::Ntlm(Ntlm::with_config(config.clone()));
37+
let mut server = SspiContext::Ntlm(Ntlm::with_config(config));
38+
39+
let builder = AcquireCredentialsHandle::<'_, _, _, WithoutCredentialUse>::new();
40+
let AcquireCredentialsHandleResult {
41+
credentials_handle: mut client_credentials_handle,
42+
..
43+
} = builder
44+
.with_auth_data(&credentials)
45+
.with_credential_use(CredentialUse::Outbound)
46+
.execute(&mut client)
47+
.unwrap();
48+
49+
let builder = AcquireCredentialsHandle::<'_, _, _, WithoutCredentialUse>::new();
50+
let AcquireCredentialsHandleResult {
51+
credentials_handle: mut server_credentials_handle,
52+
..
53+
} = builder
54+
.with_auth_data(&credentials)
55+
.with_credential_use(CredentialUse::Inbound)
56+
.execute(&mut server)
57+
.unwrap();
58+
59+
let mut input_token = [SecurityBuffer::new(Vec::new(), BufferType::Token)];
60+
let mut output_token = [SecurityBuffer::new(Vec::new(), BufferType::Token)];
61+
62+
for _ in 0..3 {
63+
let mut builder = client
64+
.initialize_security_context()
65+
.with_credentials_handle(&mut client_credentials_handle)
66+
.with_context_requirements(
67+
ClientRequestFlags::MUTUAL_AUTH
68+
| ClientRequestFlags::USE_SESSION_KEY
69+
| ClientRequestFlags::INTEGRITY
70+
| ClientRequestFlags::CONFIDENTIALITY,
71+
)
72+
.with_target_data_representation(DataRepresentation::Native)
73+
.with_target_name(target_name)
74+
.with_input(&mut input_token)
75+
.with_output(&mut output_token);
76+
let InitializeSecurityContextResult { status, .. } =
77+
client.initialize_security_context_sync(&mut builder).unwrap();
78+
79+
input_token[0].buffer.clear();
80+
81+
server
82+
.accept_security_context()
83+
.with_credentials_handle(&mut server_credentials_handle)
84+
.with_context_requirements(ServerRequestFlags::empty())
85+
.with_target_data_representation(DataRepresentation::Native)
86+
.with_input(&mut output_token)
87+
.with_output(&mut input_token)
88+
.execute(&mut server)
89+
.unwrap();
90+
91+
output_token[0].buffer.clear();
92+
93+
if status == SecurityStatus::Ok {
94+
test_ntlm_encryption(&mut client, &mut server);
95+
return;
96+
}
97+
}
98+
99+
panic!("NTLM authentication should not exceed 3 steps")
100+
}
101+
102+
#[test]
103+
fn ntlm_with_computer_name() {
104+
run_ntlm(NtlmConfig {
105+
client_computer_name: Some("DESKTOP-3D83IAN.example.com".to_owned()),
106+
});
107+
}
108+
109+
#[test]
110+
fn ntlm_without_computer_name() {
111+
run_ntlm(NtlmConfig {
112+
client_computer_name: None,
113+
});
114+
}

tests/common.rs tests/sspi/common.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ impl<'a> CredentialsProxyImpl<'a> {
2525
}
2626
}
2727

28-
impl<'a> credssp::CredentialsProxy for CredentialsProxyImpl<'a> {
28+
impl credssp::CredentialsProxy for CredentialsProxyImpl<'_> {
2929
type AuthenticationData = AuthIdentity;
3030

3131
fn auth_data_by_user(&mut self, username: &Username) -> io::Result<Self::AuthenticationData> {

tests/sspi/main.rs

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
mod client_server;
2+
mod common;
3+
mod ntlm;

tests/ntlm.rs tests/sspi/ntlm.rs

+2-3
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
1-
pub mod common;
1+
use sspi::Ntlm;
22

3-
use common::{
3+
use crate::common::{
44
check_messages_encryption, create_client_credentials_handle, create_server_credentials_handle,
55
process_authentication_without_complete, set_identity_and_try_complete_authentication, try_complete_authentication,
66
CredentialsProxyImpl, CREDENTIALS,
77
};
8-
use sspi::Ntlm;
98

109
#[test]
1110
fn successful_ntlm_authentication_with_client_auth_data() {

0 commit comments

Comments
 (0)