Blame src/tests/t_spake.py

Packit Service 99d1c0
from k5test import *
Packit Service 99d1c0
Packit Service 99d1c0
# The name and number of each supported SPAKE group.
Packit Service 99d1c0
builtin_groups = ((1, 'edwards25519'),)
Packit Service 99d1c0
openssl_groups = ((2, 'P-256'), (3, 'P-384'), (4, 'P-521'))
Packit Service 99d1c0
if runenv.have_spake_openssl == 'yes':
Packit Service 99d1c0
    groups = builtin_groups + openssl_groups
Packit Service 99d1c0
else:
Packit Service 99d1c0
    groups = builtin_groups
Packit Service 99d1c0
Packit Service 99d1c0
for gnum, gname in groups:
Packit Service 99d1c0
    mark('group %s' % gname)
Packit Service 99d1c0
    conf = {'libdefaults': {'spake_preauth_groups': gname}}
Packit Service 99d1c0
    for realm in multipass_realms(create_user=False, create_host=False,
Packit Service 99d1c0
                                  krb5_conf=conf):
Packit Service 99d1c0
        realm.run([kadminl, 'addprinc', '+preauth', '-pw', 'pw', 'user'])
Packit Service 99d1c0
Packit Service 99d1c0
        # Test a basic SPAKE preauth scenario with no optimizations.
Packit Service 99d1c0
        msgs = ('Sending unauthenticated request',
Packit Service 99d1c0
                '/Additional pre-authentication required',
Packit Service 99d1c0
                'Selected etype info:',
Packit Service 99d1c0
                'Sending SPAKE support message',
Packit Service 99d1c0
                'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
                '/More preauthentication data is required',
Packit Service 99d1c0
                'Continuing preauth mech PA-SPAKE (151)',
Packit Service 99d1c0
                'SPAKE challenge received with group ' + str(gnum),
Packit Service 99d1c0
                'Sending SPAKE response',
Packit Service 99d1c0
                'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
                'AS key determined by preauth:',
Packit Service 99d1c0
                'Decrypted AS reply')
Packit Service 99d1c0
        realm.kinit('user', 'pw', expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
        # Test an unsuccessful authentication.
Packit Service 99d1c0
        msgs = ('/Additional pre-authentication required',
Packit Service 99d1c0
                'Selected etype info:',
Packit Service 99d1c0
                'Sending SPAKE support message',
Packit Service 99d1c0
                'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
                '/More preauthentication data is required',
Packit Service 99d1c0
                'Continuing preauth mech PA-SPAKE (151)',
Packit Service 99d1c0
                'SPAKE challenge received with group ' + str(gnum),
Packit Service 99d1c0
                'Sending SPAKE response',
Packit Service 99d1c0
                '/Preauthentication failed')
Packit Service 99d1c0
        realm.kinit('user', 'wrongpw', expected_code=1, expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
conf = {'libdefaults': {'spake_preauth_groups': 'edwards25519'}}
Packit Service 99d1c0
kdcconf = {'realms': {'$realm': {'spake_preauth_indicator': 'indspake'}}}
Packit Service 99d1c0
realm = K5Realm(create_user=False, krb5_conf=conf, kdc_conf=kdcconf)
Packit Service 99d1c0
realm.run([kadminl, 'addprinc', '+preauth', '-pw', 'pw', 'user'])
Packit Service 99d1c0
Packit Service 99d1c0
# Test with FAST.
Packit Service 99d1c0
mark('FAST')
Packit Service 99d1c0
msgs = ('Using FAST due to armor ccache negotiation',
Packit Service 99d1c0
        'FAST armor key:',
Packit Service 99d1c0
        'Sending unauthenticated request',
Packit Service 99d1c0
        '/Additional pre-authentication required',
Packit Service 99d1c0
        'Decoding FAST response',
Packit Service 99d1c0
        'Selected etype info:',
Packit Service 99d1c0
        'Sending SPAKE support message',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
        '/More preauthentication data is required',
Packit Service 99d1c0
        'Continuing preauth mech PA-SPAKE (151)',
Packit Service 99d1c0
        'SPAKE challenge received with group 1',
Packit Service 99d1c0
        'Sending SPAKE response',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
        'AS key determined by preauth:',
Packit Service 99d1c0
        'FAST reply key:')
Packit Service 99d1c0
realm.kinit(realm.host_princ, flags=['-k'])
Packit Service 99d1c0
realm.kinit('user', 'pw', flags=['-T', realm.ccache], expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
# Test optimistic client preauth (151 is PA-SPAKE).
Packit Service 99d1c0
mark('client optimistic')
Packit Service 99d1c0
msgs = ('Attempting optimistic preauth',
Packit Service 99d1c0
        'Processing preauth types: PA-SPAKE (151)',
Packit Service 99d1c0
        'Sending SPAKE support message',
Packit Service 99d1c0
        'for next request: PA-SPAKE (151)',
Packit Service 99d1c0
        '/More preauthentication data is required',
Packit Service 99d1c0
        'Selected etype info:',
Packit Service 99d1c0
        'SPAKE challenge received with group 1',
Packit Service 99d1c0
        'Sending SPAKE response',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
        'AS key determined by preauth:',
Packit Service 99d1c0
        'Decrypted AS reply')
Packit Service 99d1c0
realm.run(['./icred', '-o', '151', 'user', 'pw'], expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
# Test KDC optimistic challenge (accepted by client).
Packit Service 99d1c0
mark('KDC optimistic')
Packit Service 99d1c0
oconf = {'kdcdefaults': {'spake_preauth_kdc_challenge': 'edwards25519'}}
Packit Service 99d1c0
oenv = realm.special_env('ochal', True, krb5_conf=oconf)
Packit Service 99d1c0
realm.stop_kdc()
Packit Service 99d1c0
realm.start_kdc(env=oenv)
Packit Service 99d1c0
msgs = ('Sending unauthenticated request',
Packit Service 99d1c0
        '/Additional pre-authentication required',
Packit Service 99d1c0
        'Selected etype info:',
Packit Service 99d1c0
        'SPAKE challenge received with group 1',
Packit Service 99d1c0
        'Sending SPAKE response',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
        'AS key determined by preauth:',
Packit Service 99d1c0
        'Decrypted AS reply')
Packit Service 99d1c0
realm.kinit('user', 'pw', expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
if runenv.have_spake_openssl != 'yes':
Packit Service 99d1c0
    skip_rest('SPAKE fallback tests', 'SPAKE not built using OpenSSL')
Packit Service 99d1c0
Packit Service 99d1c0
# Test optimistic client preauth falling back to encrypted timestamp
Packit Service 99d1c0
# because the KDC doesn't support any of the client groups.
Packit Service 99d1c0
mark('client optimistic (fallback)')
Packit Service 99d1c0
p256conf={'libdefaults': {'spake_preauth_groups': 'P-256'}}
Packit Service 99d1c0
p256env = realm.special_env('p256', False, krb5_conf=p256conf)
Packit Service 99d1c0
msgs = ('Attempting optimistic preauth',
Packit Service 99d1c0
        'Processing preauth types: PA-SPAKE (151)',
Packit Service 99d1c0
        'Sending SPAKE support message',
Packit Service 99d1c0
        'for next request: PA-SPAKE (151)',
Packit Service 99d1c0
        '/Preauthentication failed',
Packit Service 99d1c0
        'Selected etype info:',
Packit Service 99d1c0
        'Encrypted timestamp ',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-ENC-TIMESTAMP (2)',
Packit Service 99d1c0
        'AS key determined by preauth:',
Packit Service 99d1c0
        'Decrypted AS reply')
Packit Service 99d1c0
realm.run(['./icred', '-o', '151', 'user', 'pw'], env=p256env,
Packit Service 99d1c0
          expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
# Test KDC optimistic challenge (rejected by client).
Packit Service 99d1c0
mark('KDC optimistic (rejected)')
Packit Service 99d1c0
rconf = {'libdefaults': {'spake_preauth_groups': 'P-384,edwards25519'},
Packit Service 99d1c0
         'kdcdefaults': {'spake_preauth_kdc_challenge': 'P-384'}}
Packit Service 99d1c0
renv = realm.special_env('ochal', True, krb5_conf=rconf)
Packit Service 99d1c0
realm.stop_kdc()
Packit Service 99d1c0
realm.start_kdc(env=renv)
Packit Service 99d1c0
msgs = ('Sending unauthenticated request',
Packit Service 99d1c0
        '/Additional pre-authentication required',
Packit Service 99d1c0
        'Selected etype info:',
Packit Service 99d1c0
        'SPAKE challenge with group 3 rejected',
Packit Service 99d1c0
        'Sending SPAKE support message',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
        '/More preauthentication data is required',
Packit Service 99d1c0
        'Continuing preauth mech PA-SPAKE (151)',
Packit Service 99d1c0
        'SPAKE challenge received with group 1',
Packit Service 99d1c0
        'Sending SPAKE response',
Packit Service 99d1c0
        'for next request: PA-FX-COOKIE (133), PA-SPAKE (151)',
Packit Service 99d1c0
        'AS key determined by preauth:',
Packit Service 99d1c0
        'Decrypted AS reply')
Packit Service 99d1c0
realm.kinit('user', 'pw', expected_trace=msgs)
Packit Service 99d1c0
Packit Service 99d1c0
# Check that the auth indicator for SPAKE is properly included by the KDC.
Packit Service 99d1c0
mark('auth indicator')
Packit Service 99d1c0
realm.run([kvno, realm.host_princ])
Packit Service 99d1c0
realm.run(['./adata', realm.host_princ], expected_msg='+97: [indspake]')
Packit Service 99d1c0
Packit Service 99d1c0
success('SPAKE pre-authentication tests')