1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192
|
#!/bin/bash
#
# Copyright (C) 2019 Nikos Mavrogiannopoulos
#
# This file is part of ocserv.
#
# ocserv is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the
# Free Software Foundation; either version 2 of the License, or (at
# your option) any later version.
#
# ocserv is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# This tests operation/traffic under compression (lzs or lz4).
OCCTL="${OCCTL:-../src/occtl/occtl}"
SERV="${SERV:-../src/ocserv}"
srcdir=${srcdir:-.}
PIDFILE=ocserv-pid.$$.tmp
KRB5PIDFILE=krb5-pid.$$.tmp
CLIPID=oc-pid.$$.tmp
PATH=${PATH}:/usr/sbin
IP=$(which ip)
OUTFILE=traffic.$$.tmp
# This port needs to be fixed to 443 due to KKDCP
PORT=443
USERNAME=krb5user
USERPASS=krb5user123
export KRB5_TRACE=/dev/stderr
. `dirname $0`/common.sh
if test -z "${IP}";then
echo "no IP tool is present"
exit 1
fi
if test "$(id -u)" != "0";then
echo "This test must be run as root, and is a destructive one"
exit 1
fi
if ! test -x /usr/sbin/kadmin.local;then
echo "This test must be run on a KDC-running system"
exit 1
fi
echo "Testing ocserv with kerberos... "
function finish {
set +e
echo " * Cleaning up..."
test -n "${PID}" && kill ${PID} >/dev/null 2>&1
test -e "${KRB5PIDFILE}" && kill $(cat ${KRB5PIDFILE}) >/dev/null 2>&1
test -e "${KRB5PIDFILE}" && rm -f ${KRB5PIDFILE} >/dev/null 2>&1
test -n "${PIDFILE}" && rm -f ${PIDFILE} >/dev/null 2>&1
test -e "${CLIPID}" && kill -s INT $(cat ${CLIPID}) >/dev/null 2>&1
test -e "${CLIPID}" && rm -f ${CLIPID} >/dev/null 2>&1
test -n "${CONFIG}" && rm -f ${CONFIG} >/dev/null 2>&1
rm -f ${OUTFILE} 2>&1
#reset kerberos changes
echo -e "secret123\nsecret123"|/usr/sbin/kdb5_util destroy -f
echo -e "${USERPASS}\n${USERPASS}" | /usr/sbin/kadmin.local -q "delete_principal -force ${USERNAME}"
echo -e "${USERPASS}\n${USERPASS}" | /usr/sbin/kadmin.local -q "delete_principal -force HTTP/kerberos.test"
rm -f /etc/krb5-keytab
grep kerberos.test /etc/hosts && sed '$d' /etc/hosts
#undef Fedora33 the krb5kdc doesn't create a PID file
killall krb5kdc
}
trap finish EXIT
# server address
OCCTL_SOCKET=./occtl-radius-$$.socket
. `dirname $0`/random-net.sh
. `dirname $0`/ns.sh
${CMDNS2} ${IP} link set dev lo up
# Run KDC
# This is destructive at the moment as it changes the system that it is being run.
mkdir -p /var/kerberos/krb5kdc/
cp ${srcdir}/data/krb5.conf /etc/
cp ${srcdir}/data/kdc.conf /var/kerberos/krb5kdc/
cp ${srcdir}/data/k5.KERBEROS.TEST /var/kerberos/krb5kdc/
cp ${srcdir}/data/kadm5.acl /var/kerberos/krb5kdc/
chmod 750 /var/kerberos/krb5kdc/
chmod 640 /var/kerberos/krb5kdc/*
echo " * creating database"
echo -e "secret123\nsecret123"|/usr/sbin/kdb5_util create -s
echo " * addprinc ${USERNAME}"
echo -e "${USERPASS}\n${USERPASS}" | /usr/sbin/kadmin.local -q "addprinc ${USERNAME}"
test $? = 0 || exit 1
echo " * addprinc HTTP"
echo -e "test123\ntest123" | /usr/sbin/kadmin.local -q "addprinc HTTP/kerberos.test"
test $? = 0 || exit 1
echo " * addprinc keytab"
/usr/sbin/kadmin.local -q "xst -norandkey -k /etc/krb5-keytab HTTP/kerberos.test@KERBEROS.TEST"
test $? = 0 || exit 1
grep kerberos.test /etc/hosts || echo "${ADDRESS} kerberos.test" >> /etc/hosts
mkdir -p /etc/ocserv
cp ${srcdir}/certs/ca.pem /etc/ocserv
echo " * Starting KDC..."
${CMDNS2} /usr/sbin/krb5kdc -P ${KRB5PIDFILE}
test $? = 0 || exit 1
sleep 4
export TEST_PAMDIR=data/pam-kerberos
update_config kerberos.config
# Run ocserv
PRELOAD_CMD=${CMDNS2}
echo " * Starting ocserv..."
launch_pam_server -d 3 -f -c ${CONFIG} & PID=$!
PRELOAD_CMD=""
sleep 5
echo ""
echo " * Getting cookie via PAM from ${ADDRESS}:${PORT}..."
( echo "${USERPASS}" | ${CMDNS1} ${OPENCONNECT} ${ADDRESS}:${PORT} -u ${USERNAME} --servercert=pin-sha256:xp3scfzy3rOQsv9NcOve/8YVVv+pHr4qNCXEXrNl5s8= --cookieonly )
if test $? != 0;then
echo "Could not get cookie from server"
exit 1
fi
echo ""
echo " * Running kinit"
echo ${USERPASS}|${CMDNS1} kinit -V ${USERNAME}@KERBEROS.TEST
if test $? != 0;then
echo "Error in kinit"
exit 1
fi
echo ""
echo " * Running klist"
${CMDNS1} klist
echo ""
echo " * Getting cookie via kerberos from kerberos.test:${PORT}..."
${CMDNS1} ${OPENCONNECT} kerberos.test:${PORT} -u ${USERNAME} --servercert=pin-sha256:xp3scfzy3rOQsv9NcOve/8YVVv+pHr4qNCXEXrNl5s8= --cookieonly
if test $? != 0;then
echo "Could not get cookie from server"
exit 1
fi
echo ""
echo " * Connecting via krb5 to kerberos.test:${PORT}..."
( ${CMDNS1} ${OPENCONNECT} kerberos.test:${PORT} --servercert=pin-sha256:xp3scfzy3rOQsv9NcOve/8YVVv+pHr4qNCXEXrNl5s8= -s ${srcdir}/scripts/vpnc-script --pid-file=${CLIPID} --verbose -b )
if test $? != 0;then
echo "Could not connect to server"
exit 1
fi
sleep 3
${CMDNS1} ping -w 5 ${VPNADDR}
if test $? != 0;then
echo "Could not ping server IP"
exit 1
fi
sleep 60
echo ""
echo " * Connecting via krb5 and non-fresh ticket to kerberos.test:${PORT}..."
${CMDNS1} ${OPENCONNECT} kerberos.test:${PORT} -u ${USERNAME} --servercert=pin-sha256:xp3scfzy3rOQsv9NcOve/8YVVv+pHr4qNCXEXrNl5s8= --cookieonly
if test $? = 0;then
echo "Could connect to server although not expected"
exit 1
fi
exit 0
|