krb5 commit [krb5-1.11]: Test bogus KDC-REQs

Tom Yu tlyu at MIT.EDU
Thu Jan 16 15:46:40 EST 2014


https://github.com/krb5/krb5/commit/262207d3a60499df82fa5ab69264ca416525ca66
commit 262207d3a60499df82fa5ab69264ca416525ca66
Author: Tom Yu <tlyu at mit.edu>
Date:   Thu Jan 16 15:18:46 2014 -0500

    Test bogus KDC-REQs
    
    Send encodings that are invalid KDC-REQs, but pass krb5_is_as_req()
    and krb5_is_tgs_req(), to make sure that the KDC recovers correctly
    from failures in decode_krb5_as_req() and decode_krb5_tgs_req().  Also
    send an encoding that isn't a valid KDC-REQ.
    
    (back ported from commit dae7693f8bf970d89d4c697f3d66a7d458281b93)
    
    ticket: 7832 (new)
    version_fixed: 1.11.5
    status: resolved

 src/tests/Makefile.in        |    1 +
 src/tests/t_bogus_kdc_req.py |   44 ++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 45 insertions(+), 0 deletions(-)

diff --git a/src/tests/Makefile.in b/src/tests/Makefile.in
index ab45ea5..673c8e7 100644
--- a/src/tests/Makefile.in
+++ b/src/tests/Makefile.in
@@ -87,6 +87,7 @@ check-pytests:: hist
 	$(RUNPYTEST) $(srcdir)/t_cve-2012-1014.py $(PYTESTFLAGS)
 	$(RUNPYTEST) $(srcdir)/t_cve-2012-1015.py $(PYTESTFLAGS)
 	$(RUNPYTEST) $(srcdir)/t_cve-2013-1417.py $(PYTESTFLAGS)
+	$(RUNPYTEST) $(srcdir)/t_bogus_kdc_req.py $(PYTESTFLAGS)
 
 clean::
 	$(RM) krb5.conf kdc.conf
diff --git a/src/tests/t_bogus_kdc_req.py b/src/tests/t_bogus_kdc_req.py
new file mode 100644
index 0000000..b6208ca
--- /dev/null
+++ b/src/tests/t_bogus_kdc_req.py
@@ -0,0 +1,44 @@
+#!/usr/bin/python
+
+import base64
+import socket
+from k5test import *
+
+realm = K5Realm()
+
+# Send encodings that are invalid KDC-REQs, but pass krb5_is_as_req()
+# and krb5_is_tgs_req(), to make sure that the KDC recovers correctly
+# from failures in decode_krb5_as_req() and decode_krb5_tgs_req().
+
+s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
+a = (hostname, realm.portbase)
+
+
+# Bogus AS-REQ
+
+x1 = base64.b16decode('6AFF')
+s.sendto(x1, a)
+
+# Make sure kinit still works.
+
+realm.kinit(realm.user_princ, password('user'))
+
+# Bogus TGS-REQ
+
+x2 = base64.b16decode('6CFF')
+s.sendto(x2, a)
+
+# Make sure kinit still works.
+
+realm.kinit(realm.user_princ, password('user'))
+
+# Not a KDC-REQ, even a little bit
+
+x3 = base64.b16decode('FFFF')
+s.sendto(x3, a)
+
+# Make sure kinit still works.
+
+realm.kinit(realm.user_princ, password('user'))
+
+success('Bogus KDC-REQ test')


More information about the cvs-krb5 mailing list