Bug 13804 - Samlogon NT_STATUS_ACCESS_DENIED after netlogon via python
Summary: Samlogon NT_STATUS_ACCESS_DENIED after netlogon via python
Status: NEW
Alias: None
Product: Samba 4.1 and newer
Classification: Unclassified
Component: AD: LDB/DSDB/SAMDB (show other bugs)
Version: 4.9.0
Hardware: All All
: P5 minor (vote)
Target Milestone: ---
Assignee: Andrew Bartlett
QA Contact: Samba QA Contact
Depends on:
Reported: 2019-02-25 23:49 UTC by Aaron Haslett
Modified: 2019-02-25 23:50 UTC (History)
0 users

See Also:

samlogon breaker test (1.82 KB, text/x-python)
2019-02-25 23:49 UTC, Aaron Haslett
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Aaron Haslett 2019-02-25 23:49:47 UTC
Created attachment 14871 [details]
samlogon breaker test

Attached test causes next samlogon to fail (occasionally succeeds, try a couple of times).

Put it in python/samba/tests/ then Run like this:

CLIENT_IP= SOCKET_WRAPPER_DEFAULT_IFACE=11 PYTHONPATH=$PYTHONPATH:./source4/torture/drs/python python3 ./source4/scripting/bin/subunitrun  $LOADLIST samba.tests.samlogon_breaker -U$DOMAIN/$DC_USERNAME%$DC_PASSWORD

Then run samlogon like this:

bin/rpcclient -c "samlogon $USERNAME $PASSWORD AuthLogTests 1" -U% $SERVER
Comment 1 Aaron Haslett 2019-02-25 23:50:47 UTC
oh those commands are for inside ad_dc:local testenv

SELFTEST_TESTENV=ad_dc:local make testenv