Bug 13804 - Samlogon NT_STATUS_ACCESS_DENIED after netlogon via python
Summary: Samlogon NT_STATUS_ACCESS_DENIED after netlogon via python
Status: NEW
Alias: None
Product: Samba 4.1 and newer
Classification: Unclassified
Component: AD: LDB/DSDB/SAMDB (show other bugs)
Version: 4.9.0
Hardware: All All
: P5 minor (vote)
Target Milestone: ---
Assignee: Andrew Bartlett
QA Contact: Samba QA Contact
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-02-25 23:49 UTC by Aaron Haslett (dead mail address)
Modified: 2019-02-25 23:50 UTC (History)
0 users

See Also:


Attachments
samlogon breaker test (1.82 KB, text/x-python)
2019-02-25 23:49 UTC, Aaron Haslett (dead mail address)
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Aaron Haslett (dead mail address) 2019-02-25 23:49:47 UTC
Created attachment 14871 [details]
samlogon breaker test

Attached test causes next samlogon to fail (occasionally succeeds, try a couple of times).

Put it in python/samba/tests/ then Run like this:

CLIENT_IP=127.0.0.11 SOCKET_WRAPPER_DEFAULT_IFACE=11 PYTHONPATH=$PYTHONPATH:./source4/torture/drs/python python3 ./source4/scripting/bin/subunitrun  $LOADLIST samba.tests.samlogon_breaker -U$DOMAIN/$DC_USERNAME%$DC_PASSWORD

Then run samlogon like this:

bin/rpcclient -c "samlogon $USERNAME $PASSWORD AuthLogTests 1" -U% $SERVER
Comment 1 Aaron Haslett (dead mail address) 2019-02-25 23:50:47 UTC
oh those commands are for inside ad_dc:local testenv

SELFTEST_TESTENV=ad_dc:local make testenv