1
0
mirror of https://github.com/mail-in-a-box/mailinabox.git synced 2025-04-04 00:17:06 +00:00
mailinabox/tests/suites/ldap-access.sh
downtownallday 1f0d2ddb92 Issue #1340 - LDAP backend for accounts
This commit will:

1. Change the user account database from sqlite to OpenLDAP
2. Add policyd-spf to postfix for SPF validation
3. Add a test runner with some automated test suites

Notes:

User account password hashes are preserved.

There is a new Roundcube contact list called "Directory" that lists the users in LDAP (MiaB users), similar to what Google Suite does.

Users can still change their password in Roundcube.

OpenLDAP is configured with TLS, but all remote access is blocked by firewall rules. Manual changes are required to open it for remote access (eg. "ufw allow proto tcp from <HOST> to any port ldaps").

The test runner is started by executing tests/runner.sh. Be aware that it will make changes to your system, including adding new users, domains, mailboxes, start/stop services, etc. It is highly unadvised to run it on a production system!

The LDAP schema that supports mail delivery with postfix and dovecot is located in conf/postfix.schema. This file is copied verbatim from the LdapAdmin project (GPL, ldapadmin.org). Instead of including the file in git, it could be referenced by URL and downloaded by the setup script if GPL is an issue or apply for a PEN from IANA.

Mangement console and other services should not appear or behave any differently than before.
2020-01-17 17:03:21 -05:00

234 lines
7.7 KiB
Bash

# -*- indent-tabs-mode: t; tab-width: 4; -*-
#
# Access assertions:
# service accounts, except management:
# can bind but not change passwords, including their own
# can read all attributes of all users but not userPassword
# can not write any user attributes, include shadowLastChange
# can read config subtree (permitted-senders, domains)
# no access to services subtree, except their own dn
# users:
# can bind and change their own password
# can read and change their own shadowLastChange
# can read attributess of all users except mailaccess
# no access to config subtree
# no access to services subtree
# other:
# no anonymous binds to root DSE
# no anonymous binds to database
#
test_user_change_password() {
# users should be able to change their own passwords
test_start "user-change-password"
# create regular user with password "alice"
local alice="alice@somedomain.com"
create_user "$alice" "alice"
local alice_dn="$ATTR_DN"
# bind as alice and update userPassword
assert_w_access "$alice_dn" "$alice_dn" "alice" write "userPassword=$(slappasswd_hash "alice-new")"
delete_user "$alice"
test_end
}
test_user_access() {
# 1. can read attributess of all users except mailaccess
# 2. can read and change their own shadowLastChange
# 3. no access to config subtree
# 4. no access to services subtree
test_start "user-access"
# create regular user's alice and bob
local alice="alice@somedomain.com"
create_user "alice@somedomain.com" "alice"
local alice_dn="$ATTR_DN"
local bob="bob@somedomain.com"
create_user "bob@somedomain.com" "bob"
local bob_dn="$ATTR_DN"
# alice should be able to set her own shadowLastChange
assert_w_access "$alice_dn" "$alice_dn" "alice" write "shadowLastChange=0"
# test that alice can read her own attributes
assert_r_access "$alice_dn" "$alice_dn" "alice" read mail maildrop cn sn shadowLastChange
# alice should not have access to her own mailaccess, though
assert_r_access "$alice_dn" "$alice_dn" "alice" no-read mailaccess
# test that alice cannot change her own select attributes
assert_w_access "$alice_dn" "$alice_dn" "alice"
# test that alice can read bob's attributes
assert_r_access "$bob_dn" "$alice_dn" "alice" read mail maildrop cn sn
# alice does not have access to bob's mailaccess though
assert_r_access "$bob_dn" "$alice_dn" "alice" no-read mailaccess
# test that alice cannot change bob's attributes
assert_w_access "$bob_dn" "$alice_dn" "alice"
# test that alice cannot read a service account's attributes
assert_r_access "$LDAP_POSTFIX_DN" "$alice_dn" "alice"
# test that alice cannot read config entries
assert_r_access "dc=somedomain.com,$LDAP_DOMAINS_BASE" "$alice_dn" "alice"
assert_r_access "$LDAP_PERMITTED_SENDERS_BASE" "$alice_dn" "alice"
# test that alice cannot find anything searching config
test_search "$LDAP_CONFIG_BASE" "$alice_dn" "alice"
[ $SEARCH_DN_COUNT -gt 0 ] && test_failure "Users should not be able to search config"
# test that alice cannot find anything searching config domains
test_search "$LDAP_DOMAINS_BASE" "$alice_dn" "alice"
[ $SEARCH_DN_COUNT -gt 0 ] && test_failure "Users should not be able to search config domains"
# test that alice cannot find anything searching services
test_search "$LDAP_SERVICES_BASE" "$alice_dn" "alice"
[ $SEARCH_DN_COUNT -gt 0 ] && test_failure "Users should not be able to search services"
delete_user "$alice"
delete_user "$bob"
test_end
}
test_service_change_password() {
# service accounts should not be able to change other user's
# passwords
# service accounts should not be able to change their own password
test_start "service-change-password"
# create regular user with password "alice"
local alice="alice@somedomain.com"
create_user "alice@somedomain.com" "alice"
local alice_dn="$ATTR_DN"
# create a test service account
create_service_account "test" "test"
local service_dn="$ATTR_DN"
# update userPassword of user using service account
assert_w_access "$alice_dn" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" no-write "userPassword=$(slappasswd_hash "alice-new")"
# update userPassword of service account using service account
assert_w_access "$service_dn" "$service_dn" "test" no-write "userPassword=$(slappasswd_hash "test-new")"
delete_user "$alice"
delete_service_account "test"
test_end
}
test_service_access() {
# service accounts should have read-only access to all attributes
# of all users except userPassword
# can not write any user attributes, include shadowLastChange
# can read config subtree (permitted-senders, domains)
# no access to services subtree, except their own dn
test_start "service-access"
# create regular user with password "alice"
local alice="alice@somedomain.com"
create_user "alice@somedomain.com" "alice"
# create a test service account
create_service_account "test" "test"
local service_dn="$ATTR_DN"
# Use service account to find alice
record "[Use service account to find alice]"
get_attribute "$LDAP_USERS_BASE" "mail=${alice}" dn sub "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD"
if [ -z "$ATTR_DN" ]; then
test_failure "Unable to search for user account using service account"
else
local alice_dn="$ATTR_DN"
# set shadowLastChange on alice's entry (to test reading it back)
assert_w_access "$alice_dn" "$alice_dn" "alice" write "shadowLastChange=0"
# check that service account can read user attributes
assert_r_access "$alice_dn" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" read mail maildrop uid cn sn shadowLastChange
# service account should not be able to read user's userPassword
assert_r_access "$alice_dn" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" no-read userPassword
# service accounts cannot change user attributes
assert_w_access "$alice_dn" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD"
assert_w_access "$alice_dn" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" no-write "shadowLastChange=1"
fi
# service accounts can read config subtree (permitted-senders, domains)
assert_r_access "dc=somedomain.com,$LDAP_DOMAINS_BASE" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" read dc
# service accounts can search and find things in the config subtree
test_search "$LDAP_CONFIG_BASE" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" sub
[ $SEARCH_DN_COUNT -lt 4 ] && test_failure "Service accounts should be able to search config"
# service accounts can read attributes in their own dn
assert_r_access "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" read cn description
# ... but not userPassword
assert_r_access "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" no-read userPassword
# services cannot read other service's attributes
assert_r_access "$service_dn" "$LDAP_POSTFIX_DN" "$LDAP_POSTFIX_PASSWORD" no-read cn description userPassword
delete_user "$alice"
delete_service_account "test"
test_end
}
test_root_dse() {
# no anonymous binds to root dse
test_start "root-dse"
record "[bind anonymously to root dse]"
ldapsearch -H $LDAP_URL -x -b "" -s base >>$TEST_OF 2>&1
local r=$?
if [ $r -eq 0 ]; then
test_failure "Anonymous access to root dse should not be permitted"
elif [ $r -eq 48 ]; then
# 48=inappropriate authentication (anon binds not allowed)
test_success
else
die "Error accessing root dse"
fi
test_end
}
test_anon_bind() {
test_start "anon-bind"
record "[bind anonymously to $LDAP_BASE]"
ldapsearch -H $LDAP_URL -x -b "$LDAP_BASE" -s base >>$TEST_OF 2>&1
local r=$?
if [ $r -eq 0 ]; then
test_failure "Anonymous access should not be permitted"
elif [ $r -eq 48 ]; then
# 48=inappropriate authentication (anon binds not allowed)
test_success
else
die "Error accessing $LDAP_BASE"
fi
test_end
}
suite_start "ldap-access"
test_user_change_password
test_user_access
test_service_change_password
test_service_access
test_root_dse
test_anon_bind
suite_end