mirror of
https://github.com/saltstack/salt.git
synced 2025-04-16 09:40:20 +00:00
Added support for AD Policies
This commit is contained in:
parent
361868c21d
commit
a5f9429e69
4 changed files with 169 additions and 3 deletions
1
changelog/62873.fixed
Normal file
1
changelog/62873.fixed
Normal file
|
@ -0,0 +1 @@
|
||||||
|
LGPO: Added support for missing domain controller policies: VulnerableChannelAllowList and LdapEnforceChannelBinding
|
|
@ -496,6 +496,13 @@ class _policy_info:
|
||||||
None: "Not Defined",
|
None: "Not Defined",
|
||||||
"(value not set)": "Not Defined",
|
"(value not set)": "Not Defined",
|
||||||
}
|
}
|
||||||
|
self.ldap_server_binding_token_requirements = {
|
||||||
|
0: "Never",
|
||||||
|
1: "When supported",
|
||||||
|
2: "Always",
|
||||||
|
None: "Not Defined",
|
||||||
|
"(value not set)": "Not Defined",
|
||||||
|
}
|
||||||
self.ldap_server_signing_requirements = {
|
self.ldap_server_signing_requirements = {
|
||||||
1: "None",
|
1: "None",
|
||||||
2: "Require signing",
|
2: "Require signing",
|
||||||
|
@ -2698,6 +2705,48 @@ class _policy_info:
|
||||||
},
|
},
|
||||||
"Transform": self.enabled_one_disabled_zero_strings_transform,
|
"Transform": self.enabled_one_disabled_zero_strings_transform,
|
||||||
},
|
},
|
||||||
|
"VulnerableChannelAllowList": {
|
||||||
|
"Policy": (
|
||||||
|
"Domain controller: Allow vulnerable Netlogon "
|
||||||
|
"secure channel connections"
|
||||||
|
),
|
||||||
|
"lgpo_section": self.security_options_gpedit_path,
|
||||||
|
"Registry": {
|
||||||
|
"Hive": "HKEY_LOCAL_MACHINE",
|
||||||
|
"Path": (
|
||||||
|
"SYSTEM\\CurrentControlSet\\Services\\"
|
||||||
|
"Netlogon\\Parameters"
|
||||||
|
),
|
||||||
|
"Value": "VulnerableChannelAllowList",
|
||||||
|
"Type": "REG_SZ",
|
||||||
|
},
|
||||||
|
"Transform": {"Put": "_string_put_transform"},
|
||||||
|
},
|
||||||
|
"LdapEnforceChannelBinding": {
|
||||||
|
"Policy": "Domain controller: LDAP server channel binding token requirements",
|
||||||
|
"Settings": self.ldap_server_binding_token_requirements.keys(),
|
||||||
|
"lgpo_section": self.security_options_gpedit_path,
|
||||||
|
"Registry": {
|
||||||
|
"Hive": "HKEY_LOCAL_MACHINE",
|
||||||
|
"Path": (
|
||||||
|
"System\\CurrentControlSet\\Services\\NTDS\\Parameters"
|
||||||
|
),
|
||||||
|
"Value": "LdapEnforceChannelBinding",
|
||||||
|
"Type": "REG_DWORD",
|
||||||
|
},
|
||||||
|
"Transform": {
|
||||||
|
"Get": "_dict_lookup",
|
||||||
|
"Put": "_dict_lookup",
|
||||||
|
"GetArgs": {
|
||||||
|
"lookup": self.ldap_server_binding_token_requirements,
|
||||||
|
"value_lookup": False,
|
||||||
|
},
|
||||||
|
"PutArgs": {
|
||||||
|
"lookup": self.ldap_server_binding_token_requirements,
|
||||||
|
"value_lookup": True,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
"LDAPServerIntegrity": {
|
"LDAPServerIntegrity": {
|
||||||
"Policy": "Domain controller: LDAP server signing requirements",
|
"Policy": "Domain controller: LDAP server signing requirements",
|
||||||
"Settings": self.ldap_server_signing_requirements.keys(),
|
"Settings": self.ldap_server_signing_requirements.keys(),
|
||||||
|
|
|
@ -57,9 +57,6 @@ def __virtual__():
|
||||||
if not salt.utils.platform.is_windows():
|
if not salt.utils.platform.is_windows():
|
||||||
return False, "LGPO_REG Util: Only available on Windows"
|
return False, "LGPO_REG Util: Only available on Windows"
|
||||||
|
|
||||||
if "lgpo_reg.get_value" not in __salt__:
|
|
||||||
return False, "LGPO_REG Util: lgpo_reg module not available"
|
|
||||||
|
|
||||||
return __virtualname__
|
return __virtualname__
|
||||||
|
|
||||||
|
|
||||||
|
|
119
tests/pytests/unit/modules/win_lgpo/test_defined_policies.py
Normal file
119
tests/pytests/unit/modules/win_lgpo/test_defined_policies.py
Normal file
|
@ -0,0 +1,119 @@
|
||||||
|
"""
|
||||||
|
This tests policies that are defined in the giant dictionary in the LGPO module
|
||||||
|
"""
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
import salt.modules.win_file as win_file
|
||||||
|
import salt.modules.win_lgpo as win_lgpo
|
||||||
|
import salt.utils.win_reg as win_reg
|
||||||
|
|
||||||
|
pytestmark = [
|
||||||
|
pytest.mark.windows_whitelisted,
|
||||||
|
pytest.mark.skip_unless_on_windows,
|
||||||
|
]
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def configure_loader_modules(tmp_path):
|
||||||
|
cache_dir = tmp_path / "__test_admx_policy_cache_dir"
|
||||||
|
cache_dir.mkdir(parents=True, exist_ok=True)
|
||||||
|
return {
|
||||||
|
win_lgpo: {
|
||||||
|
"__salt__": {
|
||||||
|
"file.file_exists": win_file.file_exists,
|
||||||
|
"file.makedirs": win_file.makedirs_,
|
||||||
|
},
|
||||||
|
"__opts__": {
|
||||||
|
"cachedir": str(cache_dir),
|
||||||
|
},
|
||||||
|
"__utils__": {
|
||||||
|
"reg.set_value": win_reg.set_value,
|
||||||
|
"reg.read_value": win_reg.read_value,
|
||||||
|
"reg.delete_value": win_reg.delete_value,
|
||||||
|
},
|
||||||
|
"__context__": {},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.destructive_test
|
||||||
|
def test_vuln_channel_allow():
|
||||||
|
key = "SYSTEM\\CurrentControlSet\\Services\\Netlogon\\Parameters"
|
||||||
|
vname = "VulnerableChannelAllowList"
|
||||||
|
setting = "O:BAG:BAD:(A;;RC;;;BA)"
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
try:
|
||||||
|
win_lgpo.set_computer_policy(name=vname, setting=setting)
|
||||||
|
result = win_reg.read_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
assert result["vdata"] == setting
|
||||||
|
finally:
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.destructive_test
|
||||||
|
def test_vuln_channel_allow_not_defined():
|
||||||
|
key = "SYSTEM\\CurrentControlSet\\Services\\Netlogon\\Parameters"
|
||||||
|
vname = "VulnerableChannelAllowList"
|
||||||
|
win_reg.set_value(hive="HKLM", key=key, vname=vname, vdata="junk", vtype="REG_SZ")
|
||||||
|
try:
|
||||||
|
win_lgpo.set_computer_policy(name=vname, setting="Not Defined")
|
||||||
|
assert not win_reg.value_exists(hive="HKLM", key=key, vname=vname)
|
||||||
|
finally:
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.destructive_test
|
||||||
|
def test_ldap_channel_binding_never():
|
||||||
|
key = "SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters"
|
||||||
|
vname = "LdapEnforceChannelBinding"
|
||||||
|
setting = "Never"
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
try:
|
||||||
|
win_lgpo.set_computer_policy(name=vname, setting=setting)
|
||||||
|
result = win_reg.read_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
assert result["vdata"] == 0
|
||||||
|
finally:
|
||||||
|
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.destructive_test
|
||||||
|
def test_ldap_channel_binding_when_supported():
|
||||||
|
key = "SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters"
|
||||||
|
vname = "LdapEnforceChannelBinding"
|
||||||
|
setting = "When supported"
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
try:
|
||||||
|
win_lgpo.set_computer_policy(name=vname, setting=setting)
|
||||||
|
result = win_reg.read_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
assert result["vdata"] == 1
|
||||||
|
finally:
|
||||||
|
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.destructive_test
|
||||||
|
def test_ldap_channel_binding_always():
|
||||||
|
key = "SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters"
|
||||||
|
vname = "LdapEnforceChannelBinding"
|
||||||
|
setting = "Always"
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
try:
|
||||||
|
win_lgpo.set_computer_policy(name=vname, setting=setting)
|
||||||
|
result = win_reg.read_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
assert result["vdata"] == 2
|
||||||
|
finally:
|
||||||
|
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.destructive_test
|
||||||
|
def test_ldap_channel_binding_not_defined():
|
||||||
|
key = "SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters"
|
||||||
|
vname = "LdapEnforceChannelBinding"
|
||||||
|
win_reg.set_value(hive="HKLM", key=key, vname=vname, vdata=1, vtype="REG_DWORD")
|
||||||
|
try:
|
||||||
|
win_lgpo.set_computer_policy(name=vname, setting="Not Defined")
|
||||||
|
assert not win_reg.value_exists(hive="HKLM", key=key, vname=vname)
|
||||||
|
finally:
|
||||||
|
win_reg.delete_value(hive="HKLM", key=key, vname=vname)
|
Loading…
Add table
Reference in a new issue