AnonSec Shell
Server IP : 185.86.78.101  /  Your IP : 216.73.216.124
Web Server : Apache
System : Linux 675867-vds-valikoshka1996.gmhost.pp.ua 5.4.0-150-generic #167-Ubuntu SMP Mon May 15 17:35:05 UTC 2023 x86_64
User : www ( 1000)
PHP Version : 7.4.33
Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : OFF
Directory :  /www/server/mysql/mysql-test/t/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     

Current File : /www/server/mysql/mysql-test/t/plugin_auth_sha256.test
--source include/not_embedded.inc
--source include/have_ssl.inc
--source include/have_sha256_rsa_auth.inc
--source include/mysql_upgrade_preparation.inc

# This test will intentionally generate errors in the server error log
# when a broken password is inserted into the mysql.user table.
# The below suppression is to clear those errors.
--disable_query_log
call mtr.add_suppression(".*Password salt for user.*");
call mtr.add_suppression("Found invalid password for user:*");
--enable_query_log

CREATE USER 'kristofer' IDENTIFIED WITH 'sha256_password';
SET GLOBAL old_passwords= 2;
SET SESSION old_passwords= 2;
ALTER USER 'kristofer' IDENTIFIED BY 'secret';
SELECT user, plugin FROM mysql.user ORDER BY user;
connect(con1,localhost,kristofer,secret,,);
connection con1;
SELECT USER(),CURRENT_USER();
connection default;
disconnect con1;
# Make sure authentication also works if client default_auth is changed and that
# it possible to select a local public key fil using client options.
DROP USER 'kristofer';

GRANT ALL ON *.* TO 'kristofer'@'localhost' IDENTIFIED WITH 'sha256_password' BY '123';
GRANT ALL ON *.* TO 'kristofer2'@'localhost' IDENTIFIED WITH 'sha256_password' BY '123';
ALTER USER 'kristofer'@'localhost' IDENTIFIED BY 'secret2';
ALTER USER 'kristofer2'@'localhost' IDENTIFIED BY 'secret2';
--disable_query_log
--error ER_ACCESS_DENIED_ERROR
connect(con2,localhost,kristofer,badpassword,,);
--enable_query_log
connect(con2,localhost,kristofer,secret2,,);
connection con2;
SELECT USER(),CURRENT_USER();
--replace_regex /AS .*$/AS '<non-deterministic-password-hash>'/
SHOW CREATE USER 'kristofer'@'localhost';

--echo Change user (should succeed)
change_user kristofer2,secret2;
SELECT USER(),CURRENT_USER();

connection default;
disconnect con2;
--echo **** Client default_auth=sha_256_password and server default auth=native
--exec $MYSQL -ukristofer -psecret2 --default_auth=sha256_password -e "select user(), current_user()"
--echo **** Client default_auth=native and server default auth=native
--exec $MYSQL -ukristofer -psecret2 --default_auth=mysql_native_password -e "select user(), current_user()"
--echo **** Client default_auth=sha_256_password + public key on file.
--exec $MYSQL -ukristofer -psecret2 --default_auth=sha256_password --server_public_key_path=$MYSQL_TEST_DIR/std_data/rsa_public_key.pem -e "select user(), current_user()"
DROP USER 'kristofer'@'localhost';
DROP USER 'kristofer2'@'localhost';

GRANT ALL ON *.* TO 'kristofer'@'localhost' IDENTIFIED WITH 'sha256_password' BY '123';
ALTER USER 'kristofer'@'localhost' IDENTIFIED BY '';
--disable_query_log
--error ER_ACCESS_DENIED_ERROR
connect(con3,localhost,kristofer,wrongpass,,);
--enable_query_log
connect(con3,localhost,kristofer,,,);
connection con3;
SELECT USER(),CURRENT_USER();
--replace_regex /AS .*$/AS '<non-deterministic-password-hash>'/
SHOW CREATE USER 'kristofer'@'localhost';
connection default;
disconnect con3;
DROP USER 'kristofer'@'localhost';

GRANT ALL ON *.* TO 'kristofer'@'33.33.33.33' IDENTIFIED WITH 'sha256_password' BY '123';
ALTER USER 'kristofer'@'33.33.33.33' IDENTIFIED BY '';
--echo Connection should fail for localhost
--replace_result $MASTER_MYSOCK MASTER_MYSOCK
--disable_query_log
--error ER_ACCESS_DENIED_ERROR
connect(con4,127.0.0.1,kristofer,,,);
--enable_query_log
DROP USER 'kristofer'@'33.33.33.33';

#
# Test with non const arguments
#
SET GLOBAL old_passwords= 2;
SET SESSION old_passwords= 2;
CREATE TABLE t1 (c1 VARCHAR(10) );
INSERT INTO t1 VALUES ('secret');
--replace_regex /2435.*00/success/
SELECT HEX(PASSWORD(c1)) FROM t1;
DROP TABLE t1;

#
# Test null argument
# PASSWORD(NULL) should produce empty "" values.
#
SELECT PASSWORD(NULL), PASSWORD('');
CREATE TABLE t1( c1 text, c2 varchar (2));
INSERT INTO t1 VALUES (NULL,''),(NULL,''),(NULL,'');
SELECT PASSWORD(c1), PASSWORD(c2) FROM t1;
DROP TABLE t1;

#
# test bad password formats
#
CREATE USER 'kristofer' IDENTIFIED WITH 'sha256_password';
SET GLOBAL old_passwords= 2;
SET SESSION old_passwords= 2;
ALTER USER 'kristofer' IDENTIFIED BY 'secret';
SELECT user, plugin FROM mysql.user ORDER BY user;
--disable_query_log
connect(con1,localhost,kristofer,secret);
--enable_query_log
connection con1;
SELECT USER(),CURRENT_USER();
connection default;
disconnect con1;
UPDATE mysql.user SET authentication_string= '$' WHERE user='kristofer';
FLUSH PRIVILEGES;
SELECT user,authentication_string,plugin FROM mysql.user WHERE user='kristofer';
--disable_query_log
--error ER_ACCESS_DENIED_ERROR
connect(con1,localhost,kristofer,secret);
--enable_query_log

UPDATE mysql.user SET authentication_string= '$5$asd' WHERE user='kristofer';
FLUSH PRIVILEGES;
SELECT user,authentication_string,plugin FROM mysql.user WHERE user='kristofer';
--disable_query_log
--error ER_ACCESS_DENIED_ERROR
connect(con1,localhost,kristofer,secret);
--enable_query_log
DROP USER kristofer;

# Restore default value for old_passwords
SET GLOBAL old_passwords= default;


Anon7 - 2022
AnonSec Team