2007-12-17 12:34:29 +03:00
/*
2007-04-09 14:38:55 +04:00
* Unix SMB / CIFS implementation .
* Authentication utility functions
* Copyright ( C ) Andrew Tridgell 1992 - 1998
* Copyright ( C ) Andrew Bartlett 2001
* Copyright ( C ) Jeremy Allison 2000 - 2001
* Copyright ( C ) Rafal Szczesniak 2002
* Copyright ( C ) Volker Lendecke 2006
* Copyright ( C ) Michael Adam 2007
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
* the Free Software Foundation ; either version 3 of the License , or
2007-04-09 14:38:55 +04:00
* ( at your option ) any later version .
2007-12-17 12:34:29 +03:00
*
2007-04-09 14:38:55 +04:00
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
2007-12-17 12:34:29 +03:00
*
2007-04-09 14:38:55 +04:00
* You should have received a copy of the GNU General Public License
2007-07-10 09:23:25 +04:00
* along with this program ; if not , see < http : //www.gnu.org/licenses/>.
2007-04-09 14:38:55 +04:00
*/
/* functions moved from auth/auth_util.c to minimize linker deps */
# include "includes.h"
/****************************************************************************
Check for a SID in an NT_USER_TOKEN
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
bool nt_token_check_sid ( const DOM_SID * sid , const NT_USER_TOKEN * token )
2007-04-09 14:38:55 +04:00
{
int i ;
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
if ( ! sid | | ! token )
return False ;
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
for ( i = 0 ; i < token - > num_sids ; i + + ) {
if ( sid_equal ( sid , & token - > user_sids [ i ] ) )
return True ;
}
return False ;
}
2007-12-17 12:34:29 +03:00
bool nt_token_check_domain_rid ( NT_USER_TOKEN * token , uint32 rid )
2007-04-09 14:38:55 +04:00
{
DOM_SID domain_sid ;
2007-12-17 12:34:29 +03:00
/* if we are a domain member, the get the domain SID, else for
2007-04-09 14:38:55 +04:00
a DC or standalone server , use our own SID */
if ( lp_server_role ( ) = = ROLE_DOMAIN_MEMBER ) {
if ( ! secrets_fetch_domain_sid ( lp_workgroup ( ) ,
& domain_sid ) ) {
DEBUG ( 1 , ( " nt_token_check_domain_rid: Cannot lookup "
" SID for domain [%s] \n " , lp_workgroup ( ) ) ) ;
return False ;
}
2007-12-17 12:34:29 +03:00
}
2007-04-09 14:38:55 +04:00
else
sid_copy ( & domain_sid , get_global_sam_sid ( ) ) ;
sid_append_rid ( & domain_sid , rid ) ;
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
return nt_token_check_sid ( & domain_sid , token ) ; \
}
/******************************************************************************
Create a token for the root user to be used internally by smbd .
This is similar to running under the context of the LOCAL_SYSTEM account
in Windows . This is a read - only token . Do not modify it or free ( ) it .
Create a copy if your need to change it .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NT_USER_TOKEN * get_root_nt_token ( void )
{
2008-11-14 15:42:54 +03:00
struct nt_user_token * token , * for_cache ;
2007-04-09 14:38:55 +04:00
DOM_SID u_sid , g_sid ;
struct passwd * pw ;
2007-12-28 19:24:39 +03:00
void * cache_data ;
2007-12-17 12:34:29 +03:00
2007-12-28 19:24:39 +03:00
cache_data = memcache_lookup_talloc (
NULL , SINGLETON_CACHE_TALLOC ,
2008-10-13 07:20:26 +04:00
data_blob_string_const_null ( " root_nt_token " ) ) ;
2007-12-28 19:24:39 +03:00
if ( cache_data ! = NULL ) {
return talloc_get_type_abort (
cache_data , struct nt_user_token ) ;
}
2007-04-09 14:38:55 +04:00
if ( ! ( pw = sys_getpwnam ( " root " ) ) ) {
2007-12-13 16:38:05 +03:00
DEBUG ( 0 , ( " get_root_nt_token: getpwnam( \" root \" ) failed! \n " ) ) ;
2007-04-09 14:38:55 +04:00
return NULL ;
}
2007-12-17 12:34:29 +03:00
/* get the user and primary group SIDs; although the
2007-04-09 14:38:55 +04:00
BUILTIN \ Administrators SId is really the one that matters here */
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
uid_to_sid ( & u_sid , pw - > pw_uid ) ;
gid_to_sid ( & g_sid , pw - > pw_gid ) ;
2008-11-07 07:48:13 +03:00
token = create_local_nt_token ( talloc_autofree_context ( ) , & u_sid , False ,
2007-04-09 14:38:55 +04:00
1 , & global_sid_Builtin_Administrators ) ;
2007-12-28 19:24:39 +03:00
2008-04-15 22:41:14 +04:00
token - > privileges = se_disk_operators ;
2008-11-14 15:42:54 +03:00
for_cache = token ;
2007-12-28 19:24:39 +03:00
memcache_add_talloc (
NULL , SINGLETON_CACHE_TALLOC ,
2008-11-14 15:42:54 +03:00
data_blob_string_const_null ( " root_nt_token " ) , & for_cache ) ;
2007-12-28 19:24:39 +03:00
2007-04-09 14:38:55 +04:00
return token ;
}
/*
* Add alias SIDs from memberships within the partially created token SID list
*/
2007-05-07 16:15:11 +04:00
NTSTATUS add_aliases ( const DOM_SID * domain_sid ,
struct nt_user_token * token )
2007-04-09 14:38:55 +04:00
{
uint32 * aliases ;
size_t i , num_aliases ;
NTSTATUS status ;
TALLOC_CTX * tmp_ctx ;
if ( ! ( tmp_ctx = talloc_init ( " add_aliases " ) ) ) {
return NT_STATUS_NO_MEMORY ;
}
aliases = NULL ;
num_aliases = 0 ;
status = pdb_enum_alias_memberships ( tmp_ctx , domain_sid ,
token - > user_sids ,
token - > num_sids ,
& aliases , & num_aliases ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " pdb_enum_alias_memberships failed: %s \n " ,
nt_errstr ( status ) ) ) ;
2008-01-09 02:11:31 +03:00
goto done ;
2007-04-09 14:38:55 +04:00
}
for ( i = 0 ; i < num_aliases ; i + + ) {
DOM_SID alias_sid ;
sid_compose ( & alias_sid , domain_sid , aliases [ i ] ) ;
2008-01-09 02:11:31 +03:00
status = add_sid_to_array_unique ( token , & alias_sid ,
& token - > user_sids ,
& token - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
DEBUG ( 0 , ( " add_sid_to_array failed \n " ) ) ;
2008-01-09 02:11:31 +03:00
goto done ;
2007-04-09 14:38:55 +04:00
}
}
2008-01-09 02:11:31 +03:00
done :
2007-04-09 14:38:55 +04:00
TALLOC_FREE ( tmp_ctx ) ;
return NT_STATUS_OK ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-07-24 07:42:32 +04:00
static NTSTATUS add_builtin_administrators ( struct nt_user_token * token ,
const DOM_SID * dom_sid )
2007-04-09 14:38:55 +04:00
{
DOM_SID domadm ;
2008-01-09 02:11:31 +03:00
NTSTATUS status ;
2007-04-09 14:38:55 +04:00
/* nothing to do if we aren't in a domain */
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
if ( ! ( IS_DC | | lp_server_role ( ) = = ROLE_DOMAIN_MEMBER ) ) {
return NT_STATUS_OK ;
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* Find the Domain Admins SID */
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
if ( IS_DC ) {
sid_copy ( & domadm , get_global_sam_sid ( ) ) ;
} else {
2008-07-24 07:42:32 +04:00
sid_copy ( & domadm , dom_sid ) ;
2007-04-09 14:38:55 +04:00
}
sid_append_rid ( & domadm , DOMAIN_GROUP_RID_ADMINS ) ;
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* Add Administrators if the user beloongs to Domain Admins */
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
if ( nt_token_check_sid ( & domadm , token ) ) {
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( token ,
& global_sid_Builtin_Administrators ,
& token - > user_sids , & token - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2007-04-09 14:38:55 +04:00
}
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
return NT_STATUS_OK ;
}
2008-07-24 07:24:39 +04:00
/**
* Create the requested BUILTIN if it doesn ' t already exist . This requires
* winbindd to be running .
*
* @ param [ in ] rid BUILTIN rid to create
* @ return Normal NTSTATUS return .
*/
static NTSTATUS create_builtin ( uint32 rid )
{
NTSTATUS status = NT_STATUS_OK ;
DOM_SID sid ;
gid_t gid ;
if ( ! sid_compose ( & sid , & global_sid_Builtin , rid ) ) {
return NT_STATUS_NO_SUCH_ALIAS ;
}
if ( ! sid_to_gid ( & sid , & gid ) ) {
if ( ! lp_winbind_nested_groups ( ) | | ! winbind_ping ( ) ) {
return NT_STATUS_PROTOCOL_UNREACHABLE ;
}
status = pdb_create_builtin_alias ( rid ) ;
}
return status ;
}
/**
* Add sid as a member of builtin_sid .
*
* @ param [ in ] builtin_sid An existing builtin group .
* @ param [ in ] dom_sid sid to add as a member of builtin_sid .
* @ return Normal NTSTATUS return
*/
static NTSTATUS add_sid_to_builtin ( const DOM_SID * builtin_sid ,
const DOM_SID * dom_sid )
{
NTSTATUS status = NT_STATUS_OK ;
if ( ! dom_sid | | ! builtin_sid ) {
return NT_STATUS_INVALID_PARAMETER ;
}
status = pdb_add_aliasmem ( builtin_sid , dom_sid ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_MEMBER_IN_ALIAS ) ) {
DEBUG ( 5 , ( " add_sid_to_builtin %s is already a member of %s \n " ,
sid_string_dbg ( dom_sid ) ,
sid_string_dbg ( builtin_sid ) ) ) ;
return NT_STATUS_OK ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-07-30 20:35:13 +04:00
DEBUG ( 4 , ( " add_sid_to_builtin %s could not be added to %s: "
2008-07-24 07:24:39 +04:00
" %s \n " , sid_string_dbg ( dom_sid ) ,
sid_string_dbg ( builtin_sid ) , nt_errstr ( status ) ) ) ;
}
return status ;
}
2007-04-09 14:38:55 +04:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-07-24 07:50:21 +04:00
NTSTATUS create_builtin_users ( const DOM_SID * dom_sid )
2007-04-09 14:38:55 +04:00
{
NTSTATUS status ;
DOM_SID dom_users ;
2008-07-24 07:33:15 +04:00
status = create_builtin ( BUILTIN_ALIAS_RID_USERS ) ;
2007-04-09 14:38:55 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-04-30 18:43:00 +04:00
DEBUG ( 5 , ( " create_builtin_users: Failed to create Users \n " ) ) ;
2007-04-09 14:38:55 +04:00
return status ;
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* add domain users */
2007-12-17 12:34:29 +03:00
if ( ( IS_DC | | ( lp_server_role ( ) = = ROLE_DOMAIN_MEMBER ) )
2008-07-24 07:33:15 +04:00
& & sid_compose ( & dom_users , dom_sid , DOMAIN_GROUP_RID_USERS ) )
2007-04-09 14:38:55 +04:00
{
2008-07-24 07:33:15 +04:00
status = add_sid_to_builtin ( & global_sid_Builtin_Users ,
& dom_users ) ;
2007-04-09 14:38:55 +04:00
}
2007-12-17 12:34:29 +03:00
2008-07-30 20:35:13 +04:00
return status ;
2007-12-17 12:34:29 +03:00
}
2007-04-09 14:38:55 +04:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-07-24 07:50:21 +04:00
NTSTATUS create_builtin_administrators ( const DOM_SID * dom_sid )
2007-04-09 14:38:55 +04:00
{
NTSTATUS status ;
DOM_SID dom_admins , root_sid ;
2008-09-03 22:36:43 +04:00
fstring root_name ;
2007-12-17 12:34:29 +03:00
enum lsa_SidType type ;
2007-04-09 14:38:55 +04:00
TALLOC_CTX * ctx ;
2007-10-19 04:40:25 +04:00
bool ret ;
2007-04-09 14:38:55 +04:00
2008-07-24 07:42:32 +04:00
status = create_builtin ( BUILTIN_ALIAS_RID_ADMINS ) ;
2007-04-09 14:38:55 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-04-30 18:43:00 +04:00
DEBUG ( 5 , ( " create_builtin_administrators: Failed to create Administrators \n " ) ) ;
2007-04-09 14:38:55 +04:00
return status ;
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* add domain admins */
2007-12-17 12:34:29 +03:00
if ( ( IS_DC | | ( lp_server_role ( ) = = ROLE_DOMAIN_MEMBER ) )
2008-07-24 07:42:32 +04:00
& & sid_compose ( & dom_admins , dom_sid , DOMAIN_GROUP_RID_ADMINS ) )
2007-04-09 14:38:55 +04:00
{
2008-07-24 07:42:32 +04:00
status = add_sid_to_builtin ( & global_sid_Builtin_Administrators ,
& dom_admins ) ;
2008-07-30 20:35:13 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return status ;
}
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* add root */
if ( ( ctx = talloc_init ( " create_builtin_administrators " ) ) = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2008-09-03 22:36:43 +04:00
fstr_sprintf ( root_name , " %s \\ root " , get_global_sam_name ( ) ) ;
ret = lookup_name ( ctx , root_name , LOOKUP_NAME_DOMAIN , NULL , NULL ,
& root_sid , & type ) ;
2007-04-09 14:38:55 +04:00
TALLOC_FREE ( ctx ) ;
if ( ret ) {
2008-07-24 07:42:32 +04:00
status = add_sid_to_builtin ( & global_sid_Builtin_Administrators ,
& root_sid ) ;
2007-04-09 14:38:55 +04:00
}
2007-12-17 12:34:29 +03:00
2008-07-30 20:35:13 +04:00
return status ;
2007-12-17 12:34:29 +03:00
}
2007-04-09 14:38:55 +04:00
/*******************************************************************
Create a NT token for the user , expanding local aliases
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
struct nt_user_token * create_local_nt_token ( TALLOC_CTX * mem_ctx ,
const DOM_SID * user_sid ,
2007-10-19 04:40:25 +04:00
bool is_guest ,
2007-04-09 14:38:55 +04:00
int num_groupsids ,
const DOM_SID * groupsids )
{
struct nt_user_token * result = NULL ;
int i ;
NTSTATUS status ;
gid_t gid ;
2008-07-24 07:33:15 +04:00
DOM_SID dom_sid ;
2007-04-09 14:38:55 +04:00
2007-12-15 23:11:36 +03:00
DEBUG ( 10 , ( " Create local NT token for %s \n " ,
sid_string_dbg ( user_sid ) ) ) ;
2007-04-09 14:38:55 +04:00
2007-12-29 23:41:23 +03:00
if ( ! ( result = TALLOC_ZERO_P ( mem_ctx , struct nt_user_token ) ) ) {
2007-04-09 14:38:55 +04:00
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return NULL ;
}
/* Add the user and primary group sid */
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( result , user_sid ,
& result - > user_sids , & result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
/* For guest, num_groupsids may be zero. */
if ( num_groupsids ) {
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( result , & groupsids [ 0 ] ,
& result - > user_sids ,
& result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* Add in BUILTIN sids */
2007-12-17 12:34:29 +03:00
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( result , & global_sid_World ,
& result - > user_sids , & result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( result , & global_sid_Network ,
& result - > user_sids , & result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
if ( is_guest ) {
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( result , & global_sid_Builtin_Guests ,
& result - > user_sids ,
& result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
} else {
2008-01-09 02:11:31 +03:00
status = add_sid_to_array ( result ,
& global_sid_Authenticated_Users ,
& result - > user_sids ,
& result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* Now the SIDs we got from authentication. These are the ones from
* the info3 struct or from the pdb_enum_group_memberships , depending
* on who authenticated the user .
* Note that we start the for loop at " 1 " here , we already added the
* first group sid as primary above . */
for ( i = 1 ; i < num_groupsids ; i + + ) {
2008-01-09 02:11:31 +03:00
status = add_sid_to_array_unique ( result , & groupsids [ i ] ,
& result - > user_sids ,
& result - > num_sids ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-04-09 14:38:55 +04:00
return NULL ;
}
}
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
/* Deal with the BUILTIN\Administrators group. If the SID can
2007-12-17 12:34:29 +03:00
be resolved then assume that the add_aliasmem ( S - 1 - 5 - 32 )
2007-04-09 14:38:55 +04:00
handled it . */
2008-07-24 07:42:32 +04:00
if ( ! sid_to_gid ( & global_sid_Builtin_Administrators , & gid ) ) {
2007-12-17 12:34:29 +03:00
2008-07-24 07:42:32 +04:00
become_root ( ) ;
if ( ! secrets_fetch_domain_sid ( lp_workgroup ( ) , & dom_sid ) ) {
status = NT_STATUS_OK ;
DEBUG ( 3 , ( " Failed to fetch domain sid for %s \n " ,
lp_workgroup ( ) ) ) ;
} else {
status = create_builtin_administrators ( & dom_sid ) ;
2007-04-09 14:38:55 +04:00
}
2008-07-24 07:42:32 +04:00
unbecome_root ( ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_PROTOCOL_UNREACHABLE ) ) {
/* Add BUILTIN\Administrators directly to token. */
status = add_builtin_administrators ( result , & dom_sid ) ;
2007-04-09 14:38:55 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-07-24 07:42:32 +04:00
DEBUG ( 3 , ( " Failed to check for local "
" Administrators membership (%s) \n " ,
nt_errstr ( status ) ) ) ;
2007-12-17 12:34:29 +03:00
}
2008-07-24 07:42:32 +04:00
} else if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 2 , ( " WARNING: Failed to create "
" BUILTIN \\ Administrators group! Can "
" Winbind allocate gids? \n " ) ) ;
2007-12-17 12:34:29 +03:00
}
2007-04-09 14:38:55 +04:00
}
/* Deal with the BUILTIN\Users group. If the SID can
2007-12-17 12:34:29 +03:00
be resolved then assume that the add_aliasmem ( S - 1 - 5 - 32 )
2007-04-09 14:38:55 +04:00
handled it . */
2008-07-24 07:33:15 +04:00
if ( ! sid_to_gid ( & global_sid_Builtin_Users , & gid ) ) {
2007-12-17 12:34:29 +03:00
2008-07-24 07:33:15 +04:00
become_root ( ) ;
if ( ! secrets_fetch_domain_sid ( lp_workgroup ( ) , & dom_sid ) ) {
status = NT_STATUS_OK ;
DEBUG ( 3 , ( " Failed to fetch domain sid for %s \n " ,
lp_workgroup ( ) ) ) ;
} else {
status = create_builtin_users ( & dom_sid ) ;
}
unbecome_root ( ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_PROTOCOL_UNREACHABLE ) & &
! NT_STATUS_IS_OK ( status ) )
{
DEBUG ( 2 , ( " WARNING: Failed to create BUILTIN \\ Users group! "
" Can Winbind allocate gids? \n " ) ) ;
2007-04-09 14:38:55 +04:00
}
}
/* Deal with local groups */
2007-12-17 12:34:29 +03:00
2007-04-09 14:38:55 +04:00
if ( lp_winbind_nested_groups ( ) ) {
2007-10-10 12:27:56 +04:00
become_root ( ) ;
2007-04-09 14:38:55 +04:00
/* Now add the aliases. First the one from our local SAM */
status = add_aliases ( get_global_sam_sid ( ) , result ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-12-10 13:47:17 +03:00
unbecome_root ( ) ;
2007-04-09 14:38:55 +04:00
TALLOC_FREE ( result ) ;
return NULL ;
}
/* Finally the builtin ones */
status = add_aliases ( & global_sid_Builtin , result ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-12-10 13:47:17 +03:00
unbecome_root ( ) ;
2007-04-09 14:38:55 +04:00
TALLOC_FREE ( result ) ;
return NULL ;
}
2007-10-10 12:27:56 +04:00
unbecome_root ( ) ;
2007-12-17 12:34:29 +03:00
}
2007-04-09 14:38:55 +04:00
get_privileges_for_sids ( & result - > privileges , result - > user_sids ,
result - > num_sids ) ;
return result ;
}
2007-05-07 16:15:11 +04:00
/****************************************************************************
prints a NT_USER_TOKEN to debug output .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
void debug_nt_user_token ( int dbg_class , int dbg_lev , NT_USER_TOKEN * token )
{
size_t i ;
2007-12-17 12:34:29 +03:00
2007-05-07 16:15:11 +04:00
if ( ! token ) {
DEBUGC ( dbg_class , dbg_lev , ( " NT user token: (NULL) \n " ) ) ;
return ;
}
2007-12-17 12:34:29 +03:00
2007-05-07 16:15:11 +04:00
DEBUGC ( dbg_class , dbg_lev ,
( " NT user token of user %s \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( & token - > user_sids [ 0 ] ) ) ) ;
2007-05-07 16:15:11 +04:00
DEBUGADDC ( dbg_class , dbg_lev ,
( " contains %lu SIDs \n " , ( unsigned long ) token - > num_sids ) ) ;
for ( i = 0 ; i < token - > num_sids ; i + + )
DEBUGADDC ( dbg_class , dbg_lev ,
2007-12-17 12:34:29 +03:00
( " SID[%3lu]: %s \n " , ( unsigned long ) i ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( & token - > user_sids [ i ] ) ) ) ;
2007-05-07 16:15:11 +04:00
dump_se_priv ( dbg_class , dbg_lev , & token - > privileges ) ;
}
/****************************************************************************
prints a UNIX ' token ' to debug output .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
void debug_unix_user_token ( int dbg_class , int dbg_lev , uid_t uid , gid_t gid ,
int n_groups , gid_t * groups )
{
int i ;
DEBUGC ( dbg_class , dbg_lev ,
( " UNIX token of user %ld \n " , ( long int ) uid ) ) ;
DEBUGADDC ( dbg_class , dbg_lev ,
( " Primary group is %ld and contains %i supplementary "
" groups \n " , ( long int ) gid , n_groups ) ) ;
for ( i = 0 ; i < n_groups ; i + + )
2007-12-17 12:34:29 +03:00
DEBUGADDC ( dbg_class , dbg_lev , ( " Group[%3i]: %ld \n " , i ,
2007-05-07 16:15:11 +04:00
( long int ) groups [ i ] ) ) ;
}
2007-04-09 14:38:55 +04:00
/* END */