diff options
author | Jeremy Allison <jra@samba.org> | 2010-02-12 22:45:37 -0800 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 2010-02-12 22:45:37 -0800 |
commit | d46d7717c7bdc1b404ff53d7831ed00d556a940f (patch) | |
tree | e8f2649acc00e592854d0887019a2c9c3a9d0398 | |
parent | 10e54fb422d9f1ae6d33e5fabbf8c651b0e57a8c (diff) | |
download | samba-d46d7717c7bdc1b404ff53d7831ed00d556a940f.tar.gz samba-d46d7717c7bdc1b404ff53d7831ed00d556a940f.tar.bz2 samba-d46d7717c7bdc1b404ff53d7831ed00d556a940f.zip |
Simplify the logic in make_connection_snum(), and make it match Windows behavior.
Cause all exit paths to go through one place, where all cleanup is
done. change_to_root_user() for pathname operations that should succeed if
the path exists, even if the connecting user has no access.
For example, a share can now be defined with a path of /root/only/access
(where /root/only/access is a directory path with all components only
accessible to root e.g. root owned, permissions 700 on every component).
Non-root users will now correctly connect, but get ACCESS_DENIED on
all activities (which matches Windows behavior). Previously, non-root
users would get NT_STATUS_BAD_NETWORK_NAME on doing a TConX to this
share, even though it's a perfectly valid share path (just not accessible
to them).
This change was inspired by the research I did for bug #7126, which
was reported by bepi@adria.it.
As this is a change in a core function, I'm proposing to leave
this only in master for 3.6.0, not back-port to any existing releases.
This should give us enough time to decide if this is the way we want this to
behave (as Windows) or if we prefer the previous behavior.
Jeremy.
-rw-r--r-- | source3/smbd/service.c | 104 |
1 files changed, 63 insertions, 41 deletions
diff --git a/source3/smbd/service.c b/source3/smbd/service.c index 4f55ea924a..b3e833ea1d 100644 --- a/source3/smbd/service.c +++ b/source3/smbd/service.c @@ -647,25 +647,28 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, const char *pdev, NTSTATUS *pstatus) { - connection_struct *conn; + connection_struct *conn = NULL; struct smb_filename *smb_fname_cpath = NULL; fstring dev; int ret; char addr[INET6_ADDRSTRLEN]; bool on_err_call_dis_hook = false; + bool claimed_connection = false; + uid_t effuid; + gid_t effgid; NTSTATUS status; fstrcpy(dev, pdev); if (NT_STATUS_IS_ERR(*pstatus = share_sanity_checks(snum, dev))) { - return NULL; - } + goto err_root_exit; + } conn = conn_new(sconn); if (!conn) { DEBUG(0,("Couldn't find free connection.\n")); *pstatus = NT_STATUS_INSUFFICIENT_RESOURCES; - return NULL; + goto err_root_exit; } conn->params->service = snum; @@ -678,8 +681,7 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, DEBUG(1, ("create_connection_server_info failed: %s\n", nt_errstr(status))); *pstatus = status; - conn_free(conn); - return NULL; + goto err_root_exit; } if ((lp_guest_only(snum)) || (lp_security() == SEC_SHARE)) { @@ -733,18 +735,16 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, fuser = talloc_string_sub(conn, lp_force_user(snum), "%S", lp_servicename(snum)); if (fuser == NULL) { - conn_free(conn); *pstatus = NT_STATUS_NO_MEMORY; - return NULL; + goto err_root_exit; } status = make_serverinfo_from_username( conn, fuser, conn->server_info->guest, &forced_serverinfo); if (!NT_STATUS_IS_OK(status)) { - conn_free(conn); *pstatus = status; - return NULL; + goto err_root_exit; } TALLOC_FREE(conn->server_info); @@ -767,9 +767,8 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, &conn->server_info->utok.gid); if (!NT_STATUS_IS_OK(status)) { - conn_free(conn); *pstatus = status; - return NULL; + goto err_root_exit; } /* @@ -793,16 +792,14 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, pdb_get_domain(conn->server_info->sam_account), lp_pathname(snum)); if (!s) { - conn_free(conn); *pstatus = NT_STATUS_NO_MEMORY; - return NULL; + goto err_root_exit; } if (!set_conn_connectpath(conn,s)) { TALLOC_FREE(s); - conn_free(conn); *pstatus = NT_STATUS_NO_MEMORY; - return NULL; + goto err_root_exit; } DEBUG(3,("Connect path is '%s' for service [%s]\n",s, lp_servicename(snum))); @@ -832,9 +829,8 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, "denied due to security " "descriptor.\n", lp_servicename(snum))); - conn_free(conn); *pstatus = NT_STATUS_ACCESS_DENIED; - return NULL; + goto err_root_exit; } else { conn->read_only = True; } @@ -845,9 +841,8 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, if (!smbd_vfs_init(conn)) { DEBUG(0, ("vfs_init failed for service %s\n", lp_servicename(snum))); - conn_free(conn); *pstatus = NT_STATUS_BAD_NETWORK_NAME; - return NULL; + goto err_root_exit; } if ((!conn->printer) && (!conn->ipc)) { @@ -872,20 +867,19 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, DEBUG(1, ("Max connections (%d) exceeded for %s\n", lp_max_connections(snum), lp_servicename(snum))); - conn_free(conn); *pstatus = NT_STATUS_INSUFFICIENT_RESOURCES; - return NULL; - } + goto err_root_exit; + } /* * Get us an entry in the connections db */ if (!claim_connection(conn, lp_servicename(snum), 0)) { DEBUG(1, ("Could not store connections entry\n")); - conn_free(conn); *pstatus = NT_STATUS_INTERNAL_DB_ERROR; - return NULL; - } + goto err_root_exit; + } + claimed_connection = true; /* * Fix compatibility issue pointed out by Volker. @@ -917,10 +911,8 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, if (ret != 0 && lp_rootpreexec_close(snum)) { DEBUG(1,("root preexec gave %d - failing " "connection\n", ret)); - yield_connection(conn, lp_servicename(snum)); - conn_free(conn); *pstatus = NT_STATUS_ACCESS_DENIED; - return NULL; + goto err_root_exit; } } @@ -928,15 +920,16 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, if (!change_to_user(conn, conn->vuid)) { /* No point continuing if they fail the basic checks */ DEBUG(0,("Can't become connected user!\n")); - yield_connection(conn, lp_servicename(snum)); - conn_free(conn); *pstatus = NT_STATUS_LOGON_FAILURE; - return NULL; + goto err_root_exit; } + effuid = geteuid(); + effgid = getegid(); + /* Remember that a different vuid can connect later without these * checks... */ - + /* Preexecs are done here as they might make the dir we are to ChDir * to below */ @@ -968,6 +961,14 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, * depend on the realpath() pointer in the vfs table. JRA. */ if (!lp_widelinks(snum)) { + + /* We need to do the path canonicalization + * as root, as we may not have rights to + * this path as the user. */ + + change_to_root_user(); + +/* ROOT Activites: */ if (!canonicalize_connect_path(conn)) { DEBUG(0, ("canonicalize_connect_path failed " "for service %s, path %s\n", @@ -976,6 +977,13 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, *pstatus = NT_STATUS_BAD_NETWORK_NAME; goto err_root_exit; } + + /* Back to the user for the VFS_CONNECT call. */ + if (!change_to_user(conn, conn->vuid)) { + *pstatus = NT_STATUS_LOGON_FAILURE; + goto err_root_exit; + } +/* USER Activites: */ } #ifdef WITH_FAKE_KASERVER @@ -983,7 +991,7 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, afs_login(conn); } #endif - + /* Add veto/hide lists */ if (!IS_IPC(conn) && !IS_PRINT(conn)) { set_namearray( &conn->veto_list, lp_veto_files(snum)); @@ -992,7 +1000,7 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, set_namearray( &conn->aio_write_behind_list, lp_aio_write_behind(snum)); } - + /* Invoke VFS make connection hook - do this before the VFS_STAT call to allow any filesystems needing user credentials to initialize themselves. */ @@ -1019,6 +1027,15 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, check during individual operations. To match this behaviour I have disabled this chdir check (tridge) */ /* the alternative is just to check the directory exists */ + + /* + * we've finished with the user stuff - go back to root + * so the SMB_VFS_STAT call will only fail on path errors, + * not permission problems. + */ + change_to_root_user(); + +/* ROOT Activites: */ if ((ret = SMB_VFS_STAT(conn, smb_fname_cpath)) != 0 || !S_ISDIR(smb_fname_cpath->st.st_ex_mode)) { if (ret == 0 && !S_ISDIR(smb_fname_cpath->st.st_ex_mode)) { @@ -1057,23 +1074,28 @@ connection_struct *make_connection_snum(struct smbd_server_connection *sconn, dbgtext( "connect to service %s ", lp_servicename(snum) ); dbgtext( "initially as user %s ", conn->server_info->unix_name ); - dbgtext( "(uid=%d, gid=%d) ", (int)geteuid(), (int)getegid() ); + dbgtext( "(uid=%d, gid=%d) ", (int)effuid, (int)effgid ); dbgtext( "(pid %d)\n", (int)sys_getpid() ); } - /* we've finished with the user stuff - go back to root */ - change_to_root_user(); return(conn); err_root_exit: TALLOC_FREE(smb_fname_cpath); - change_to_root_user(); + /* We must exit this function as root. */ + if (geteuid() != sec_initial_uid()) { + change_to_root_user(); + } if (on_err_call_dis_hook) { /* Call VFS disconnect hook */ SMB_VFS_DISCONNECT(conn); } - yield_connection(conn, lp_servicename(snum)); - conn_free(conn); + if (claimed_connection) { + yield_connection(conn, lp_servicename(snum)); + } + if (conn) { + conn_free(conn); + } return NULL; } |