/* Unix SMB/CIFS implementation. Check access based on valid users, read list and friends Copyright (C) Volker Lendecke 2005 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ #include "includes.h" #include "smbd/globals.h" /* * No prefix means direct username * @name means netgroup first, then unix group * &name means netgroup * +name means unix group * + and & may be combined */ static bool do_group_checks(const char **name, const char **pattern) { if ((*name)[0] == '@') { *pattern = "&+"; *name += 1; return True; } if (((*name)[0] == '+') && ((*name)[1] == '&')) { *pattern = "+&"; *name += 2; return True; } if ((*name)[0] == '+') { *pattern = "+"; *name += 1; return True; } if (((*name)[0] == '&') && ((*name)[1] == '+')) { *pattern = "&+"; *name += 2; return True; } if ((*name)[0] == '&') { *pattern = "&"; *name += 1; return True; } return False; } static bool token_contains_name(TALLOC_CTX *mem_ctx, const char *username, const char *domain, const char *sharename, const struct nt_user_token *token, const char *name) { const char *prefix; DOM_SID sid; enum lsa_SidType type; struct smbd_server_connection *sconn = smbd_server_conn; if (username != NULL) { name = talloc_sub_basic(mem_ctx, username, domain, name); } if (sharename != NULL) { name = talloc_string_sub(mem_ctx, name, "%S", sharename); } if (name == NULL) { /* This is too security sensitive, better panic than return a * result that might be interpreted in a wrong way. */ smb_panic("substitutions failed"); } /* check to see is we already have a SID */ if ( string_to_sid( &sid, name ) ) { DEBUG(5,("token_contains_name: Checking for SID [%s] in token\n", name)); return nt_token_check_sid( &sid, token ); } if (!do_group_checks(&name, &prefix)) { if (!lookup_name_smbconf(mem_ctx, name, LOOKUP_NAME_ALL, NULL, NULL, &sid, &type)) { DEBUG(5, ("lookup_name %s failed\n", name)); return False; } if (type != SID_NAME_USER) { DEBUG(5, ("%s is a %s, expected a user\n", name, sid_type_lookup(type))); return False; } return nt_token_check_sid(&sid, token); } for (/* initialized above */ ; *prefix != '\0'; prefix++) { if (*prefix == '+') { if (!lookup_name_smbconf(mem_ctx, name, LOOKUP_NAME_ALL|LOOKUP_NAME_GROUP, NULL, NULL, &sid, &type)) { DEBUG(5, ("lookup_name %s failed\n", name)); return False; } if ((type != SID_NAME_DOM_GRP) && (type != SID_NAME_ALIAS) && (type != SID_NAME_WKN_GRP)) { DEBUG(5, ("%s is a %s, expected a group\n", name, sid_type_lookup(type))); return False; } if (nt_token_check_sid(&sid, token)) { return True; } continue; } if (*prefix == '&') { if (username) { if (user_in_netgroup(sconn, username, name)) { return True; } } continue; } smb_panic("got invalid prefix from do_groups_check"); } return False; } /* * Check whether a user is contained in the list provided. * * Please note that the user name and share names passed in here mainly for * the substitution routines that expand the parameter values, the decision * whether a user is in the list is done after a lookup_name on the expanded * parameter value, solely based on comparing the SIDs in token. * * The other use is the netgroup check when using @group or &group. */ bool token_contains_name_in_list(const char *username, const char *domain, const char *sharename, const struct nt_user_token *token, const char **list) { TALLOC_CTX *mem_ctx; if (list == NULL) { return False; } if ( (mem_ctx = talloc_new(NULL)) == NULL ) { smb_panic("talloc_new failed"); } while (*list != NULL) { if (token_contains_name(mem_ctx, username, domain, sharename, token, *list)) { TALLOC_FREE(mem_ctx); return True; } list += 1; } TALLOC_FREE(mem_ctx); return False; } /* * Check whether the user described by "token" has access to share snum. * * This looks at "invalid users", "valid users" and "only user/username" * * Please note that the user name and share names passed in here mainly for * the substitution routines that expand the parameter values, the decision * whether a user is in the list is done after a lookup_name on the expanded * parameter value, solely based on comparing the SIDs in token. * * The other use is the netgroup check when using @group or &group. */ bool user_ok_token(const char *username, const char *domain, const struct nt_user_token *token, int snum) { if (lp_invalid_users(snum) != NULL) { if (token_contains_name_in_list(username, domain, lp_servicename(snum), token, lp_invalid_users(snum))) { DEBUG(10, ("User %s in 'invalid users'\n", username)); return False; } } if (lp_valid_users(snum) != NULL) { if (!token_contains_name_in_list(username, domain, lp_servicename(snum), token, lp_valid_users(snum))) { DEBUG(10, ("User %s not in 'valid users'\n", username)); return False; } } if (lp_onlyuser(snum)) { const char *list[2]; list[0] = lp_username(snum); list[1] = NULL; if ((list[0] == NULL) || (*list[0] == '\0')) { DEBUG(0, ("'only user = yes' and no 'username ='\n")); return False; } if (!token_contains_name_in_list(NULL, domain, lp_servicename(snum), token, list)) { DEBUG(10, ("%s != 'username'\n", username)); return False; } } DEBUG(10, ("user_ok_token: share %s is ok for unix user %s\n", lp_servicename(snum), username)); return True; } /* * Check whether the user described by "token" is restricted to read-only * access on share snum. * * This looks at "invalid users", "valid users" and "only user/username" * * Please note that the user name and share names passed in here mainly for * the substitution routines that expand the parameter values, the decision * whether a user is in the list is done after a lookup_name on the expanded * parameter value, solely based on comparing the SIDs in token. * * The other use is the netgroup check when using @group or &group. */ bool is_share_read_only_for_token(const char *username, const char *domain, const struct nt_user_token *token, connection_struct *conn) { int snum = SNUM(conn); bool result = conn->read_only; if (lp_readlist(snum) != NULL) { if (token_contains_name_in_list(username, domain, lp_servicename(snum), token, lp_readlist(snum))) { result = True; } } if (lp_writelist(snum) != NULL) { if (token_contains_name_in_list(username, domain, lp_servicename(snum), token, lp_writelist(snum))) { result = False; } } DEBUG(10,("is_share_read_only_for_user: share %s is %s for unix user " "%s\n", lp_servicename(snum), result ? "read-only" : "read-write", username)); return result; }