/* Unix SMB/CIFS implementation. security access checking routines Copyright (C) Andrew Tridgell 2004 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #include "librpc/gen_ndr/ndr_security.h" /* check if a sid is in the supplied token */ static BOOL sid_active_in_token(struct dom_sid *sid, struct nt_user_token *token) { int i; for (i=0;inum_sids;i++) { if (dom_sid_equal(sid, token->user_sids[i])) { return True; } } return False; } /* perform a SEC_FLAG_MAXIMUM_ALLOWED access check */ static NTSTATUS access_check_max_allowed(struct security_descriptor *sd, struct nt_user_token *token, uint32_t *access_granted) { uint32_t denied = 0, granted = 0; int i; for (i = 0;idacl->num_aces; i++) { struct security_ace *ace = &sd->dacl->aces[i]; if (!sid_active_in_token(&ace->trustee, token)) { continue; } switch (ace->type) { case SEC_ACE_TYPE_ACCESS_ALLOWED: granted |= ace->access_mask; break; case SEC_ACE_TYPE_ACCESS_DENIED: case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT: denied |= ace->access_mask; break; } } granted &= ~denied; if (granted == 0) { return NT_STATUS_ACCESS_DENIED; } *access_granted = granted; return NT_STATUS_OK; } /* the main entry point for access checking. */ NTSTATUS sec_access_check(struct security_descriptor *sd, struct nt_user_token *token, uint32_t access_desired, uint32_t *access_granted) { int i; uint32_t bits_remaining; bits_remaining = access_desired; /* the owner always gets SEC_STD_WRITE_DAC & SEC_STD_READ_CONTROL */ if (bits_remaining & (SEC_STD_WRITE_DAC | SEC_STD_READ_CONTROL)) { if (sid_active_in_token(sd->owner_sid, token)) { bits_remaining &= ~(SEC_STD_WRITE_DAC|SEC_STD_READ_CONTROL); } } #if 0 /* this is where we should check for the "system security" privilege, once we move to the full security_token and not just the nt_user_token */ if (access_desired & SEC_FLAG_SYSTEM_SECURITY) { if (privilege_in_token(SE_PRIVILEGE_SYSTEM_SECURITY, token)) { bits_remaining &= ~SEC_FLAG_SYSTEM_SECURITY; } else { return NT_STATUS_ACCESS_DENIED; } } #endif /* dacl not present allows access */ if (!(sd->type & SEC_DESC_DACL_PRESENT)) { *access_granted = access_desired; return NT_STATUS_OK; } /* empty dacl denies access */ if (sd->dacl == NULL || sd->dacl->num_aces == 0) { return NT_STATUS_ACCESS_DENIED; } /* handle the maximum allowed case separately */ if (access_desired == SEC_FLAG_MAXIMUM_ALLOWED) { return access_check_max_allowed(sd, token, access_granted); } /* check each ace in turn. */ for (i=0; bits_remaining && i < sd->dacl->num_aces; i++) { struct security_ace *ace = &sd->dacl->aces[i]; if (ace->flags & SEC_ACE_FLAG_INHERIT_ONLY) { continue; } if (!sid_active_in_token(&ace->trustee, token)) { continue; } switch (ace->type) { case SEC_ACE_TYPE_ACCESS_ALLOWED: bits_remaining &= ~ace->access_mask; break; case SEC_ACE_TYPE_ACCESS_DENIED: case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT: if (bits_remaining & ace->access_mask) { return NT_STATUS_ACCESS_DENIED; } break; } } if (bits_remaining != 0) { return NT_STATUS_ACCESS_DENIED; } *access_granted = access_desired; return NT_STATUS_OK; }