summaryrefslogtreecommitdiff
path: root/source3/libgpo/gpo_sec.c
blob: d9e3210a5c7b6cbbdb1f14b4311b0a506d12970b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
/* 
 *  Unix SMB/CIFS implementation.
 *  Group Policy Object Support
 *  Copyright (C) Guenther Deschner 2007
 *  
 *  This program is free software; you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation; either version 3 of the License, or
 *  (at your option) any later version.
 *  
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *  
 *  You should have received a copy of the GNU General Public License
 *  along with this program; if not, write to the Free Software
 *  Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 */

#include "includes.h"

	/* When modifiying security filtering with gpmc.msc (on w2k3) the
	 * following ACE is created in the DACL:

------- ACE (type: 0x05, flags: 0x02, size: 0x38, mask: 0x100, object flags: 0x1)
access SID: $SID 
access type: ALLOWED OBJECT
Permissions:
	[Apply Group Policy] (0x00000100)

------- ACE (type: 0x00, flags: 0x02, size: 0x24, mask: 0x20014)
access SID:  $SID
access type: ALLOWED
Permissions:
	[List Contents] (0x00000004)
	[Read All Properties] (0x00000010)
	[Read Permissions] (0x00020000)

	 * by default all "Authenticated Users" (S-1-5-11) have an ALLOW
	 * OBJECT ace with SEC_RIGHTS_APPLY_GROUP_POLICY mask */


/****************************************************************
****************************************************************/

static BOOL gpo_sd_check_agp_access_bits(uint32 access_mask)
{
	return (access_mask & SEC_RIGHTS_APPLY_GROUP_POLICY);
}

#if 0
/****************************************************************
****************************************************************/

static BOOL gpo_sd_check_read_access_bits(uint32 access_mask)
{
	uint32 read_bits = SEC_RIGHTS_LIST_CONTENTS |
			   SEC_RIGHTS_READ_ALL_PROP |
			   SEC_RIGHTS_READ_PERMS;

	return (read_bits == (access_mask & read_bits));
}
#endif

/****************************************************************
****************************************************************/

static BOOL gpo_sd_check_trustee_in_sid_token(const DOM_SID *trustee, 
					      const struct GPO_SID_TOKEN *token)
{
	int i;

	if (sid_equal(trustee, &token->object_sid)) {
		return True;
	}

	if (sid_equal(trustee, &token->primary_group_sid)) {
		return True;
	}

	for (i = 0; i < token->num_token_sids; i++) {
		if (sid_equal(trustee, &token->token_sids[i])) {
			return True;
		}
	}

	return False;
}

/****************************************************************
****************************************************************/

static NTSTATUS gpo_sd_check_ace_denied_object(const SEC_ACE *ace, 
					       const struct GPO_SID_TOKEN *token) 
{
	if (gpo_sd_check_agp_access_bits(ace->access_mask) &&
	    gpo_sd_check_trustee_in_sid_token(&ace->trustee, token)) {
		DEBUG(10,("gpo_sd_check_ace_denied_object: Access denied as of ace for %s\n", 
			sid_string_static(&ace->trustee)));
		return NT_STATUS_ACCESS_DENIED;
	}

	return STATUS_MORE_ENTRIES;
}

/****************************************************************
****************************************************************/

static NTSTATUS gpo_sd_check_ace_allowed_object(const SEC_ACE *ace, 
						const struct GPO_SID_TOKEN *token) 
{
	if (gpo_sd_check_agp_access_bits(ace->access_mask) && 
	    gpo_sd_check_trustee_in_sid_token(&ace->trustee, token)) {
		DEBUG(10,("gpo_sd_check_ace_allowed_object: Access granted as of ace for %s\n", 
			sid_string_static(&ace->trustee)));
		return NT_STATUS_OK;
	}

	return STATUS_MORE_ENTRIES;
}

/****************************************************************
****************************************************************/

static NTSTATUS gpo_sd_check_ace(const SEC_ACE *ace, 
				 const struct GPO_SID_TOKEN *token) 
{
	switch (ace->type) {
		case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT:
			return gpo_sd_check_ace_denied_object(ace, token);
		case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT:
			return gpo_sd_check_ace_allowed_object(ace, token);
		default:
			return STATUS_MORE_ENTRIES;
	}
}

/****************************************************************
****************************************************************/

NTSTATUS gpo_apply_security_filtering(const struct GROUP_POLICY_OBJECT *gpo, 
				      const struct GPO_SID_TOKEN *token)
{
	SEC_DESC *sd = gpo->security_descriptor;
	SEC_ACL *dacl = NULL;
	NTSTATUS status = NT_STATUS_ACCESS_DENIED;
	int i;

	if (!token) {
		return NT_STATUS_INVALID_USER_BUFFER;
	}

	if (!sd) {
		return NT_STATUS_INVALID_SECURITY_DESCR;
	}

	dacl = sd->dacl;
	if (!dacl) {
		return NT_STATUS_INVALID_SECURITY_DESCR;
	}

	/* check all aces and only return NT_STATUS_OK (== Access granted) or
	 * NT_STATUS_ACCESS_DENIED ( == Access denied) - the default is to
	 * deny access */

	for (i = 0; i < dacl->num_aces; i ++) {

		status = gpo_sd_check_ace(&dacl->aces[i], token);

		if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
			return status;
		} else if (NT_STATUS_IS_OK(status)) {
			return status;
		}

		continue;
	}

	return NT_STATUS_ACCESS_DENIED;
}