2 Unix SMB/CIFS implementation.
5 Copyright (C) Andrew Tridgell 2000
6 Copyright (C) Tim Potter 2000
7 Copyright (C) Jeremy Allison 2000
8 Copyright (C) Jelmer Vernooij 2003
9 Copyright (C) Noel Power <noel.power@suse.com> 2013
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 3 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program. If not, see <http://www.gnu.org/licenses/>.
26 #include "lib/cmdline/cmdline.h"
27 #include "rpc_client/cli_pipe.h"
28 #include "../librpc/gen_ndr/ndr_lsa.h"
29 #include "rpc_client/cli_lsarpc.h"
30 #include "../libcli/security/security.h"
31 #include "libsmb/libsmb.h"
32 #include "libsmb/clirap.h"
33 #include "passdb/machine_sid.h"
34 #include "../librpc/gen_ndr/ndr_lsa_c.h"
36 #include "lib/param/param.h"
37 #include "lib/util/util_file.h"
39 static char DIRSEP_CHAR = '\\';
41 static int inheritance = 0;
42 static const char *save_file = NULL;
43 static const char *restore_file = NULL;
47 static int query_sec_info = -1;
48 static int set_sec_info = -1;
49 static bool want_mxac;
51 static const char *domain_sid = NULL;
53 enum acl_mode {SMB_ACL_SET, SMB_ACL_DELETE, SMB_ACL_MODIFY, SMB_ACL_ADD };
54 enum chown_mode {REQUEST_NONE, REQUEST_CHOWN, REQUEST_CHGRP, REQUEST_INHERIT};
55 enum exit_values {EXIT_OK, EXIT_FAILED, EXIT_PARSE_ERROR};
57 struct cacl_callback_state {
58 struct cli_credentials *creds;
59 struct cli_state *cli;
60 struct security_descriptor *aclsd;
61 struct security_acl *acl_to_add;
64 bool acl_no_propagate;
68 static NTSTATUS cli_lsa_lookup_domain_sid(struct cli_state *cli,
71 union lsa_PolicyInformation *info = NULL;
72 struct smbXcli_tcon *orig_tcon = NULL;
73 char *orig_share = NULL;
74 struct rpc_pipe_client *rpc_pipe = NULL;
75 struct policy_handle handle;
76 NTSTATUS status, result;
77 TALLOC_CTX *frame = talloc_stackframe();
79 if (cli_state_has_tcon(cli)) {
80 cli_state_save_tcon_share(cli, &orig_tcon, &orig_share);
83 status = cli_tree_connect(cli, "IPC$", "?????", NULL);
84 if (!NT_STATUS_IS_OK(status)) {
88 status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc, &rpc_pipe);
89 if (!NT_STATUS_IS_OK(status)) {
93 status = rpccli_lsa_open_policy(rpc_pipe, frame, True,
94 GENERIC_EXECUTE_ACCESS, &handle);
95 if (!NT_STATUS_IS_OK(status)) {
99 status = dcerpc_lsa_QueryInfoPolicy2(rpc_pipe->binding_handle,
101 LSA_POLICY_INFO_DOMAIN,
104 if (any_nt_status_not_ok(status, result, &status)) {
108 *sid = *info->domain.sid;
111 TALLOC_FREE(rpc_pipe);
114 cli_state_restore_tcon_share(cli, orig_tcon, orig_share);
119 static struct dom_sid *get_domain_sid(struct cli_state *cli)
122 struct dom_sid_buf buf;
124 struct dom_sid *sid = talloc(talloc_tos(), struct dom_sid);
126 DEBUG(0, ("Out of memory\n"));
131 if (!dom_sid_parse(domain_sid, sid)) {
132 DEBUG(0,("failed to parse domain sid\n"));
136 status = cli_lsa_lookup_domain_sid(cli, sid);
138 if (!NT_STATUS_IS_OK(status)) {
139 DEBUG(0,("failed to lookup domain sid: %s\n", nt_errstr(status)));
145 DEBUG(2,("Domain SID: %s\n", dom_sid_str_buf(sid, &buf)));
149 /* add an ACE to a list of ACEs in a struct security_acl */
150 static bool add_ace_with_ctx(TALLOC_CTX *ctx, struct security_acl **the_acl,
151 const struct security_ace *ace)
154 struct security_acl *acl = *the_acl;
157 acl = make_sec_acl(ctx, 3, 0, NULL);
163 if (acl->num_aces == UINT32_MAX) {
167 acl, struct security_ace, *ace, &acl->aces, &acl->num_aces);
172 static bool add_ace(struct security_acl **the_acl, struct security_ace *ace)
174 return add_ace_with_ctx(talloc_tos(), the_acl, ace);
177 /* parse a ascii version of a security descriptor */
178 static struct security_descriptor *sec_desc_parse(TALLOC_CTX *ctx, struct cli_state *cli, char *str)
182 struct security_descriptor *ret = NULL;
184 struct dom_sid owner_sid = { .num_auths = 0 };
185 bool have_owner = false;
186 struct dom_sid group_sid = { .num_auths = 0 };
187 bool have_group = false;
188 struct security_acl *dacl=NULL;
191 while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) {
192 if (strncmp(tok,"REVISION:", 9) == 0) {
193 revision = strtol(tok+9, NULL, 16);
197 if (strncmp(tok,"OWNER:", 6) == 0) {
199 printf("Only specify owner once\n");
202 if (!StringToSid(cli, &owner_sid, tok+6)) {
203 printf("Failed to parse owner sid\n");
210 if (strncmp(tok,"GROUP:", 6) == 0) {
212 printf("Only specify group once\n");
215 if (!StringToSid(cli, &group_sid, tok+6)) {
216 printf("Failed to parse group sid\n");
223 if (strncmp(tok,"ACL:", 4) == 0) {
224 struct security_ace ace;
225 if (!parse_ace(cli, &ace, tok+4)) {
228 if(!add_ace(&dacl, &ace)) {
229 printf("Failed to add ACL %s\n", tok);
235 printf("Failed to parse token '%s' in security descriptor,\n", tok);
242 SEC_DESC_SELF_RELATIVE,
243 have_owner ? &owner_sid : NULL,
244 have_group ? &group_sid : NULL,
253 /*****************************************************
254 get fileinfo for filename
255 *******************************************************/
256 static uint16_t get_fileinfo(struct cli_state *cli, const char *filename)
258 uint16_t fnum = (uint16_t)-1;
260 struct smb_create_returns cr = {0};
262 /* The desired access below is the only one I could find that works
263 with NT4, W2KP and Samba */
265 status = cli_ntcreate(
267 filename, /* fname */
269 READ_CONTROL_ACCESS, /* CreatFlags */
270 0, /* FileAttributes */
272 FILE_SHARE_WRITE, /* ShareAccess */
273 FILE_OPEN, /* CreateDisposition */
274 0x0, /* CreateOptions */
275 0x0, /* SecurityFlags */
278 if (!NT_STATUS_IS_OK(status)) {
279 printf("Failed to open %s: %s\n", filename, nt_errstr(status));
283 cli_close(cli, fnum);
284 return cr.file_attributes;
287 /*****************************************************
288 get sec desc for filename
289 *******************************************************/
290 static struct security_descriptor *get_secdesc_with_ctx(TALLOC_CTX *ctx,
291 struct cli_state *cli,
292 const char *filename)
294 uint16_t fnum = (uint16_t)-1;
295 struct security_descriptor *sd;
298 uint32_t desired_access = 0;
300 if (query_sec_info == -1) {
301 sec_info = SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL;
303 sec_info = query_sec_info;
306 if (sec_info & (SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL)) {
307 desired_access |= SEC_STD_READ_CONTROL;
309 if (sec_info & SECINFO_SACL) {
310 desired_access |= SEC_FLAG_SYSTEM_SECURITY;
313 if (desired_access == 0) {
314 desired_access |= SEC_STD_READ_CONTROL;
317 status = cli_ntcreate(cli, filename, 0, desired_access,
318 0, FILE_SHARE_READ|FILE_SHARE_WRITE,
319 FILE_OPEN, 0x0, 0x0, &fnum, NULL);
320 if (!NT_STATUS_IS_OK(status)) {
321 printf("Failed to open %s: %s\n", filename, nt_errstr(status));
325 status = cli_query_security_descriptor(cli, fnum, sec_info,
328 cli_close(cli, fnum);
330 if (!NT_STATUS_IS_OK(status)) {
331 printf("Failed to get security descriptor: %s\n",
338 static struct security_descriptor *get_secdesc(struct cli_state *cli,
339 const char *filename)
341 return get_secdesc_with_ctx(talloc_tos(), cli, filename);
343 /*****************************************************
344 set sec desc for filename
345 *******************************************************/
346 static bool set_secdesc(struct cli_state *cli, const char *filename,
347 struct security_descriptor *sd)
349 uint16_t fnum = (uint16_t)-1;
352 uint32_t desired_access = 0;
355 if (set_sec_info == -1) {
358 if (sd->dacl || (sd->type & SEC_DESC_DACL_PRESENT)) {
359 sec_info |= SECINFO_DACL;
361 if (sd->sacl || (sd->type & SEC_DESC_SACL_PRESENT)) {
362 sec_info |= SECINFO_SACL;
365 sec_info |= SECINFO_OWNER;
368 sec_info |= SECINFO_GROUP;
371 sec_info = set_sec_info;
374 /* Make the desired_access more specific. */
375 if (sec_info & SECINFO_DACL) {
376 desired_access |= SEC_STD_WRITE_DAC;
378 if (sec_info & SECINFO_SACL) {
379 desired_access |= SEC_FLAG_SYSTEM_SECURITY;
381 if (sec_info & (SECINFO_OWNER | SECINFO_GROUP)) {
382 desired_access |= SEC_STD_WRITE_OWNER;
385 status = cli_ntcreate(cli, filename, 0,
387 0, FILE_SHARE_READ|FILE_SHARE_WRITE,
388 FILE_OPEN, 0x0, 0x0, &fnum, NULL);
389 if (!NT_STATUS_IS_OK(status)) {
390 printf("Failed to open %s: %s\n", filename, nt_errstr(status));
394 status = cli_set_security_descriptor(cli, fnum, sec_info, sd);
395 if (!NT_STATUS_IS_OK(status)) {
396 printf("ERROR: security descriptor set failed: %s\n",
401 cli_close(cli, fnum);
405 /*****************************************************
406 get maximum access for a file
407 *******************************************************/
408 static int cacl_mxac(struct cli_state *cli, const char *filename)
413 status = cli_query_mxac(cli, filename, &mxac);
414 if (!NT_STATUS_IS_OK(status)) {
415 printf("Failed to get mxac: %s\n", nt_errstr(status));
419 printf("Maximum access: 0x%x\n", mxac);
425 /*****************************************************
426 dump the acls for a file
427 *******************************************************/
428 static int cacl_dump(struct cli_state *cli, const char *filename, bool numeric)
430 struct security_descriptor *sd;
437 sd = get_secdesc(cli, filename);
443 char *str = sddl_encode(talloc_tos(), sd, get_domain_sid(cli));
450 sec_desc_print(cli, stdout, sd, numeric);
454 ret = cacl_mxac(cli, filename);
455 if (ret != EXIT_OK) {
463 /*****************************************************
464 Change the ownership or group ownership of a file. Just
465 because the NT docs say this can't be done :-). JRA.
466 *******************************************************/
468 static int owner_set(struct cli_state *cli, enum chown_mode change_mode,
469 const char *filename, const char *new_username)
472 struct security_descriptor *sd;
475 if (!StringToSid(cli, &sid, new_username))
476 return EXIT_PARSE_ERROR;
478 sd = make_sec_desc(talloc_tos(),
479 SECURITY_DESCRIPTOR_REVISION_1,
480 SEC_DESC_SELF_RELATIVE,
481 (change_mode == REQUEST_CHOWN) ? &sid : NULL,
482 (change_mode == REQUEST_CHGRP) ? &sid : NULL,
483 NULL, NULL, &sd_size);
485 if (!set_secdesc(cli, filename, sd)) {
493 /* The MSDN is contradictory over the ordering of ACE entries in an
494 ACL. However NT4 gives a "The information may have been modified
495 by a computer running Windows NT 5.0" if denied ACEs do not appear
496 before allowed ACEs. At
497 http://technet.microsoft.com/en-us/library/cc781716.aspx the
498 canonical order is specified as "Explicit Deny, Explicit Allow,
499 Inherited ACEs unchanged" */
501 static int ace_compare(struct security_ace *ace1, struct security_ace *ace2)
503 if (security_ace_equal(ace1, ace2))
506 if ((ace1->flags & SEC_ACE_FLAG_INHERITED_ACE) &&
507 !(ace2->flags & SEC_ACE_FLAG_INHERITED_ACE))
509 if (!(ace1->flags & SEC_ACE_FLAG_INHERITED_ACE) &&
510 (ace2->flags & SEC_ACE_FLAG_INHERITED_ACE))
512 if ((ace1->flags & SEC_ACE_FLAG_INHERITED_ACE) &&
513 (ace2->flags & SEC_ACE_FLAG_INHERITED_ACE))
514 return NUMERIC_CMP(ace1, ace2);
516 if (ace1->type != ace2->type) {
517 /* note the reverse order */
518 return NUMERIC_CMP(ace2->type, ace1->type);
520 if (dom_sid_compare(&ace1->trustee, &ace2->trustee))
521 return dom_sid_compare(&ace1->trustee, &ace2->trustee);
523 if (ace1->flags != ace2->flags)
524 return NUMERIC_CMP(ace1->flags, ace2->flags);
526 if (ace1->access_mask != ace2->access_mask)
527 return NUMERIC_CMP(ace1->access_mask, ace2->access_mask);
529 if (ace1->size != ace2->size)
530 return NUMERIC_CMP(ace1->size, ace2->size);
532 return memcmp(ace1, ace2, sizeof(struct security_ace));
535 static void sort_acl(struct security_acl *the_acl)
538 if (!the_acl) return;
540 TYPESAFE_QSORT(the_acl->aces, the_acl->num_aces, ace_compare);
542 for (i=1;i<the_acl->num_aces;) {
543 if (security_ace_equal(&the_acl->aces[i-1],
544 &the_acl->aces[i])) {
546 the_acl->aces, i, the_acl->num_aces);
554 /*****************************************************
555 set the ACLs on a file given a security descriptor
556 *******************************************************/
558 static int cacl_set_from_sd(struct cli_state *cli, const char *filename,
559 struct security_descriptor *sd, enum acl_mode mode,
562 struct security_descriptor *old = NULL;
565 int result = EXIT_OK;
567 if (!sd) return EXIT_PARSE_ERROR;
568 if (test_args) return EXIT_OK;
570 if (mode != SMB_ACL_SET) {
572 * Do not fetch old ACL when it will be overwritten
573 * completely with a new one.
575 old = get_secdesc(cli, filename);
582 /* the logic here is rather more complex than I would like */
585 for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
588 for (j=0;old->dacl && j<old->dacl->num_aces;j++) {
589 if (security_ace_equal(&sd->dacl->aces[i],
590 &old->dacl->aces[j])) {
592 for (k=j; k<old->dacl->num_aces-1;k++) {
593 old->dacl->aces[k] = old->dacl->aces[k+1];
595 old->dacl->num_aces--;
602 printf("ACL for ACE:");
603 print_ace(cli, stdout, &sd->dacl->aces[i],
605 printf(" not found\n");
611 for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
614 for (j=0;old->dacl && j<old->dacl->num_aces;j++) {
615 if (dom_sid_equal(&sd->dacl->aces[i].trustee,
616 &old->dacl->aces[j].trustee)) {
617 old->dacl->aces[j] = sd->dacl->aces[i];
625 SidToString(cli, str,
626 &sd->dacl->aces[i].trustee,
628 printf("ACL for SID %s not found\n", str);
633 old->owner_sid = sd->owner_sid;
637 old->group_sid = sd->group_sid;
643 for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
644 add_ace(&old->dacl, &sd->dacl->aces[i]);
653 /* Denied ACE entries must come before allowed ones */
656 /* Create new security descriptor and set it */
658 /* We used to just have "WRITE_DAC_ACCESS" without WRITE_OWNER.
659 But if we're sending an owner, even if it's the same as the one
660 that already exists then W2K3 insists we open with WRITE_OWNER access.
661 I need to check that setting a SD with no owner set works against WNT
665 sd = make_sec_desc(talloc_tos(),old->revision, old->type,
666 old->owner_sid, old->group_sid,
667 NULL, old->dacl, &sd_size);
669 if (!set_secdesc(cli, filename, sd)) {
670 result = EXIT_FAILED;
676 /*****************************************************
677 set the ACLs on a file given an ascii description
678 *******************************************************/
680 static int cacl_set(struct cli_state *cli, const char *filename,
681 char *the_acl, enum acl_mode mode, bool numeric)
683 struct security_descriptor *sd = NULL;
686 const char *msg = NULL;
687 size_t msg_offset = 0;
688 enum ace_condition_flags flags =
689 ACE_CONDITION_FLAG_ALLOW_DEVICE;
690 sd = sddl_decode_err_msg(talloc_tos(),
697 DBG_ERR("could not decode '%s'\n", the_acl);
700 (int)msg_offset, '^');
701 DBG_ERR("error '%s'\n", msg);
705 sd = sec_desc_parse(talloc_tos(), cli, the_acl);
709 return EXIT_PARSE_ERROR;
714 return cacl_set_from_sd(cli, filename, sd, mode, numeric);
717 /*****************************************************
718 set the inherit on a file
719 *******************************************************/
720 static int inherit(struct cli_state *cli, const char *filename,
723 struct security_descriptor *old,*sd;
726 int result = EXIT_OK;
728 old = get_secdesc(cli, filename);
734 oldattr = get_fileinfo(cli,filename);
736 if (strcmp(type,"allow")==0) {
737 if ((old->type & SEC_DESC_DACL_PROTECTED) ==
738 SEC_DESC_DACL_PROTECTED) {
740 char *parentname,*temp;
741 struct security_descriptor *parent;
742 temp = talloc_strdup(talloc_tos(), filename);
744 old->type=old->type & (~SEC_DESC_DACL_PROTECTED);
746 /* look at parent and copy in all its inheritable ACL's. */
747 string_replace(temp, '\\', '/');
748 if (!parent_dirname(talloc_tos(),temp,&parentname,NULL)) {
751 string_replace(parentname, '/', '\\');
752 parent = get_secdesc(cli,parentname);
753 if (parent == NULL) {
756 for (i=0;i<parent->dacl->num_aces;i++) {
757 struct security_ace *ace=&parent->dacl->aces[i];
758 /* Add inherited flag to all aces */
759 ace->flags=ace->flags|
760 SEC_ACE_FLAG_INHERITED_ACE;
761 if ((oldattr & FILE_ATTRIBUTE_DIRECTORY) == FILE_ATTRIBUTE_DIRECTORY) {
762 if ((ace->flags & SEC_ACE_FLAG_CONTAINER_INHERIT) ==
763 SEC_ACE_FLAG_CONTAINER_INHERIT) {
764 add_ace(&old->dacl, ace);
767 if ((ace->flags & SEC_ACE_FLAG_OBJECT_INHERIT) ==
768 SEC_ACE_FLAG_OBJECT_INHERIT) {
769 /* clear flags for files */
771 add_ace(&old->dacl, ace);
776 printf("Already set to inheritable permissions.\n");
779 } else if (strcmp(type,"remove")==0) {
780 if ((old->type & SEC_DESC_DACL_PROTECTED) !=
781 SEC_DESC_DACL_PROTECTED) {
782 old->type=old->type | SEC_DESC_DACL_PROTECTED;
784 /* remove all inherited ACL's. */
787 struct security_acl *temp=old->dacl;
788 old->dacl=make_sec_acl(talloc_tos(), 3, 0, NULL);
789 for (i=temp->num_aces-1;i>=0;i--) {
790 struct security_ace *ace=&temp->aces[i];
791 /* Remove all ace with INHERITED flag set */
792 if ((ace->flags & SEC_ACE_FLAG_INHERITED_ACE) !=
793 SEC_ACE_FLAG_INHERITED_ACE) {
794 add_ace(&old->dacl,ace);
799 printf("Already set to no inheritable permissions.\n");
802 } else if (strcmp(type,"copy")==0) {
803 if ((old->type & SEC_DESC_DACL_PROTECTED) !=
804 SEC_DESC_DACL_PROTECTED) {
805 old->type=old->type | SEC_DESC_DACL_PROTECTED;
808 * convert all inherited ACL's to non
813 for (i=0;i<old->dacl->num_aces;i++) {
814 struct security_ace *ace=&old->dacl->aces[i];
815 /* Remove INHERITED FLAG from all aces */
816 ace->flags=ace->flags&(~SEC_ACE_FLAG_INHERITED_ACE);
820 printf("Already set to no inheritable permissions.\n");
825 /* Denied ACE entries must come before allowed ones */
828 sd = make_sec_desc(talloc_tos(),old->revision, old->type,
829 old->owner_sid, old->group_sid,
830 NULL, old->dacl, &sd_size);
832 if (!set_secdesc(cli, filename, sd)) {
833 result = EXIT_FAILED;
839 /*****************************************************
840 Return a connection to a server.
841 *******************************************************/
842 static struct cli_state *connect_one(struct cli_credentials *creds,
843 const char *server, const char *share)
845 struct cli_state *c = NULL;
849 nt_status = cli_full_connection_creds(&c, lp_netbios_name(), server,
854 if (!NT_STATUS_IS_OK(nt_status)) {
855 DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status)));
863 * Process resulting combination of mask & fname ensuring
864 * terminated with wildcard
866 static char *build_dirname(TALLOC_CTX *ctx,
867 const char *mask, char *dir, char *fname)
872 mask2 = talloc_strdup(ctx, mask);
876 p = strrchr_m(mask2, DIRSEP_CHAR);
882 mask2 = talloc_asprintf_append(mask2,
889 * Returns a copy of the ACL flags in ace modified according
890 * to some inheritance rules.
891 * a) SEC_ACE_FLAG_INHERITED_ACE is propagated to children
892 * b) SEC_ACE_FLAG_INHERIT_ONLY is set on container children for OI (only)
893 * c) SEC_ACE_FLAG_OBJECT_INHERIT & SEC_ACE_FLAG_CONTAINER_INHERIT are
894 * stripped from flags to be propagated to non-container children
895 * d) SEC_ACE_FLAG_OBJECT_INHERIT & SEC_ACE_FLAG_CONTAINER_INHERIT are
896 * stripped from flags to be propagated if the NP flag
897 * SEC_ACE_FLAG_NO_PROPAGATE_INHERIT is present
900 static uint8_t get_flags_to_propagate(bool is_container,
901 struct security_ace *ace)
903 uint8_t newflags = ace->flags;
904 /* OBJECT inheritance */
905 bool acl_objinherit = (ace->flags &
906 SEC_ACE_FLAG_OBJECT_INHERIT) == SEC_ACE_FLAG_OBJECT_INHERIT;
907 /* CONTAINER inheritance */
908 bool acl_cntrinherit = (ace->flags &
909 SEC_ACE_FLAG_CONTAINER_INHERIT) ==
910 SEC_ACE_FLAG_CONTAINER_INHERIT;
911 /* PROHIBIT inheritance */
912 bool prohibit_inheritance = ((ace->flags &
913 SEC_ACE_FLAG_NO_PROPAGATE_INHERIT) ==
914 SEC_ACE_FLAG_NO_PROPAGATE_INHERIT);
916 /* Assume we are not propagating the ACE */
918 newflags &= ~SEC_ACE_FLAG_INHERITED_ACE;
919 /* all children need to have the SEC_ACE_FLAG_INHERITED_ACE set */
920 if (acl_cntrinherit || acl_objinherit) {
922 * object inherit ( alone ) on a container needs
923 * SEC_ACE_FLAG_INHERIT_ONLY
926 if (acl_objinherit && !acl_cntrinherit) {
927 newflags |= SEC_ACE_FLAG_INHERIT_ONLY;
930 * this is tricky, the only time we would not
931 * propagate the ace for a container is if
932 * prohibit_inheritance is set and object inheritance
935 if ((prohibit_inheritance
937 && !acl_cntrinherit) == false) {
938 newflags |= SEC_ACE_FLAG_INHERITED_ACE;
942 * don't apply object/container inheritance flags to
945 newflags &= ~(SEC_ACE_FLAG_OBJECT_INHERIT
946 | SEC_ACE_FLAG_CONTAINER_INHERIT
947 | SEC_ACE_FLAG_INHERIT_ONLY);
949 * only apply ace to file if object inherit
951 if (acl_objinherit) {
952 newflags |= SEC_ACE_FLAG_INHERITED_ACE;
956 /* if NP is specified strip NP and all OI/CI INHERIT flags */
957 if (prohibit_inheritance) {
958 newflags &= ~(SEC_ACE_FLAG_OBJECT_INHERIT
959 | SEC_ACE_FLAG_CONTAINER_INHERIT
960 | SEC_ACE_FLAG_INHERIT_ONLY
961 | SEC_ACE_FLAG_NO_PROPAGATE_INHERIT);
968 * This function builds a new acl for 'caclfile', first it removes any
969 * existing inheritable ace(s) from the current acl of caclfile, secondly it
970 * applies any inheritable acls of the parent of caclfile ( inheritable acls of
971 * caclfile's parent are passed via acl_to_add member of cbstate )
974 static NTSTATUS propagate_inherited_aces(char *caclfile,
975 struct cacl_callback_state *cbstate)
977 TALLOC_CTX *aclctx = NULL;
981 struct security_descriptor *old = NULL;
982 bool is_container = false;
983 struct security_acl *acl_to_add = cbstate->acl_to_add;
984 struct security_acl *acl_to_remove = NULL;
987 aclctx = talloc_new(NULL);
988 if (aclctx == NULL) {
989 return NT_STATUS_NO_MEMORY;
991 old = get_secdesc_with_ctx(aclctx, cbstate->cli, caclfile);
994 status = NT_STATUS_UNSUCCESSFUL;
998 /* inhibit propagation? */
999 if ((old->type & SEC_DESC_DACL_PROTECTED) ==
1000 SEC_DESC_DACL_PROTECTED){
1001 status = NT_STATUS_OK;
1005 fileattr = get_fileinfo(cbstate->cli, caclfile);
1006 is_container = (fileattr & FILE_ATTRIBUTE_DIRECTORY);
1008 /* find acl(s) that are inherited */
1009 for (j = 0; old->dacl && j < old->dacl->num_aces; j++) {
1011 if (old->dacl->aces[j].flags & SEC_ACE_FLAG_INHERITED_ACE) {
1012 if (!add_ace_with_ctx(aclctx, &acl_to_remove,
1013 &old->dacl->aces[j])) {
1014 status = NT_STATUS_NO_MEMORY;
1020 /* remove any acl(s) that are inherited */
1021 if (acl_to_remove) {
1022 for (i = 0; i < acl_to_remove->num_aces; i++) {
1023 struct security_ace ace = acl_to_remove->aces[i];
1024 for (j = 0; old->dacl && j < old->dacl->num_aces; j++) {
1026 if (security_ace_equal(&ace,
1027 &old->dacl->aces[j])) {
1029 for (k = j; k < old->dacl->num_aces-1;
1031 old->dacl->aces[k] =
1032 old->dacl->aces[k+1];
1034 old->dacl->num_aces--;
1040 /* propagate any inheritable ace to be added */
1042 for (i = 0; i < acl_to_add->num_aces; i++) {
1043 struct security_ace ace = acl_to_add->aces[i];
1044 bool is_objectinherit = (ace.flags &
1045 SEC_ACE_FLAG_OBJECT_INHERIT) ==
1046 SEC_ACE_FLAG_OBJECT_INHERIT;
1048 /* don't propagate flags to a file unless OI */
1049 if (!is_objectinherit && !is_container) {
1053 * adjust flags according to inheritance
1056 ace.flags = get_flags_to_propagate(is_container, &ace);
1057 is_inherited = (ace.flags &
1058 SEC_ACE_FLAG_INHERITED_ACE) ==
1059 SEC_ACE_FLAG_INHERITED_ACE;
1060 /* don't propagate non inherited flags */
1061 if (!is_inherited) {
1064 if (!add_ace_with_ctx(aclctx, &old->dacl, &ace)) {
1065 status = NT_STATUS_NO_MEMORY;
1071 result = cacl_set_from_sd(cbstate->cli, caclfile,
1073 SMB_ACL_SET, cbstate->numeric);
1074 if (result != EXIT_OK) {
1075 status = NT_STATUS_UNSUCCESSFUL;
1079 status = NT_STATUS_OK;
1081 TALLOC_FREE(aclctx);
1086 * Returns true if 'ace' contains SEC_ACE_FLAG_OBJECT_INHERIT or
1087 * SEC_ACE_FLAG_CONTAINER_INHERIT
1089 static bool is_inheritable_ace(struct security_ace *ace)
1091 uint8_t flags = ace->flags;
1092 if (flags & (SEC_ACE_FLAG_OBJECT_INHERIT
1093 | SEC_ACE_FLAG_CONTAINER_INHERIT)) {
1099 /* This method does some basic sanity checking with respect to automatic
1100 * inheritance. e.g. it checks if it is possible to do a set, it detects illegal
1101 * attempts to set inherited permissions directly. Additionally this method
1102 * does some basic initialisation for instance it parses the ACL passed on the
1105 static NTSTATUS prepare_inheritance_propagation(TALLOC_CTX *ctx, char *filename,
1106 struct cacl_callback_state *cbstate)
1109 char *the_acl = cbstate->the_acl;
1110 struct cli_state *cli = cbstate->cli;
1111 enum acl_mode mode = cbstate->mode;
1112 struct security_descriptor *sd = NULL;
1113 struct security_descriptor *old = NULL;
1115 bool propagate = false;
1117 old = get_secdesc_with_ctx(ctx, cli, filename);
1119 return NT_STATUS_NO_MEMORY;
1122 /* parse acl passed on the command line */
1124 const char *msg = NULL;
1125 size_t msg_offset = 0;
1126 enum ace_condition_flags flags =
1127 ACE_CONDITION_FLAG_ALLOW_DEVICE;
1129 cbstate->aclsd = sddl_decode_err_msg(ctx,
1131 get_domain_sid(cli),
1135 if (cbstate->aclsd == NULL) {
1136 DBG_ERR("could not decode '%s'\n", the_acl);
1139 (int)msg_offset, '^');
1140 DBG_ERR("error '%s'\n", msg);
1144 cbstate->aclsd = sec_desc_parse(ctx, cli, the_acl);
1147 if (!cbstate->aclsd) {
1148 result = NT_STATUS_UNSUCCESSFUL;
1152 sd = cbstate->aclsd;
1154 /* set operation if inheritance is enabled doesn't make sense */
1155 if (mode == SMB_ACL_SET && ((old->type & SEC_DESC_DACL_PROTECTED) !=
1156 SEC_DESC_DACL_PROTECTED)){
1157 d_printf("Inheritance enabled at %s, can't apply set operation\n",filename);
1158 result = NT_STATUS_UNSUCCESSFUL;
1164 * search command line acl for any illegal SEC_ACE_FLAG_INHERITED_ACE
1165 * flags that are set
1167 for (j = 0; sd->dacl && j < sd->dacl->num_aces; j++) {
1168 struct security_ace *ace = &sd->dacl->aces[j];
1169 if (ace->flags & SEC_ACE_FLAG_INHERITED_ACE) {
1170 d_printf("Illegal parameter %s\n", the_acl);
1171 result = NT_STATUS_UNSUCCESSFUL;
1175 if (is_inheritable_ace(ace)) {
1181 result = NT_STATUS_OK;
1183 cbstate->acl_no_propagate = !propagate;
1188 * This method builds inheritable ace(s) from filename (which should be
1189 * a container) that need propagating to children in order to provide
1190 * automatic inheritance. Those inheritable ace(s) are stored in
1191 * acl_to_add member of cbstate for later processing
1192 * (see propagate_inherited_aces)
1194 static NTSTATUS get_inheritable_aces(TALLOC_CTX *ctx, char *filename,
1195 struct cacl_callback_state *cbstate)
1198 struct cli_state *cli = NULL;
1199 struct security_descriptor *sd = NULL;
1200 struct security_acl *acl_to_add = NULL;
1204 sd = get_secdesc_with_ctx(ctx, cli, filename);
1207 return NT_STATUS_NO_MEMORY;
1211 * Check if any inheritance related flags are used, if not then
1212 * nothing to do. At the same time populate acls for inheritance
1213 * related ace(s) that need to be added to or deleted from children as
1214 * a result of inheritance propagation.
1217 for (j = 0; sd->dacl && j < sd->dacl->num_aces; j++) {
1218 struct security_ace *ace = &sd->dacl->aces[j];
1219 if (is_inheritable_ace(ace)) {
1220 bool added = add_ace_with_ctx(ctx, &acl_to_add, ace);
1222 result = NT_STATUS_NO_MEMORY;
1227 cbstate->acl_to_add = acl_to_add;
1228 result = NT_STATUS_OK;
1234 * Callback handler to handle child elements processed by cli_list, we attempt
1235 * to propagate inheritable ace(s) to each child via the function
1236 * propagate_inherited_aces. Children that are themselves directories are passed
1237 * to cli_list again ( to descend the directory structure )
1239 static NTSTATUS cacl_set_cb(struct file_info *f,
1240 const char *mask, void *state)
1242 struct cacl_callback_state *cbstate =
1243 (struct cacl_callback_state *)state;
1244 struct cli_state *cli = NULL;
1245 struct cli_credentials *creds = NULL;
1247 TALLOC_CTX *dirctx = NULL;
1249 struct cli_state *targetcli = NULL;
1252 char *dir_end = NULL;
1254 char *targetpath = NULL;
1255 char *caclfile = NULL;
1257 dirctx = talloc_new(NULL);
1259 status = NT_STATUS_NO_MEMORY;
1264 creds = cbstate->creds;
1266 /* Work out the directory. */
1267 dir = talloc_strdup(dirctx, mask);
1269 status = NT_STATUS_NO_MEMORY;
1273 dir_end = strrchr(dir, DIRSEP_CHAR);
1274 if (dir_end != NULL) {
1278 if (!f->name || !f->name[0]) {
1279 d_printf("Empty dir name returned. Possible server misconfiguration.\n");
1280 status = NT_STATUS_UNSUCCESSFUL;
1284 if (f->attr & FILE_ATTRIBUTE_DIRECTORY) {
1285 struct cacl_callback_state dir_cbstate;
1286 uint16_t attribute = FILE_ATTRIBUTE_DIRECTORY
1287 | FILE_ATTRIBUTE_SYSTEM
1288 | FILE_ATTRIBUTE_HIDDEN;
1291 /* ignore special '.' & '..' */
1292 if ((f->name == NULL) || ISDOT(f->name) || ISDOTDOT(f->name)) {
1293 status = NT_STATUS_OK;
1297 mask2 = build_dirname(dirctx, mask, dir, f->name);
1298 if (mask2 == NULL) {
1299 status = NT_STATUS_NO_MEMORY;
1304 status = cli_resolve_path(dirctx, "", creds, cli,
1305 mask2, &targetcli, &targetpath);
1306 if (!NT_STATUS_IS_OK(status)) {
1311 * prepare path to caclfile, remove any existing wildcard
1312 * chars and convert path separators.
1315 caclfile = talloc_strdup(dirctx, targetpath);
1317 status = NT_STATUS_NO_MEMORY;
1320 dir_end = strrchr(caclfile, '*');
1321 if (dir_end != NULL) {
1325 string_replace(caclfile, '/', '\\');
1327 * make directory specific copy of cbstate here
1328 * (for this directory level) to be available as
1329 * the parent cbstate for the children of this directory.
1330 * Note: cbstate is overwritten for the current file being
1333 dir_cbstate = *cbstate;
1334 dir_cbstate.cli = targetcli;
1337 * propagate any inherited ace from our parent
1339 status = propagate_inherited_aces(caclfile, &dir_cbstate);
1340 if (!NT_STATUS_IS_OK(status)) {
1345 * get inheritable ace(s) for this dir/container
1346 * that will be propagated to its children
1348 status = get_inheritable_aces(dirctx, caclfile,
1350 if (!NT_STATUS_IS_OK(status)) {
1355 * ensure cacl_set_cb gets called for children
1356 * of this directory (targetpath)
1358 status = cli_list(targetcli, targetpath,
1359 attribute, cacl_set_cb,
1360 (void *)&dir_cbstate);
1362 if (!NT_STATUS_IS_OK(status)) {
1368 * build full path to caclfile and replace '/' with '\' so
1369 * other utility functions can deal with it
1372 targetpath = talloc_asprintf(dirctx, "%s/%s", dir, f->name);
1374 status = NT_STATUS_NO_MEMORY;
1377 string_replace(targetpath, '/', '\\');
1379 /* attempt to propagate any inherited ace to file caclfile */
1380 status = propagate_inherited_aces(targetpath, cbstate);
1382 if (!NT_STATUS_IS_OK(status)) {
1386 status = NT_STATUS_OK;
1388 if (!NT_STATUS_IS_OK(status)) {
1389 d_printf("error %s: processing %s\n",
1393 TALLOC_FREE(dirctx);
1399 * Wrapper around cl_list to descend the directory tree pointed to by 'filename',
1400 * helper callback function 'cacl_set_cb' handles the child elements processed
1403 static int inheritance_cacl_set(char *filename,
1404 struct cacl_callback_state *cbstate)
1410 struct cli_state *cli = cbstate->cli;
1411 TALLOC_CTX *ctx = NULL;
1412 bool isdirectory = false;
1413 uint16_t attribute = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_SYSTEM
1414 | FILE_ATTRIBUTE_HIDDEN;
1415 ctx = talloc_init("inherit_set");
1417 d_printf("out of memory\n");
1418 result = EXIT_FAILED;
1422 /* ensure we have a filename that starts with '\' */
1423 if (!filename || *filename != DIRSEP_CHAR) {
1424 /* illegal or no filename */
1425 result = EXIT_FAILED;
1426 d_printf("illegal or missing name '%s'\n", filename);
1431 fileattr = get_fileinfo(cli, filename);
1432 isdirectory = (fileattr & FILE_ATTRIBUTE_DIRECTORY)
1433 == FILE_ATTRIBUTE_DIRECTORY;
1436 * if we've got as far as here then we have already evaluated
1445 /* make sure we have a trailing '\*' for directory */
1447 mask = talloc_strdup(ctx, filename);
1448 } else if (strlen(filename) > 1) {
1450 * if the passed file name doesn't have a trailing '\'
1453 char *name_end = strrchr(filename, DIRSEP_CHAR);
1454 if (name_end != filename + strlen(filename) + 1) {
1455 mask = talloc_asprintf(ctx, "%s\\*", filename);
1457 mask = talloc_strdup(ctx, filename);
1460 /* filename is a single '\', just append '*' */
1461 mask = talloc_asprintf_append(mask, "%s*", filename);
1465 result = EXIT_FAILED;
1470 * prepare for automatic propagation of the acl passed on the
1474 ntstatus = prepare_inheritance_propagation(ctx, filename,
1476 if (!NT_STATUS_IS_OK(ntstatus)) {
1477 d_printf("error: %s processing %s\n",
1478 nt_errstr(ntstatus), filename);
1479 result = EXIT_FAILED;
1483 result = cacl_set_from_sd(cli, filename, cbstate->aclsd,
1484 cbstate->mode, cbstate->numeric);
1487 * strictly speaking it could be considered an error if a file was
1488 * specified with '--propagate-inheritance'. However we really want
1489 * to eventually get rid of '--propagate-inheritance' so we will be
1490 * more forgiving here and instead just exit early.
1492 if (!isdirectory || (result != EXIT_OK)) {
1496 /* check if there is actually any need to propagate */
1497 if (cbstate->acl_no_propagate) {
1500 /* get inheritable attributes this parent container (e.g. filename) */
1501 ntstatus = get_inheritable_aces(ctx, filename, cbstate);
1502 if (NT_STATUS_IS_OK(ntstatus)) {
1503 /* process children */
1504 ntstatus = cli_list(cli, mask, attribute,
1509 if (!NT_STATUS_IS_OK(ntstatus)) {
1510 d_printf("error: %s processing %s\n",
1511 nt_errstr(ntstatus), filename);
1512 result = EXIT_FAILED;
1522 struct diritem *prev, *next;
1524 * dirname and targetpath below are sanitized,
1526 * + start and end with '\'
1527 * + have no trailing '*'
1528 * + all '/' have been converted to '\'
1532 struct cli_state *targetcli;
1535 struct save_restore_stats
1541 struct dump_context {
1542 struct diritem *list;
1543 struct cli_credentials *creds;
1544 struct cli_state *cli;
1545 struct save_restore_stats *stats;
1547 struct diritem *dir;
1551 static int write_dacl(struct dump_context *ctx,
1552 struct cli_state *cli,
1553 const char *filename,
1554 const char *origfname)
1556 struct security_descriptor *sd = NULL;
1558 const char *output_fmt = "%s\r\n%s\r\n";
1559 const char *tmp = NULL;
1560 char *out_str = NULL;
1561 uint8_t *dest = NULL;
1566 TALLOC_CTX *frame = talloc_stackframe();
1572 if (ctx->save_fd < 0) {
1573 DBG_ERR("error processing %s no file descriptor\n", filename);
1574 result = EXIT_FAILED;
1578 sd = get_secdesc(cli, filename);
1580 result = EXIT_FAILED;
1584 sd->owner_sid = NULL;
1585 sd->group_sid = NULL;
1587 str = sddl_encode(frame, sd, get_domain_sid(cli));
1589 DBG_ERR("error processing %s couldn't encode DACL\n", filename);
1590 result = EXIT_FAILED;
1594 * format of icacls save file is
1595 * a line containing the path of the file/dir
1596 * followed by a line containing the sddl format
1598 * The format of the strings are null terminated
1599 * 16-bit Unicode. Each line is terminated by "\r\n"
1603 /* skip leading '\' */
1604 if (tmp[0] == '\\') {
1607 out_str = talloc_asprintf(frame, output_fmt, tmp, str);
1609 if (out_str == NULL) {
1610 result = EXIT_FAILED;
1614 s_len = strlen(out_str);
1616 ok = convert_string_talloc(out_str,
1620 s_len, (void **)(void *)&dest, &d_len);
1622 DBG_ERR("error processing %s out of memory\n", tmp);
1623 result = EXIT_FAILED;
1627 if (write(ctx->save_fd, dest, d_len) != d_len) {
1628 DBG_ERR("error processing %s failed to write to file.\n", tmp);
1629 result = EXIT_FAILED;
1632 fsync(ctx->save_fd);
1635 ctx->stats->success += 1;
1636 fprintf(stdout, "Successfully processed file: %s\n", tmp);
1639 if (result != EXIT_OK) {
1640 ctx->stats->failure += 1;
1646 * Sanitize directory name.
1647 * Given a directory name 'dir' ensure it;
1650 * o doesn't end with trailing '*'
1651 * o ensure all '/' are converted to '\'
1654 static char *sanitize_dirname(TALLOC_CTX *ctx,
1658 char *name_end = NULL;
1660 mask = talloc_strdup(ctx, dir);
1661 name_end = strrchr(mask, '*');
1666 name_end = strrchr(mask, DIRSEP_CHAR);
1668 if (strlen(mask) > 0 && name_end != mask + (strlen(mask) - 1)) {
1669 mask = talloc_asprintf(ctx, "%s\\", mask);
1672 string_replace(mask, '/', '\\');
1677 * Process each entry (child) of a directory.
1678 * Each entry, regardless of whether it is itself a file or directory
1679 * has it's dacl written to the restore/save file.
1680 * Each directory is saved to context->list (for further processing)
1681 * write_dacl will update the stats (success/fail)
1683 static NTSTATUS cacl_dump_dacl_cb(struct file_info *f,
1684 const char *mask, void *state)
1686 struct dump_context *ctx = talloc_get_type_abort(state,
1687 struct dump_context);
1692 char *targetpath = NULL;
1693 char *unresolved = NULL;
1696 * if we have already encountered an error
1699 if (!NT_STATUS_IS_OK(ctx->status)) {
1703 if (!f->name || !f->name[0]) {
1704 DBG_ERR("Empty dir name returned. Possible server "
1705 "misconfiguration.\n");
1706 status = NT_STATUS_UNSUCCESSFUL;
1710 mask2 = sanitize_dirname(ctx, mask);
1712 status = NT_STATUS_NO_MEMORY;
1715 if (f->attr & FILE_ATTRIBUTE_DIRECTORY) {
1716 struct diritem *item = NULL;
1718 /* ignore special '.' & '..' */
1719 if ((f->name == NULL) || ISDOT(f->name) || ISDOTDOT(f->name)) {
1720 status = NT_STATUS_OK;
1724 /* Work out the directory. */
1725 unresolved = sanitize_dirname(ctx, ctx->dir->dirname);
1727 status = NT_STATUS_NO_MEMORY;
1731 unresolved = talloc_asprintf(ctx, "%s%s", unresolved, f->name);
1733 if (unresolved == NULL) {
1734 status = NT_STATUS_NO_MEMORY;
1738 item = talloc_zero(ctx, struct diritem);
1740 status = NT_STATUS_NO_MEMORY;
1744 item->dirname = unresolved;
1746 mask2 = talloc_asprintf(ctx, "%s%s", mask2, f->name);
1748 status = NT_STATUS_NO_MEMORY;
1752 status = cli_resolve_path(ctx, "", ctx->creds, ctx->cli,
1753 mask2, &item->targetcli, &targetpath);
1755 if (!NT_STATUS_IS_OK(status)) {
1756 DBG_ERR("error failed to resolve: %s\n",
1761 item->targetpath = sanitize_dirname(ctx, targetpath);
1762 if (!item->targetpath) {
1763 status = NT_STATUS_NO_MEMORY;
1769 item->targetpath, unresolved) != EXIT_OK) {
1770 status = NT_STATUS_UNSUCCESSFUL;
1772 * cli_list happily ignores error encountered
1773 * when processing the callback so we need
1774 * to save any error status encountered while
1775 * processing directories (so we can stop recursing
1776 * those as soon as possible).
1777 * Changing the current behaviour of the callback
1778 * handling by cli_list would be I think be too
1781 ctx->status = status;
1785 DLIST_ADD_END(ctx->list, item);
1788 unresolved = sanitize_dirname(ctx, ctx->dir->dirname);
1790 status = NT_STATUS_NO_MEMORY;
1794 unresolved = talloc_asprintf(ctx, "%s%s", unresolved, f->name);
1797 status = NT_STATUS_NO_MEMORY;
1801 * build full path to the file and replace '/' with '\' so
1802 * other utility functions can deal with it
1805 targetpath = talloc_asprintf(ctx, "%s%s", mask2, f->name);
1808 status = NT_STATUS_NO_MEMORY;
1813 ctx->dir->targetcli,
1814 targetpath, unresolved) != EXIT_OK) {
1815 status = NT_STATUS_UNSUCCESSFUL;
1817 * cli_list happily ignores error encountered
1818 * when processing the callback so we need
1819 * to save any error status encountered while
1820 * processing directories (so we can stop recursing
1821 * those as soon as possible).
1822 * Changing the current behaviour of the callback
1823 * handling by cli_list would be I think be too
1826 ctx->status = status;
1830 status = NT_STATUS_OK;
1832 if (!NT_STATUS_IS_OK(status)) {
1833 DBG_ERR("error %s: processing %s\n",
1834 nt_errstr(status), targetpath);
1840 * dump_ctx contains a list of directories to be processed
1841 * + each directory 'dir' is scanned by cli_list, the cli_list
1842 * callback 'cacl_dump_dacl_cb' writes out the dacl of each
1843 * child of 'dir' (regardless of whether it is a dir or file)
1844 * to the restore/save file. Additionally any directories encountered
1845 * are returned in the passed in dump_ctx->list member
1846 * + the directory list returned from cli_list is passed and processed
1847 * by recursively calling dump_dacl_dirtree
1850 static int dump_dacl_dirtree(struct dump_context *dump_ctx)
1852 struct diritem *item = NULL;
1853 struct dump_context *new_dump_ctx = NULL;
1855 for (item = dump_ctx->list; item; item = item->next) {
1856 uint16_t attribute = FILE_ATTRIBUTE_DIRECTORY
1857 | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN;
1861 new_dump_ctx = talloc_zero(dump_ctx, struct dump_context);
1863 if (new_dump_ctx == NULL) {
1864 DBG_ERR("out of memory\n");
1865 result = EXIT_FAILED;
1869 if (item->targetcli == NULL) {
1870 status = cli_resolve_path(new_dump_ctx,
1877 if (!NT_STATUS_IS_OK(status)) {
1878 DBG_ERR("failed to resolve path %s "
1880 item->dirname, nt_errstr(status));
1881 result = EXIT_FAILED;
1885 new_dump_ctx->creds = dump_ctx->creds;
1886 new_dump_ctx->save_fd = dump_ctx->save_fd;
1887 new_dump_ctx->stats = dump_ctx->stats;
1888 new_dump_ctx->dir = item;
1889 new_dump_ctx->cli = item->targetcli;
1891 mask = talloc_asprintf(new_dump_ctx, "%s*",
1892 new_dump_ctx->dir->targetpath);
1893 status = cli_list(new_dump_ctx->dir->targetcli,
1895 attribute, cacl_dump_dacl_cb, new_dump_ctx);
1897 if (!NT_STATUS_IS_OK(status) ||
1898 !NT_STATUS_IS_OK(new_dump_ctx->status)) {
1900 if (!NT_STATUS_IS_OK(status)) {
1902 * cli_list failed for some reason
1903 * so we need to update the failure stat
1905 new_dump_ctx->stats->failure += 1;
1908 /* cacl_dump_dacl_cb should have updated stat */
1909 tmpstatus = new_dump_ctx->status;
1911 DBG_ERR("error %s: processing %s\n",
1912 nt_errstr(tmpstatus), item->dirname);
1913 result = EXIT_FAILED;
1916 result = dump_dacl_dirtree(new_dump_ctx);
1917 if (result != EXIT_OK) {
1924 TALLOC_FREE(new_dump_ctx);
1928 static int cacl_dump_dacl(struct cli_state *cli,
1929 struct cli_credentials *creds,
1934 TALLOC_CTX *ctx = NULL;
1935 bool isdirectory = false;
1937 struct dump_context *dump_ctx = NULL;
1938 struct save_restore_stats stats = {0};
1939 struct diritem *item = NULL;
1940 struct cli_state *targetcli = NULL;
1941 char *targetpath = NULL;
1944 ctx = talloc_init("cacl_dump");
1946 DBG_ERR("out of memory\n");
1947 result = EXIT_FAILED;
1951 dump_ctx = talloc_zero(ctx, struct dump_context);
1952 if (dump_ctx == NULL) {
1953 DBG_ERR("out of memory\n");
1954 result = EXIT_FAILED;
1958 dump_ctx->save_fd = open(save_file,
1959 O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR);
1961 if (dump_ctx->save_fd < 0) {
1962 result = EXIT_FAILED;
1966 dump_ctx->creds = creds;
1967 dump_ctx->cli = cli;
1968 dump_ctx->stats = &stats;
1970 /* ensure we have a filename that starts with '\' */
1971 if (!filename || *filename != DIRSEP_CHAR) {
1972 /* illegal or no filename */
1973 result = EXIT_FAILED;
1974 DBG_ERR("illegal or missing name '%s'\n", filename);
1978 status = cli_resolve_path(dump_ctx, "",
1981 filename, &targetcli, &targetpath);
1982 if (!NT_STATUS_IS_OK(status)) {
1983 DBG_ERR("failed resolve %s\n", filename);
1984 result = EXIT_FAILED;
1988 fileattr = get_fileinfo(targetcli, targetpath);
1989 isdirectory = (fileattr & FILE_ATTRIBUTE_DIRECTORY)
1990 == FILE_ATTRIBUTE_DIRECTORY;
1993 * if we've got as far as here then we have already evaluated
2002 /* make sure we have a trailing '\*' for directory */
2004 mask = talloc_strdup(ctx, filename);
2005 } else if (strlen(filename) > 1) {
2006 mask = sanitize_dirname(ctx, filename);
2008 /* filename is a single '\' */
2009 mask = talloc_strdup(ctx, filename);
2012 result = EXIT_FAILED;
2016 write_dacl(dump_ctx, targetcli, targetpath, filename);
2017 if (isdirectory && recurse) {
2018 item = talloc_zero(dump_ctx, struct diritem);
2020 result = EXIT_FAILED;
2023 item->dirname = mask;
2024 DLIST_ADD_END(dump_ctx->list, item);
2025 dump_dacl_dirtree(dump_ctx);
2028 fprintf(stdout, "Successfully processed %d files: "
2029 "Failed processing %d files\n",
2030 dump_ctx->stats->success, dump_ctx->stats->failure);
2033 if (dump_ctx && dump_ctx->save_fd > 0) {
2034 close(dump_ctx->save_fd);
2040 struct restore_dacl {
2042 struct security_descriptor *sd;
2046 * Restore dacls from 'savefile' produced by
2047 * 'icacls name /save' or 'smbcacls --save'
2049 static int cacl_restore(struct cli_state *cli,
2050 struct cli_credentials *creds,
2051 bool numeric, const char *restorefile)
2055 struct save_restore_stats stats = { 0 };
2057 char **lines = NULL;
2058 char *content = NULL;
2059 char *convert_content = NULL;
2060 size_t content_size;
2061 struct restore_dacl *entries = NULL;
2062 int numlines, i = 0;
2064 struct dom_sid *sid = NULL;
2066 if (restorefile == NULL) {
2067 DBG_ERR("No restore file specified\n");
2068 result = EXIT_FAILED;
2077 restore_fd = open(restorefile, O_RDONLY, S_IRUSR | S_IWUSR);
2078 if (restore_fd < 0) {
2079 DBG_ERR("Failed to open %s.\n", restorefile);
2080 result = EXIT_FAILED;
2084 content = fd_load(restore_fd, &content_size, 0, talloc_tos());
2088 if (content == NULL) {
2089 DBG_ERR("Failed to load content from %s.\n", restorefile);
2090 result = EXIT_FAILED;
2094 ok = convert_string_talloc(talloc_tos(),
2098 utf16_len_n(content, content_size),
2099 (void **)(void *)&convert_content,
2102 TALLOC_FREE(content);
2105 DBG_ERR("Failed to convert content from %s "
2106 "to CH_UNIX.\n", restorefile);
2107 result = EXIT_FAILED;
2111 lines = file_lines_parse(convert_content,
2112 content_size, &numlines, talloc_tos());
2114 if (lines == NULL) {
2115 DBG_ERR("Failed to parse lines from content of %s.",
2117 result = EXIT_FAILED;
2121 entries = talloc_zero_array(lines, struct restore_dacl, numlines / 2);
2123 if (entries == NULL) {
2124 DBG_ERR("error processing %s, out of memory\n", restorefile);
2125 result = EXIT_FAILED;
2129 sid = get_domain_sid(cli);
2131 while (i < numlines) {
2133 int first_line = (i % 2) == 0;
2138 /* line can be blank if root of share */
2139 if (strlen(tmp) == 0) {
2140 entries[index].path = talloc_strdup(lines,
2143 entries[index].path = lines[i];
2146 const char *msg = NULL;
2147 size_t msg_offset = 0;
2148 enum ace_condition_flags flags =
2149 ACE_CONDITION_FLAG_ALLOW_DEVICE;
2150 entries[index].sd = sddl_decode_err_msg(lines,
2156 if(entries[index].sd == NULL) {
2157 DBG_ERR("could not decode '%s'\n", lines[i]);
2160 (int)msg_offset, '^');
2161 DBG_ERR("error '%s'\n", msg);
2163 result = EXIT_FAILED;
2166 entries[index].sd->type |=
2167 SEC_DESC_DACL_AUTO_INHERIT_REQ;
2168 entries[index].sd->type |= SEC_DESC_SACL_AUTO_INHERITED;
2172 for (i = 0; i < (numlines / 2); i++) {
2173 int mode = SMB_ACL_SET;
2175 struct cli_state *targetcli = NULL;
2176 char *targetpath = NULL;
2180 status = cli_resolve_path(talloc_tos(),
2185 &targetcli, &targetpath);
2187 if (!NT_STATUS_IS_OK(status)) {
2188 printf("Error failed to process file: %s\n",
2194 set_result = cacl_set_from_sd(targetcli,
2196 entries[i].sd, mode, numeric);
2198 if (set_result == EXIT_OK) {
2199 printf("Successfully processed file: %s\n",
2203 printf("Error failed to process file: %s\n",
2212 fprintf(stdout, "Successfully processed %d files: "
2213 "Failed processing %d files\n", stats.success, stats.failure);
2217 /****************************************************************************
2219 ****************************************************************************/
2220 int main(int argc, char *argv[])
2222 const char **argv_const = discard_const_p(const char *, argv);
2225 enum acl_mode mode = SMB_ACL_SET;
2226 static char *the_acl = NULL;
2227 enum chown_mode change_mode = REQUEST_NONE;
2230 char *filename = NULL;
2232 /* numeric is set when the user wants numeric SIDs and ACEs rather
2233 than going via LSA calls to resolve them */
2235 struct cli_state *targetcli = NULL;
2236 struct cli_credentials *creds = NULL;
2237 char *targetfile = NULL;
2240 struct loadparm_context *lp_ctx = NULL;
2242 struct poptOption long_options[] = {
2245 .longName = "delete",
2247 .argInfo = POPT_ARG_STRING,
2250 .descrip = "Delete an acl",
2251 .argDescrip = "ACL",
2254 .longName = "modify",
2256 .argInfo = POPT_ARG_STRING,
2259 .descrip = "Modify an acl",
2260 .argDescrip = "ACL",
2265 .argInfo = POPT_ARG_STRING,
2268 .descrip = "Add an acl",
2269 .argDescrip = "ACL",
2274 .argInfo = POPT_ARG_STRING,
2277 .descrip = "Set acls",
2278 .argDescrip = "ACLS",
2281 .longName = "chown",
2283 .argInfo = POPT_ARG_STRING,
2286 .descrip = "Change ownership of a file",
2287 .argDescrip = "USERNAME",
2290 .longName = "chgrp",
2292 .argInfo = POPT_ARG_STRING,
2295 .descrip = "Change group ownership of a file",
2296 .argDescrip = "GROUPNAME",
2299 .longName = "inherit",
2301 .argInfo = POPT_ARG_STRING,
2304 .descrip = "Inherit allow|remove|copy",
2307 .longName = "propagate-inheritance",
2309 .argInfo = POPT_ARG_NONE,
2310 .arg = &inheritance,
2312 .descrip = "Supports propagation of inheritable ACE(s) when used in conjunction with add, delete, set or modify",
2317 .argInfo = POPT_ARG_STRING,
2320 .descrip = "stores the DACLs in sddl format of the "
2321 "specified file or folder for later use "
2322 "with restore. SACLS, owner or integrity"
2323 " labels are not stored",
2326 .longName = "restore",
2328 .argInfo = POPT_ARG_STRING,
2329 .arg = &restore_file,
2331 .descrip = "applies the stored DACLS to files in "
2335 .longName = "recurse",
2337 .argInfo = POPT_ARG_NONE,
2340 .descrip = "indicates the operation is performed "
2341 "on directory and all files/directories"
2342 " below. (only applies to save option)",
2345 .longName = "numeric",
2347 .argInfo = POPT_ARG_NONE,
2350 .descrip = "Don't resolve sids or masks to names",
2355 .argInfo = POPT_ARG_NONE,
2358 .descrip = "Output and input acls in sddl format",
2361 .longName = "query-security-info",
2363 .argInfo = POPT_ARG_INT,
2364 .arg = &query_sec_info,
2366 .descrip = "The security-info flags for queries"
2369 .longName = "set-security-info",
2371 .argInfo = POPT_ARG_INT,
2372 .arg = &set_sec_info,
2374 .descrip = "The security-info flags for modifications"
2377 .longName = "test-args",
2379 .argInfo = POPT_ARG_NONE,
2382 .descrip = "Test arguments"
2385 .longName = "domain-sid",
2387 .argInfo = POPT_ARG_STRING,
2390 .descrip = "Domain SID for sddl",
2391 .argDescrip = "SID"},
2393 .longName = "maximum-access",
2395 .argInfo = POPT_ARG_NONE,
2398 .descrip = "Query maximum permissions",
2401 POPT_COMMON_CONNECTION
2402 POPT_COMMON_CREDENTIALS
2408 struct cli_state *cli;
2409 TALLOC_CTX *frame = talloc_stackframe();
2410 const char *owner_username = "";
2415 ok = samba_cmdline_init(frame,
2416 SAMBA_CMDLINE_CONFIG_CLIENT,
2417 false /* require_smbconf */);
2419 DBG_ERR("Failed to init cmdline parser!\n");
2423 lp_ctx = samba_cmdline_get_lp_ctx();
2424 /* set default debug level to 1 regardless of what smb.conf sets */
2425 lpcfg_set_cmdline(lp_ctx, "log level", "1");
2429 pc = samba_popt_get_context(getprogname(),
2435 DBG_ERR("Failed to setup popt context!\n");
2440 poptSetOtherOptionHelp(pc, "//server1/share1 filename\nACLs look like: "
2441 "'ACL:user:[ALLOWED|DENIED]/flags/permissions'");
2443 while ((opt = poptGetNextOpt(pc)) != -1) {
2446 the_acl = smb_xstrdup(poptGetOptArg(pc));
2451 the_acl = smb_xstrdup(poptGetOptArg(pc));
2452 mode = SMB_ACL_DELETE;
2456 the_acl = smb_xstrdup(poptGetOptArg(pc));
2457 mode = SMB_ACL_MODIFY;
2461 the_acl = smb_xstrdup(poptGetOptArg(pc));
2466 owner_username = poptGetOptArg(pc);
2467 change_mode = REQUEST_CHOWN;
2471 owner_username = poptGetOptArg(pc);
2472 change_mode = REQUEST_CHGRP;
2476 owner_username = poptGetOptArg(pc);
2477 change_mode = REQUEST_INHERIT;
2480 lpcfg_set_cmdline(lp_ctx, "client max protocol", poptGetOptArg(pc));
2485 case POPT_ERROR_BADOPT:
2486 fprintf(stderr, "\nInvalid option %s: %s\n\n",
2487 poptBadOption(pc, 0), poptStrerror(opt));
2488 poptPrintUsage(pc, stderr, 0);
2492 if (inheritance && !the_acl) {
2493 poptPrintUsage(pc, stderr, 0);
2497 if(!poptPeekArg(pc)) {
2498 poptPrintUsage(pc, stderr, 0);
2502 path = talloc_strdup(frame, poptGetArg(pc));
2507 if (strncmp(path, "\\\\", 2) && strncmp(path, "//", 2)) {
2508 printf("Invalid argument: %s\n", path);
2512 if(!poptPeekArg(pc)) {
2513 poptPrintUsage(pc, stderr, 0);
2517 filename = talloc_strdup(frame, poptGetArg(pc));
2522 poptFreeContext(pc);
2523 samba_cmdline_burn(argc, argv);
2525 string_replace(path,'/','\\');
2527 server = talloc_strdup(frame, path+2);
2531 share = strchr_m(server,'\\');
2532 if (share == NULL) {
2533 printf("Invalid argument\n");
2540 creds = samba_cmdline_get_creds();
2542 /* Make connection to server */
2544 cli = connect_one(creds, server, share);
2552 string_replace(filename, '/', '\\');
2553 if (filename[0] != '\\') {
2554 filename = talloc_asprintf(frame,
2562 status = cli_resolve_path(frame,
2569 if (!NT_STATUS_IS_OK(status)) {
2570 DEBUG(0,("cli_resolve_path failed for %s! (%s)\n", filename, nt_errstr(status)));
2574 /* Perform requested action */
2576 if (change_mode == REQUEST_INHERIT) {
2577 result = inherit(targetcli, targetfile, owner_username);
2578 } else if (change_mode != REQUEST_NONE) {
2579 result = owner_set(targetcli, change_mode, targetfile, owner_username);
2580 } else if (the_acl) {
2582 struct cacl_callback_state cbstate = {
2589 result = inheritance_cacl_set(targetfile, &cbstate);
2591 result = cacl_set(targetcli,
2598 if (save_file || restore_file) {
2601 result = cacl_dump_dacl(cli, creds, filename);
2603 result = cacl_restore(targetcli,
2605 numeric, restore_file);
2608 result = cacl_dump(targetcli, targetfile, numeric);