LCOV - code coverage report
Current view: top level - source3/lib - privileges.c (source / functions) Hit Total Coverage
Test: coverage report for fix-15632 9995c5c2 Lines: 133 195 68.2 %
Date: 2024-04-13 12:30:31 Functions: 17 19 89.5 %

          Line data    Source code
       1             : /*
       2             :    Unix SMB/CIFS implementation.
       3             :    Privileges handling functions
       4             :    Copyright (C) Jean François Micouleau       1998-2001
       5             :    Copyright (C) Simo Sorce                     2002-2003
       6             :    Copyright (C) Gerald (Jerry) Carter          2005
       7             :    Copyright (C) Michael Adam                   2007
       8             : 
       9             :    This program is free software; you can redistribute it and/or modify
      10             :    it under the terms of the GNU General Public License as published by
      11             :    the Free Software Foundation; either version 3 of the License, or
      12             :    (at your option) any later version.
      13             : 
      14             :    This program is distributed in the hope that it will be useful,
      15             :    but WITHOUT ANY WARRANTY; without even the implied warranty of
      16             :    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
      17             :    GNU General Public License for more details.
      18             : 
      19             :    You should have received a copy of the GNU General Public License
      20             :    along with this program.  If not, see <http://www.gnu.org/licenses/>.
      21             : */
      22             : 
      23             : 
      24             : #include "includes.h"
      25             : #include "lib/privileges.h"
      26             : #include "dbwrap/dbwrap.h"
      27             : #include "libcli/security/privileges_private.h"
      28             : #include "../libcli/security/security.h"
      29             : #include "passdb.h"
      30             : #include "lib/util/string_wrappers.h"
      31             : 
      32             : #define PRIVPREFIX              "PRIV_"
      33             : 
      34             : typedef struct {
      35             :         uint32_t count;
      36             :         struct dom_sid *list;
      37             : } SID_LIST;
      38             : 
      39             : typedef struct {
      40             :         TALLOC_CTX *mem_ctx;
      41             :         uint64_t privilege;
      42             :         SID_LIST sids;
      43             : } PRIV_SID_LIST;
      44             : 
      45             : /*
      46             :   interpret an old style SE_PRIV structure
      47             :  */
      48           0 : static uint64_t map_old_SE_PRIV(unsigned char *dptr)
      49             : {
      50           0 :         uint32_t *old_masks = (uint32_t *)dptr;
      51             :         /*
      52             :          * the old privileges code only ever used up to 0x800, except
      53             :          * for a special case of 'SE_ALL_PRIVS' which was 0xFFFFFFFF
      54             :          */
      55           0 :         if (old_masks[0] == 0xFFFFFFFF) {
      56             :                 /* they set all privileges */
      57           0 :                 return SE_ALL_PRIVS;
      58             :         }
      59             : 
      60             :         /* the old code used the machine byte order, but we don't know
      61             :          * the byte order of the machine that wrote it. However we can
      62             :          * tell what byte order it was by taking advantage of the fact
      63             :          * that it only ever use up to 0x800
      64             :          */
      65           0 :         if (dptr[0] || dptr[1]) {
      66             :                 /* it was little endian */
      67           0 :                 return IVAL(dptr, 0);
      68             :         }
      69             : 
      70             :         /* it was either zero or big-endian */
      71           0 :         return RIVAL(dptr, 0);
      72             : }
      73             : 
      74             : 
      75      184865 : static bool get_privileges( const struct dom_sid *sid, uint64_t *mask )
      76             : {
      77      184865 :         struct db_context *db = get_account_pol_db();
      78          12 :         struct dom_sid_buf tmp;
      79          12 :         fstring keystr;
      80          12 :         TDB_DATA data;
      81          12 :         NTSTATUS status;
      82             : 
      83             :         /* Fail if the admin has not enable privileges */
      84             : 
      85      184865 :         if ( !lp_enable_privileges() ) {
      86           0 :                 return False;
      87             :         }
      88             : 
      89      184865 :         if ( db == NULL )
      90           0 :                 return False;
      91             : 
      92             :         /* PRIV_<SID> (NULL terminated) as the key */
      93             : 
      94      184865 :         fstr_sprintf(keystr, "%s%s", PRIVPREFIX, dom_sid_str_buf(sid, &tmp));
      95             : 
      96      184865 :         status = dbwrap_fetch_bystring(db, talloc_tos(), keystr, &data);
      97             : 
      98      184865 :         if (!NT_STATUS_IS_OK(status)) {
      99      151337 :                 DEBUG(4, ("get_privileges: No privileges assigned to SID "
     100             :                           "[%s]\n", tmp.buf));
     101      151337 :                 return False;
     102             :         }
     103             : 
     104       33528 :         if (data.dsize == 4*4) {
     105             :                 /* it's an old style SE_PRIV structure. */
     106           0 :                 *mask = map_old_SE_PRIV(data.dptr);
     107             :         } else {
     108       33528 :                 if (data.dsize != sizeof( uint64_t ) ) {
     109           0 :                         DEBUG(3, ("get_privileges: Invalid privileges record assigned to SID "
     110             :                                   "[%s]\n", tmp.buf));
     111           0 :                         return False;
     112             :                 }
     113             : 
     114       33528 :                 *mask = BVAL(data.dptr, 0);
     115             :         }
     116             : 
     117       33528 :         TALLOC_FREE(data.dptr);
     118             : 
     119       33528 :         return True;
     120             : }
     121             : 
     122             : /***************************************************************************
     123             :  Store the privilege mask (set) for a given SID
     124             : ****************************************************************************/
     125             : 
     126         663 : static bool set_privileges( const struct dom_sid *sid, uint64_t mask )
     127             : {
     128         663 :         struct db_context *db = get_account_pol_db();
     129          12 :         uint8_t privbuf[8];
     130          12 :         struct dom_sid_buf tmp;
     131          12 :         fstring keystr;
     132         663 :         TDB_DATA data = { .dptr = privbuf, .dsize = sizeof(privbuf), };
     133             : 
     134         663 :         if ( !lp_enable_privileges() )
     135           0 :                 return False;
     136             : 
     137         663 :         if ( db == NULL )
     138           0 :                 return False;
     139             : 
     140         663 :         if ( !sid || (sid->num_auths == 0) ) {
     141           0 :                 DEBUG(0,("set_privileges: Refusing to store empty SID!\n"));
     142           0 :                 return False;
     143             :         }
     144             : 
     145             :         /* PRIV_<SID> (NULL terminated) as the key */
     146             : 
     147         663 :         fstr_sprintf(keystr, "%s%s", PRIVPREFIX, dom_sid_str_buf(sid, &tmp));
     148             : 
     149             :         /* This writes the 64 bit bitmask out in little endian format */
     150         663 :         SBVAL(privbuf,0,mask);
     151             : 
     152         663 :         return NT_STATUS_IS_OK(dbwrap_store_bystring(db, keystr, data,
     153             :                                                      TDB_REPLACE));
     154             : }
     155             : 
     156             : /*********************************************************************
     157             :  get a list of all privileges for all sids in the list
     158             : *********************************************************************/
     159             : 
     160       23007 : bool get_privileges_for_sids(uint64_t *privileges, struct dom_sid *slist, int scount)
     161             : {
     162           0 :         uint64_t mask;
     163           0 :         int i;
     164       23007 :         bool found = False;
     165             : 
     166       23007 :         *privileges = 0;
     167             : 
     168      207094 :         for ( i=0; i<scount; i++ ) {
     169           0 :                 struct dom_sid_buf buf;
     170             : 
     171             :                 /* don't add unless we actually have a privilege assigned */
     172             : 
     173      184087 :                 if ( !get_privileges( &slist[i], &mask ) )
     174      150635 :                         continue;
     175             : 
     176       33452 :                 DBG_INFO("sid = %s\nPrivilege set: 0x%"PRIx64"\n",
     177             :                          dom_sid_str_buf(&slist[i], &buf),
     178             :                          mask);
     179             : 
     180       33452 :                 *privileges |= mask;
     181       33452 :                 found = True;
     182             :         }
     183             : 
     184       23007 :         return found;
     185             : }
     186             : 
     187         114 : NTSTATUS get_privileges_for_sid_as_set(TALLOC_CTX *mem_ctx, PRIVILEGE_SET **privileges, struct dom_sid *sid)
     188             : {
     189           0 :         uint64_t mask;
     190         114 :         if (!get_privileges(sid, &mask)) {
     191          96 :                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
     192             :         }
     193             : 
     194          18 :         *privileges = talloc_zero(mem_ctx, PRIVILEGE_SET);
     195          18 :         if (!*privileges) {
     196           0 :                 return NT_STATUS_NO_MEMORY;
     197             :         }
     198             : 
     199          18 :         if (!se_priv_to_privilege_set(*privileges, mask)) {
     200           0 :                 return NT_STATUS_NO_MEMORY;
     201             :         }
     202          18 :         return NT_STATUS_OK;
     203             : }
     204             : 
     205             : /*********************************************************************
     206             :  traversal functions for privilege_enumerate_accounts
     207             : *********************************************************************/
     208             : 
     209         187 : static int priv_traverse_fn(struct db_record *rec, void *state)
     210             : {
     211         187 :         PRIV_SID_LIST *priv = (PRIV_SID_LIST *)state;
     212         187 :         int  prefixlen = strlen(PRIVPREFIX);
     213           0 :         struct dom_sid sid;
     214           0 :         fstring sid_string;
     215           0 :         TDB_DATA key;
     216             : 
     217         187 :         key = dbwrap_record_get_key(rec);
     218             : 
     219             :         /* check we have a PRIV_+SID entry */
     220             : 
     221         187 :         if (strncmp((char *)key.dptr, PRIVPREFIX, prefixlen) != 0)
     222         121 :                 return 0;
     223             : 
     224             :         /* check to see if we are looking for a particular privilege */
     225             : 
     226          66 :         fstrcpy( sid_string, (char *)&(key.dptr[strlen(PRIVPREFIX)]) );
     227             : 
     228          66 :         if (priv->privilege != 0) {
     229           0 :                 uint64_t mask;
     230           0 :                 TDB_DATA value;
     231             : 
     232          54 :                 value = dbwrap_record_get_value(rec);
     233             : 
     234          54 :                 if (value.dsize == 4*4) {
     235           0 :                         mask = map_old_SE_PRIV(value.dptr);
     236             :                 } else {
     237          54 :                         if (value.dsize != sizeof( uint64_t ) ) {
     238           0 :                                 DEBUG(3, ("get_privileges: Invalid privileges record assigned to SID "
     239             :                                           "[%s]\n", sid_string));
     240          45 :                                 return 0;
     241             :                         }
     242          54 :                         mask = BVAL(value.dptr, 0);
     243             :                 }
     244             : 
     245             :                 /* if the SID does not have the specified privilege
     246             :                    then just return */
     247             : 
     248          54 :                 if ((mask & priv->privilege) == 0) {
     249          45 :                         return 0;
     250             :                 }
     251             :         }
     252             : 
     253             :         /* this is a last ditch safety check to preventing returning
     254             :            and invalid SID (i've somehow run into this on development branches) */
     255             : 
     256          21 :         if ( strcmp( "S-0-0", sid_string ) == 0 )
     257           0 :                 return 0;
     258             : 
     259          21 :         if ( !string_to_sid(&sid, sid_string) ) {
     260           0 :                 DBG_WARNING("Could not convert SID [%s]\n", sid_string);
     261           0 :                 return 0;
     262             :         }
     263             : 
     264          21 :         if (!NT_STATUS_IS_OK(add_sid_to_array(priv->mem_ctx, &sid,
     265             :                                               &priv->sids.list,
     266             :                                               &priv->sids.count)))
     267             :         {
     268           0 :                 return 0;
     269             :         }
     270             : 
     271          21 :         return 0;
     272             : }
     273             : 
     274             : /*********************************************************************
     275             :  Retrieve list of privileged SIDs (for _lsa_enumerate_accounts()
     276             : *********************************************************************/
     277             : 
     278           2 : NTSTATUS privilege_enumerate_accounts(struct dom_sid **sids, int *num_sids)
     279             : {
     280           2 :         struct db_context *db = get_account_pol_db();
     281           0 :         PRIV_SID_LIST priv;
     282           0 :         NTSTATUS status;
     283             : 
     284           2 :         if (db == NULL) {
     285           0 :                 return NT_STATUS_ACCESS_DENIED;
     286             :         }
     287             : 
     288           2 :         ZERO_STRUCT(priv);
     289             : 
     290           2 :         status = dbwrap_traverse_read(db, priv_traverse_fn, &priv, NULL);
     291           2 :         if (!NT_STATUS_IS_OK(status)) {
     292           0 :                 return status;
     293             :         }
     294             : 
     295             :         /* give the memory away; caller will free */
     296             : 
     297           2 :         *sids      = priv.sids.list;
     298           2 :         *num_sids  = priv.sids.count;
     299             : 
     300           2 :         return NT_STATUS_OK;
     301             : }
     302             : 
     303             : /*********************************************************************
     304             :  Retrieve list of SIDs granted a particular privilege
     305             : *********************************************************************/
     306             : 
     307           9 : NTSTATUS privilege_enum_sids(enum sec_privilege privilege, TALLOC_CTX *mem_ctx,
     308             :                              struct dom_sid **sids, int *num_sids)
     309             : {
     310           9 :         struct db_context *db = get_account_pol_db();
     311           0 :         PRIV_SID_LIST priv;
     312           0 :         NTSTATUS status;
     313             : 
     314           9 :         if (db == NULL) {
     315           0 :                 return NT_STATUS_ACCESS_DENIED;
     316             :         }
     317             : 
     318           9 :         ZERO_STRUCT(priv);
     319             : 
     320           9 :         priv.privilege = sec_privilege_mask(privilege);
     321           9 :         priv.mem_ctx = mem_ctx;
     322             : 
     323           9 :         status = dbwrap_traverse_read(db, priv_traverse_fn, &priv, NULL);
     324           9 :         if (!NT_STATUS_IS_OK(status)) {
     325           0 :                 return status;
     326             :         }
     327             : 
     328             :         /* give the memory away; caller will free */
     329             : 
     330           9 :         *sids      = priv.sids.list;
     331           9 :         *num_sids  = priv.sids.count;
     332             : 
     333           9 :         return NT_STATUS_OK;
     334             : }
     335             : 
     336             : /***************************************************************************
     337             :  Add privilege to sid
     338             : ****************************************************************************/
     339             : 
     340         622 : static bool grant_privilege_bitmap(const struct dom_sid *sid, const uint64_t priv_mask)
     341             : {
     342          12 :         uint64_t old_mask, new_mask;
     343          12 :         struct dom_sid_buf buf;
     344             : 
     345         622 :         ZERO_STRUCT( old_mask );
     346         622 :         ZERO_STRUCT( new_mask );
     347             : 
     348         622 :         if ( get_privileges( sid, &old_mask ) )
     349          17 :                 new_mask = old_mask;
     350             :         else
     351         605 :                 new_mask = 0;
     352             : 
     353         622 :         new_mask |= priv_mask;
     354             : 
     355         622 :         DEBUG(10,("grant_privilege: %s\n", dom_sid_str_buf(sid, &buf)));
     356             : 
     357         622 :         DEBUGADD( 10, ("original privilege mask: 0x%llx\n", (unsigned long long)new_mask));
     358             : 
     359         622 :         DEBUGADD( 10, ("new privilege mask:      0x%llx\n", (unsigned long long)new_mask));
     360             : 
     361         622 :         return set_privileges( sid, new_mask );
     362             : }
     363             : 
     364             : /*********************************************************************
     365             :  Add a privilege based on its name
     366             : *********************************************************************/
     367             : 
     368          50 : bool grant_privilege_by_name(const struct dom_sid *sid, const char *name)
     369             : {
     370           0 :         uint64_t mask;
     371             : 
     372          50 :         if (! se_priv_from_name(name, &mask)) {
     373           0 :                 DEBUG(3, ("grant_privilege_by_name: "
     374             :                           "No Such Privilege Found (%s)\n", name));
     375           0 :                 return False;
     376             :         }
     377             : 
     378          50 :         return grant_privilege_bitmap( sid, mask );
     379             : }
     380             : 
     381             : /***************************************************************************
     382             :  Grant a privilege set (list of LUID values) from a sid
     383             : ****************************************************************************/
     384             : 
     385           1 : bool grant_privilege_set(const struct dom_sid *sid, struct lsa_PrivilegeSet *set)
     386             : {
     387           0 :         uint64_t privilege_mask;
     388           1 :         if (!privilege_set_to_se_priv(&privilege_mask, set)) {
     389           0 :                 return false;
     390             :         }
     391           1 :         return grant_privilege_bitmap(sid, privilege_mask);
     392             : }
     393             : 
     394             : /***************************************************************************
     395             :  Remove privilege from sid
     396             : ****************************************************************************/
     397             : 
     398          41 : static bool revoke_privilege_bitmap(const struct dom_sid *sid, const uint64_t priv_mask)
     399             : {
     400           0 :         uint64_t mask;
     401           0 :         struct dom_sid_buf buf;
     402             : 
     403             :         /* if the user has no privileges, then we can't revoke any */
     404             : 
     405          41 :         if ( !get_privileges( sid, &mask ) )
     406           0 :                 return True;
     407             : 
     408          41 :         DEBUG(10,("revoke_privilege: %s\n", dom_sid_str_buf(sid, &buf)));
     409             : 
     410          41 :         DEBUGADD( 10, ("original privilege mask: 0x%llx\n", (unsigned long long)mask));
     411             : 
     412          41 :         mask &= ~priv_mask;
     413             : 
     414          41 :         DEBUGADD( 10, ("new privilege mask:      0x%llx\n", (unsigned long long)mask));
     415             : 
     416          41 :         return set_privileges( sid, mask );
     417             : }
     418             : 
     419             : /***************************************************************************
     420             :  Remove a privilege set (list of LUID values) from a sid
     421             : ****************************************************************************/
     422             : 
     423           1 : bool revoke_privilege_set(const struct dom_sid *sid, struct lsa_PrivilegeSet *set)
     424             : {
     425           0 :         uint64_t privilege_mask;
     426           1 :         if (!privilege_set_to_se_priv(&privilege_mask, set)) {
     427           0 :                 return false;
     428             :         }
     429           1 :         return revoke_privilege_bitmap(sid, privilege_mask);
     430             : }
     431             : 
     432             : /*********************************************************************
     433             :  Revoke all privileges
     434             : *********************************************************************/
     435             : 
     436           0 : bool revoke_all_privileges( const struct dom_sid *sid )
     437             : {
     438           0 :         return revoke_privilege_bitmap( sid, SE_ALL_PRIVS);
     439             : }
     440             : 
     441             : /*********************************************************************
     442             :  Add a privilege based on its name
     443             : *********************************************************************/
     444             : 
     445          40 : bool revoke_privilege_by_name(const struct dom_sid *sid, const char *name)
     446             : {
     447           0 :         uint64_t mask;
     448             : 
     449          40 :         if (! se_priv_from_name(name, &mask)) {
     450           0 :                 DEBUG(3, ("revoke_privilege_by_name: "
     451             :                           "No Such Privilege Found (%s)\n", name));
     452           0 :                 return False;
     453             :         }
     454             : 
     455          40 :         return revoke_privilege_bitmap(sid, mask);
     456             : 
     457             : }
     458             : 
     459             : /***************************************************************************
     460             :  Retrieve the SIDs assigned to a given privilege
     461             : ****************************************************************************/
     462             : 
     463         476 : NTSTATUS privilege_create_account(const struct dom_sid *sid )
     464             : {
     465         476 :         return ( grant_privilege_bitmap(sid, 0) ? NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL);
     466             : }
     467             : 
     468             : /***************************************************************************
     469             :  Delete a privileged account
     470             : ****************************************************************************/
     471             : 
     472           1 : NTSTATUS privilege_delete_account(const struct dom_sid *sid)
     473             : {
     474           1 :         struct db_context *db = get_account_pol_db();
     475           0 :         struct dom_sid_buf tmp;
     476           0 :         fstring keystr;
     477             : 
     478           1 :         if (!lp_enable_privileges()) {
     479           0 :                 return NT_STATUS_OK;
     480             :         }
     481             : 
     482           1 :         if (!db) {
     483           0 :                 return NT_STATUS_INVALID_HANDLE;
     484             :         }
     485             : 
     486           1 :         if (!sid || (sid->num_auths == 0)) {
     487           0 :                 return NT_STATUS_INVALID_SID;
     488             :         }
     489             : 
     490             :         /* PRIV_<SID> (NULL terminated) as the key */
     491             : 
     492           1 :         fstr_sprintf(keystr, "%s%s", PRIVPREFIX, dom_sid_str_buf(sid, &tmp));
     493             : 
     494           1 :         return dbwrap_delete_bystring(db, keystr);
     495             : }
     496             : 
     497             : /*******************************************************************
     498             : *******************************************************************/
     499             : 
     500           1 : bool is_privileged_sid( const struct dom_sid *sid )
     501             : {
     502           0 :         uint64_t mask;
     503             : 
     504           1 :         return get_privileges( sid, &mask );
     505             : }
     506             : 
     507             : /*******************************************************************
     508             : *******************************************************************/
     509             : 
     510          95 : bool grant_all_privileges( const struct dom_sid *sid )
     511             : {
     512           2 :         uint64_t mask;
     513             : 
     514          95 :         se_priv_put_all_privileges(&mask);
     515             : 
     516          95 :         return grant_privilege_bitmap( sid, mask );
     517             : }

Generated by: LCOV version 1.14