Matt Pruett
2023-Nov-14  20:37 UTC
[Samba] General advice needed, granting machine account permissions to a share?
It does produce an id. I can try switching away from sssd as suggested
by Rowland. I'm interested in my last question about how valid the
notion of granting a domain machine account permissions to a share is?
Is this something that is done in some cases? Does Microsoft consider
it a valid use case of machine accounts? Here is my config, any
advice/criticism would be welcome. (though I am aware that using
.local is cursed, predates me, can't change it)  The machine account
is a member of the "encoder group".
[global]
realm = DH.LOCAL
workgroup = DH
security = ads
kerberos method = secrets and keytab
template homedir = /home/%U
idmap config * : backend = tdb
idmap config * : range = 10000-199999
idmap config DH : backend = sss
idmap config DH : range = 200000-2147483647
load printers = no
printing = bsd
printcap name = /dev/null
disable spoolss = yes
machine password timeout = 0
log level = 2
disable netbios = yes
server min protocol = SMB2_02
restrict anonymous = 2
unix extensions = no
dos filemode = yes
aio max threads = 2
dns proxy = no
kernel change notify = yes
directory name cache size = 0
server multi channel support = no
unix charset = UTF-8
obey pam restrictions = False
rpc_daemon:mdssd = disabled
rpc_server:mdssvc = disabled
server string = Encoder
bind interfaces only = yes
netbios name = encoder
netbios aliases 
[pdf_fileserver]
    comment = PDF Encoding Output
    path = /srv/pdf_fileserver
    directory mask = 770
    create mask = 660
    kernel oplocks = no
    kernel share modes = no
    posix locking = no
    nfs4:chown = true
    ea support = false
    smbd max xattr size = 2097152
    vfs objects = streams_xattr
    write list = +"encoder group"@dh.local +"domain
users"@dh.local
On Tue, Nov 14, 2023 at 12:22?PM Christian Naumer via samba
<samba at lists.samba.org> wrote:>
> Hi,
> does your computer account have a uid on that member server?
> Does
> id COMPUTERNAME$
>
> produce an output?
>
> Since I also can not get at the redhat info you provided could your share
your SMB.conf
>
> Regards
>
> Christian
>
>
> Am 14. November 2023 02:52:07 MEZ schrieb Matt Pruett via samba <samba
at lists.samba.org>:
> >Here's the situation:
> >I used sssd-winbind to join the server to a native windows domain.
> >Following these instructions:
> >https://access.redhat.com/solutions/3802321
> >
> >This all seems to be working fine. I have various shares that various
> >AD groups can access and within those shares I use "posix"
acls to do
> >some more fine grained permissions.
> >
> >However there is a 3rd party application/service running on a windows
> >server that polls an smb share located on this samba server for new
> >files. This service runs as the "local system" account and
provides no
> >means of specifying separate smb credentials. Therefore it
> >authenticates as its AD computer account. I have created an ad
> >security group which contains both this machine account, and some
> >other needed user accounts, and assigned this group as the unix group
> >for that folder structure.
> >
> >For the users that are a member of this group, it's working fine.
> >However for this computer account it doesn't seem to work
> >consistently. In the logs I get a "Could not convert SID S-0-0,
error
> >is NT_STATUS_NONE_MAPPED" .
> >
> >So my question is firstly, is assigning computer accounts permissions
> >to shares a valid approach to this kind of thing? Are there any
> >significant security repercussions for using a computer account in
> >this way?
> >
> >Secondly, is this chain of configuration something that can work with
> >"posix" acls? Or should I toss that out and use:
> >
> >vfs objects = acl_xattr
> >map acl inherit = yes
> >acl_xattr:ignore system acls = yes
> >
> >Thanks.
> >
> >--
> >To unsubscribe from this list go to the following URL and read the
> >instructions:  https://lists.samba.org/mailman/options/samba
> --
> To unsubscribe from this list go to the following URL and read the
> instructions:  https://lists.samba.org/mailman/options/samba
Aaron C. de Bruyn
2023-Nov-14  20:40 UTC
[Samba] General advice needed, granting machine account permissions to a share?
That's definitely a valid case. We have software deployments defined in Group Policy that install at machine boot. That share must allow computer accounts to read from it in order to install the software. -A On Tue, Nov 14, 2023 at 12:38?PM Matt Pruett via samba < samba at lists.samba.org> wrote:> It does produce an id. I can try switching away from sssd as suggested > by Rowland. I'm interested in my last question about how valid the > notion of granting a domain machine account permissions to a share is? > Is this something that is done in some cases? Does Microsoft consider > it a valid use case of machine accounts? Here is my config, any > advice/criticism would be welcome. (though I am aware that using > .local is cursed, predates me, can't change it) The machine account > is a member of the "encoder group". > > [global] > realm = DH.LOCAL > workgroup = DH > security = ads > kerberos method = secrets and keytab > template homedir = /home/%U > idmap config * : backend = tdb > idmap config * : range = 10000-199999 > idmap config DH : backend = sss > idmap config DH : range = 200000-2147483647 > load printers = no > printing = bsd > printcap name = /dev/null > disable spoolss = yes > machine password timeout = 0 > > log level = 2 > disable netbios = yes > server min protocol = SMB2_02 > > restrict anonymous = 2 > unix extensions = no > dos filemode = yes > aio max threads = 2 > > dns proxy = no > kernel change notify = yes > directory name cache size = 0 > server multi channel support = no > unix charset = UTF-8 > obey pam restrictions = False > rpc_daemon:mdssd = disabled > rpc_server:mdssvc = disabled > > server string = Encoder > bind interfaces only = yes > netbios name = encoder > netbios aliases > > [pdf_fileserver] > comment = PDF Encoding Output > path = /srv/pdf_fileserver > directory mask = 770 > create mask = 660 > kernel oplocks = no > kernel share modes = no > posix locking = no > nfs4:chown = true > ea support = false > smbd max xattr size = 2097152 > vfs objects = streams_xattr > write list = +"encoder group"@dh.local +"domain users"@dh.local > > On Tue, Nov 14, 2023 at 12:22?PM Christian Naumer via samba > <samba at lists.samba.org> wrote: > > > > Hi, > > does your computer account have a uid on that member server? > > Does > > id COMPUTERNAME$ > > > > produce an output? > > > > Since I also can not get at the redhat info you provided could your > share your SMB.conf > > > > Regards > > > > Christian > > > > > > Am 14. November 2023 02:52:07 MEZ schrieb Matt Pruett via samba < > samba at lists.samba.org>: > > >Here's the situation: > > >I used sssd-winbind to join the server to a native windows domain. > > >Following these instructions: > > >https://access.redhat.com/solutions/3802321 > > > > > >This all seems to be working fine. I have various shares that various > > >AD groups can access and within those shares I use "posix" acls to do > > >some more fine grained permissions. > > > > > >However there is a 3rd party application/service running on a windows > > >server that polls an smb share located on this samba server for new > > >files. This service runs as the "local system" account and provides no > > >means of specifying separate smb credentials. Therefore it > > >authenticates as its AD computer account. I have created an ad > > >security group which contains both this machine account, and some > > >other needed user accounts, and assigned this group as the unix group > > >for that folder structure. > > > > > >For the users that are a member of this group, it's working fine. > > >However for this computer account it doesn't seem to work > > >consistently. In the logs I get a "Could not convert SID S-0-0, error > > >is NT_STATUS_NONE_MAPPED" . > > > > > >So my question is firstly, is assigning computer accounts permissions > > >to shares a valid approach to this kind of thing? Are there any > > >significant security repercussions for using a computer account in > > >this way? > > > > > >Secondly, is this chain of configuration something that can work with > > >"posix" acls? Or should I toss that out and use: > > > > > >vfs objects = acl_xattr > > >map acl inherit = yes > > >acl_xattr:ignore system acls = yes > > > > > >Thanks. > > > > > >-- > > >To unsubscribe from this list go to the following URL and read the > > >instructions: https://lists.samba.org/mailman/options/samba > > -- > > To unsubscribe from this list go to the following URL and read the > > instructions: https://lists.samba.org/mailman/options/samba > > -- > To unsubscribe from this list go to the following URL and read the > instructions: https://lists.samba.org/mailman/options/samba >
Rowland Penny
2023-Nov-14  21:19 UTC
[Samba] General advice needed, granting machine account permissions to a share?
On Tue, 14 Nov 2023 14:37:19 -0600 Matt Pruett via samba <samba at lists.samba.org> wrote:> It does produce an id. I can try switching away from sssd as suggested > by Rowland. I'm interested in my last question about how valid the > notion of granting a domain machine account permissions to a share is? > Is this something that is done in some cases? Does Microsoft consider > it a valid use case of machine accounts? Here is my config, any > advice/criticism would be welcome. (though I am aware that using > .local is cursed, predates me, can't change it) The machine account > is a member of the "encoder group".Using a computer account as a user is very valid, which is easy to understand when you realise that a computer account is just a user account with an extra objectclass.> > [global] > realm = DH.LOCAL > workgroup = DH > security = ads > kerberos method = secrets and keytab > template homedir = /home/%U > idmap config * : backend = tdb > idmap config * : range = 10000-199999I take it that this smb.conf ultimately came from redhat, if so, would someone from redhat like to explain why the default '*' domain is set for 189,999 IDs, when it is only really meant for the 'Well Known SIDs' (there are less than 200 of those) and anything outside the 'DH' domain (so really 0), don't you think that 189,999 is a bit of an overkill ?> idmap config DH : backend = sss > idmap config DH : range = 200000-2147483647Have you got any data using those ID's, if not, I suggest you dump sssd and reset the ranges (I would use the rid idmap backend).> load printers = no > printing = bsd > printcap name = /dev/null > disable spoolss = yes > machine password timeout = 0With 'machine password timeout' set to '0', winbind will never change the machine password, as far as I understand it.> > log level = 2 > disable netbios = yes > server min protocol = SMB2_02 > > restrict anonymous = 2 > unix extensions = no > dos filemode = yes > aio max threads = 2 > > dns proxy = no > kernel change notify = yes > directory name cache size = 0 > server multi channel support = no > unix charset = UTF-8 > obey pam restrictions = False > rpc_daemon:mdssd = disabled > rpc_server:mdssvc = disabled > > server string = Encoder > bind interfaces only = yes > netbios name = encoder > netbios aliases > > [pdf_fileserver] > comment = PDF Encoding Output > path = /srv/pdf_fileserver > directory mask = 770 > create mask = 660 > kernel oplocks = no > kernel share modes = no > posix locking = no > nfs4:chown = true > ea support = false > smbd max xattr size = 2097152 > vfs objects = streams_xattr > write list = +"encoder group"@dh.local +"domain users"@dh.local >From that smb.conf, I personally feel that you would get better results from dumping sssd and re-configuring smb.conf, but that must be your decision. Rowland