Displaying 11 results from an estimated 11 matches for "sec_ace_flag_inherited_ac".
Did you mean:
sec_ace_flag_inherited_ace
2018 Nov 01
1
Internal DNS migrate to Bind9_DLZ
...0x5a (90)
0: SEC_ACE_FLAG_OBJECT_INHERIT
1: SEC_ACE_FLAG_CONTAINER_INHERIT
0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
1: SEC_ACE_FLAG_INHERIT_ONLY
1: SEC_ACE_FLAG_INHERITED_ACE
0x0a: SEC_ACE_FLAG_VALID_INHERIT (10)
1: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
0: SEC_ACE_FLAG_FAILED_ACCESS
size : 0x0038 (56)
access_mask...
2018 Nov 01
2
Internal DNS migrate to Bind9_DLZ
I've been been trying to investigate this for sometime now, hence I came to
the experts :)
I have rejoined all my DC's with new names, see below.
;; ANSWER SECTION:
<domain>.corp. 3600 IN NS psad101zatcrh.<domain>.corp. -> New
rebuild, new hostname, RHEL6 to RHEL7 upgrade
<domain>.corp. 3600 IN NS prdc001zafsrh.<domain>.corp. -> New
2019 Apr 11
1
Online backup results using 4.10.2
...EVISION_ADS (4)
size: 0x00c4 (196)
num_aces: 0x00000007 (7)
aces: ARRAY(7)
aces: struct security_ace
type: SEC_ACE_TYPE_ACCESS_ALLOWED (0)
flags: 0x03 (3)
1: SEC_ACE_FLAG_OBJECT_INHERIT
1: SEC_ACE_FLAG_CONTAINER_INHERIT
0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
0: SEC_ACE_FLAG_INHERIT_ONLY
0: SEC_ACE_FLAG_INHERITED_ACE
0x03: SEC_ACE_FLAG_VALID_INHERIT (3)
0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
0: SEC_ACE_FLAG_FAILED_ACCESS
size: 0x0024 (36)
access_mask: 0x001f01ff (2032127)
object: union security_ace_object_ctr(case 0)
trustee: S-1-5-21-940051827-2291820289-3341758437-512
aces: struct security_ace
type: SEC_...
2023 Apr 11
1
clients not connecting to samba shares
...??????????????????????????1: SEC_ACE_FLAG_OBJECT_INHERIT
> ??????????????????????????????1: SEC_ACE_FLAG_CONTAINER_INHERIT
> ??????????????????????????????0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
> ??????????????????????????????0: SEC_ACE_FLAG_INHERIT_ONLY
> ??????????????????????????????0: SEC_ACE_FLAG_INHERITED_ACE
> ???????????????????????????0x03: SEC_ACE_FLAG_VALID_INHERIT (3)
> ??????????????????????????????0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
> ??????????????????????????????0: SEC_ACE_FLAG_FAILED_ACCESS
> ???????????????????????size ????????????????????: 0x0014 (20)
> ???????????????????????...
2023 Apr 11
1
clients not connecting to samba shares
On 11/04/2023 13:36, Gary Dale via samba wrote:
> On 2023-04-11 04:15, Rowland Penny via samba wrote:
>>
>>
>> What 'Debian distribution-specific' installation did you follow ?
> The one linked to in AD DC wiki.
Where abouts is this link ?
I checked here:
https://wiki.samba.org/index.php/Setting_up_Samba_as_an_Active_Directory_Domain_Controller
But couldn't
2010 May 28
1
samba 3.5.3: loads of errors copying some simple ACLs with robocopy
Maybe I'm doing somthing really stupid, but while copying some windows
share onto a samba server, on some random subdirectory robocopy
says ERROR 87 (0x00000057) Copying NTFS Security to Destination Directory...
The samba logfile has lots of these lines.
modules/vfs_posixacl.c:349(smb_acl_to_posix)
smb_acl_to_posix: ACL is invalid for set (Das Argument ist ung?ltig)
The strange thing is
2012 Aug 24
1
Permissions incorrectly ordered on Windows after disabling inheritance
...ALLOWED/OI|CI|IO/RWXDPO
ACL:Everyone:ALLOWED/OI|CI/RWXDPO admin at BizNAS-H5:/mnt/lvol0$
Note that the ACE entries are in the same order, however in the first
case where Windows reports incorrectly ordered ACE's Creator Owner,
Creator Group and Everyone ACE's include the "I" flag
SEC_ACE_FLAG_INHERITED_ACE
The share folder, rootfolder and subfolder1 permissions are as shown
below (steps 1 through 3)
smbcacls //localhost/20120821_3 rootfolder/..
REVISION:1
CONTROL:0x8004
OWNER:BIZNAS-H5\nobody
GROUP:Unix Group\root
ACL:BIZNAS-H5\nobody:ALLOWED/0x0/FULL
ACL:Unix Group\%naslocal%:ALLOWED/0x0/FULL ACL...
2016 Jan 08
2
Security permissions issues after changing idmap backend from RID to AUTORID
...1: SEC_ACE_FLAG_OBJECT_INHERIT
> 1: SEC_ACE_FLAG_CONTAINER_INHERIT
> 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
> 0: SEC_ACE_FLAG_INHERIT_ONLY
> 0: SEC_ACE_FLAG_INHERITED_ACE
> 0x03: SEC_ACE_FLAG_VALID_INHERIT (3)
> 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
>
>
> TO workaround this issue we went back to RID based idmap backend and now
> for some users are not able to login itself and they get the...
2016 Jan 10
2
Security permissions issues after changing idmap backend from RID to AUTORID
..._INHERIT
>>> 1: SEC_ACE_FLAG_CONTAINER_INHERIT
>>> 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
>>> 0: SEC_ACE_FLAG_INHERIT_ONLY
>>> 0: SEC_ACE_FLAG_INHERITED_ACE
>>> 0x03: SEC_ACE_FLAG_VALID_INHERIT (3)
>>> 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
>>>
>>>
>>> TO workaround this issue we went back to RID based idmap backend and now
>>> for some us...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
..._ACE_FLAG_OBJECT_INHERIT
>> 1: SEC_ACE_FLAG_CONTAINER_INHERIT
>> 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
>> 0: SEC_ACE_FLAG_INHERIT_ONLY
>> 0: SEC_ACE_FLAG_INHERITED_ACE
>> 0x03: SEC_ACE_FLAG_VALID_INHERIT (3)
>> 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
>>
>>
>> TO workaround this issue we went back to RID based idmap backend and now
>> for some users are not able to logi...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...SEC_ACE_FLAG_CONTAINER_INHERIT
> 0:
> SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
> 0: SEC_ACE_FLAG_INHERIT_ONLY
> 0:
> SEC_ACE_FLAG_INHERITED_ACE
> 0x03:
> SEC_ACE_FLAG_VALID_INHERIT (3)
> 0:
> SEC_ACE_FLAG_SUCCESSFUL_ACCESS
>
>
> TO workaround this issue we went back to RID based idmap
>...