Displaying 15 results from an estimated 15 matches for "sec_ace_type_access_allow".
Did you mean:
sec_ace_type_access_allowed
2019 Apr 11
1
Online backup results using 4.10.2
...-1-5-21-940051827-2291820289-3341758437-512
group_sid: *
group_sid: S-1-5-21-940051827-2291820289-3341758437-512
sacl: NULL
dacl: *
dacl: struct security_acl
revision: SECURITY_ACL_REVISION_ADS (4)
size: 0x00c4 (196)
num_aces: 0x00000007 (7)
aces: ARRAY(7)
aces: struct security_ace
type: SEC_ACE_TYPE_ACCESS_ALLOWED (0)
flags: 0x03 (3)
1: SEC_ACE_FLAG_OBJECT_INHERIT
1: SEC_ACE_FLAG_CONTAINER_INHERIT
0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
0: SEC_ACE_FLAG_INHERIT_ONLY
0: SEC_ACE_FLAG_INHERITED_ACE
0x03: SEC_ACE_FLAG_VALID_INHERIT (3)
0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS
0: SEC_ACE_FLAG_FAILED_ACCESS
size:...
2023 Apr 11
1
clients not connecting to samba shares
...: SECURITY_ACL_REVISION_NT4 (2)
> ???????????????size ????????????????????: 0x0098 (152)
> ???????????????num_aces ????????????????: 0x00000006 (6)
> ???????????????aces: ARRAY(6)
> ???????????????????aces: struct security_ace
> ???????????????????????type ????????????????????:
> SEC_ACE_TYPE_ACCESS_ALLOWED (0)
> ???????????????????????flags ???????????????????: 0x03 (3)
> ??????????????????????????????1: SEC_ACE_FLAG_OBJECT_INHERIT
> ??????????????????????????????1: SEC_ACE_FLAG_CONTAINER_INHERIT
> ??????????????????????????????0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
> ?????????????????...
2023 Apr 11
1
clients not connecting to samba shares
On 11/04/2023 13:36, Gary Dale via samba wrote:
> On 2023-04-11 04:15, Rowland Penny via samba wrote:
>>
>>
>> What 'Debian distribution-specific' installation did you follow ?
> The one linked to in AD DC wiki.
Where abouts is this link ?
I checked here:
https://wiki.samba.org/index.php/Setting_up_Samba_as_an_Active_Directory_Domain_Controller
But couldn't
2010 May 28
1
samba 3.5.3: loads of errors copying some simple ACLs with robocopy
Maybe I'm doing somthing really stupid, but while copying some windows
share onto a samba server, on some random subdirectory robocopy
says ERROR 87 (0x00000057) Copying NTFS Security to Destination Directory...
The samba logfile has lots of these lines.
modules/vfs_posixacl.c:349(smb_acl_to_posix)
smb_acl_to_posix: ACL is invalid for set (Das Argument ist ung?ltig)
The strange thing is
2018 Nov 01
1
Internal DNS migrate to Bind9_DLZ
...vision : SECURITY_ACL_REVISION_ADS (4)
size : 0x0504 (1284)
num_aces : 0x0000001b (27)
aces: ARRAY(27)
aces: struct security_ace
type : SEC_ACE_TYPE_ACCESS_ALLOWED (0)
flags : 0x00 (0)
0: SEC_ACE_FLAG_OBJECT_INHERIT
0: SEC_ACE_FLAG_CONTAINER_INHERIT
0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
0: SEC_...
2003 Mar 06
1
ACL bug FIXes for get_nt_acl()
Two attached patches for samba 2.2.7a and 3.0-alfa22,
that I've made today, fix 3 bugs mentioned in my previous e-mail.
1) For each file in addition to ALLOW ACE
proper DENY ACE is created.
2) "Take ownership" is shown DENIED for all except root ACEs
3) Read Permissions and read attributes are always shown as allowed,
as they are actually allowed.
--
Zhitomirsky
2018 Nov 01
2
Internal DNS migrate to Bind9_DLZ
I've been been trying to investigate this for sometime now, hence I came to
the experts :)
I have rejoined all my DC's with new names, see below.
;; ANSWER SECTION:
<domain>.corp. 3600 IN NS psad101zatcrh.<domain>.corp. -> New
rebuild, new hostname, RHEL6 to RHEL7 upgrade
<domain>.corp. 3600 IN NS prdc001zafsrh.<domain>.corp. -> New
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
...ILE_READ | SEC_FILE_EXECUTE;
> + }
> + if (mode & S_IWGRP) {
> + /* note that delete is not granted - this matches posix behaviour */
> + access_mask |= SEC_RIGHTS_FILE_WRITE;
> + }
> + if (access_mask) {
> + init_sec_ace(&aces[idx],
> + &group_sid,
> + SEC_ACE_TYPE_ACCESS_ALLOWED,
> + access_mask,
> + 0);
> + idx++;
> + }
> +
> + access_mask = 0;
> + if (mode & S_IROTH) {
> + access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE;
> + }
> + if (mode & S_IWOTH) {
> + access_mask |= SEC_RIGHTS_FILE_WRITE;
> + }
> + if (a...
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:33:26PM +0200, Ralph Böhme via samba wrote:
> On Thu, Aug 25, 2016 at 12:14:00PM -0700, Jeremy Allison wrote:
> > On Wed, Aug 24, 2016 at 04:06:42PM +0200, Ralph Böhme via samba wrote:
> > >
> > > Yeah, as much as I'd like to avoid adding a new option, I guess we
> > > have to do something about it, my latest take on this is
>
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
...ILE_READ | SEC_FILE_EXECUTE;
> + }
> + if (mode & S_IWGRP) {
> + /* note that delete is not granted - this matches posix behaviour */
> + access_mask |= SEC_RIGHTS_FILE_WRITE;
> + }
> + if (access_mask) {
> + init_sec_ace(&aces[idx],
> + &group_sid,
> + SEC_ACE_TYPE_ACCESS_ALLOWED,
> + access_mask,
> + 0);
> + idx++;
> + }
> +
> + access_mask = 0;
> + if (mode & S_IROTH) {
> + access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE;
> + }
> + if (mode & S_IWOTH) {
> + access_mask |= SEC_RIGHTS_FILE_WRITE;
> + }
> + if (a...
2016 Aug 27
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 04:03:49PM -0700, Jeremy Allison wrote:
> On Fri, Aug 26, 2016 at 02:46:19PM -0700, Jeremy Allison via samba wrote:
> > On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote:
> > >
> > > Cheerio!
> > > -slow
> >
> > Still reviewing this - but a few things that will need changing:
> >
> > When adding the
2016 Jan 08
2
Security permissions issues after changing idmap backend from RID to AUTORID
...EVISION_NT4 (2)
> size : 0x017c (380)
> num_aces : 0x00000010 (16)
> aces: ARRAY(16)
> aces: struct security_ace
> type :
> SEC_ACE_TYPE_ACCESS_ALLOWED (0)
> flags : 0x03 (3)
> 1: SEC_ACE_FLAG_OBJECT_INHERIT
> 1: SEC_ACE_FLAG_CONTAINER_INHERIT
> 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
>...
2016 Jan 10
2
Security permissions issues after changing idmap backend from RID to AUTORID
...: 0x017c (380)
>>> num_aces : 0x00000010 (16)
>>> aces: ARRAY(16)
>>> aces: struct security_ace
>>> type :
>>> SEC_ACE_TYPE_ACCESS_ALLOWED (0)
>>> flags : 0x03 (3)
>>> 1: SEC_ACE_FLAG_OBJECT_INHERIT
>>> 1: SEC_ACE_FLAG_CONTAINER_INHERIT
>>> 0: SEC_ACE_...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...size : 0x017c (380)
>> num_aces : 0x00000010 (16)
>> aces: ARRAY(16)
>> aces: struct security_ace
>> type :
>> SEC_ACE_TYPE_ACCESS_ALLOWED (0)
>> flags : 0x03 (3)
>> 1: SEC_ACE_FLAG_OBJECT_INHERIT
>> 1: SEC_ACE_FLAG_CONTAINER_INHERIT
>> 0: SEC_ACE_FLAG_NO_PROPAGAT...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...: 0x017c (380)
> num_aces : 0x00000010 (16)
> aces: ARRAY(16)
> aces: struct security_ace
> type :
> SEC_ACE_TYPE_ACCESS_ALLOWED (0)
> flags : 0x03 (3)
> 1:
> SEC_ACE_FLAG_OBJECT_INHERIT
> 1:
> SEC_ACE_FLAG_CONTAINER_INHERIT
>...