search for: sec_ace_type_access_allowed

Displaying 15 results from an estimated 15 matches for "sec_ace_type_access_allowed".

2019 Apr 11
1
Online backup results using 4.10.2
...-1-5-21-940051827-2291820289-3341758437-512 group_sid: * group_sid: S-1-5-21-940051827-2291820289-3341758437-512 sacl: NULL dacl: * dacl: struct security_acl revision: SECURITY_ACL_REVISION_ADS (4) size: 0x00c4 (196) num_aces: 0x00000007 (7) aces: ARRAY(7) aces: struct security_ace type: SEC_ACE_TYPE_ACCESS_ALLOWED (0) flags: 0x03 (3) 1: SEC_ACE_FLAG_OBJECT_INHERIT 1: SEC_ACE_FLAG_CONTAINER_INHERIT 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0: SEC_ACE_FLAG_INHERIT_ONLY 0: SEC_ACE_FLAG_INHERITED_ACE 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS 0: SEC_ACE_FLAG_FAILED_ACCESS size: 0...
2023 Apr 11
1
clients not connecting to samba shares
...: SECURITY_ACL_REVISION_NT4 (2) > ???????????????size ????????????????????: 0x0098 (152) > ???????????????num_aces ????????????????: 0x00000006 (6) > ???????????????aces: ARRAY(6) > ???????????????????aces: struct security_ace > ???????????????????????type ????????????????????: > SEC_ACE_TYPE_ACCESS_ALLOWED (0) > ???????????????????????flags ???????????????????: 0x03 (3) > ??????????????????????????????1: SEC_ACE_FLAG_OBJECT_INHERIT > ??????????????????????????????1: SEC_ACE_FLAG_CONTAINER_INHERIT > ??????????????????????????????0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > ???????????????????...
2023 Apr 11
1
clients not connecting to samba shares
On 11/04/2023 13:36, Gary Dale via samba wrote: > On 2023-04-11 04:15, Rowland Penny via samba wrote: >> >> >> What 'Debian distribution-specific' installation did you follow ? > The one linked to in AD DC wiki. Where abouts is this link ? I checked here: https://wiki.samba.org/index.php/Setting_up_Samba_as_an_Active_Directory_Domain_Controller But couldn't
2010 May 28
1
samba 3.5.3: loads of errors copying some simple ACLs with robocopy
Maybe I'm doing somthing really stupid, but while copying some windows share onto a samba server, on some random subdirectory robocopy says ERROR 87 (0x00000057) Copying NTFS Security to Destination Directory... The samba logfile has lots of these lines. modules/vfs_posixacl.c:349(smb_acl_to_posix) smb_acl_to_posix: ACL is invalid for set (Das Argument ist ung?ltig) The strange thing is
2018 Nov 01
1
Internal DNS migrate to Bind9_DLZ
...vision : SECURITY_ACL_REVISION_ADS (4) size : 0x0504 (1284) num_aces : 0x0000001b (27) aces: ARRAY(27) aces: struct security_ace type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) flags : 0x00 (0) 0: SEC_ACE_FLAG_OBJECT_INHERIT 0: SEC_ACE_FLAG_CONTAINER_INHERIT 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0: SEC_AC...
2003 Mar 06
1
ACL bug FIXes for get_nt_acl()
Two attached patches for samba 2.2.7a and 3.0-alfa22, that I've made today, fix 3 bugs mentioned in my previous e-mail. 1) For each file in addition to ALLOW ACE proper DENY ACE is created. 2) "Take ownership" is shown DENIED for all except root ACEs 3) Read Permissions and read attributes are always shown as allowed, as they are actually allowed. -- Zhitomirsky
2018 Nov 01
2
Internal DNS migrate to Bind9_DLZ
I've been been trying to investigate this for sometime now, hence I came to the experts :) I have rejoined all my DC's with new names, see below. ;; ANSWER SECTION: <domain>.corp. 3600 IN NS psad101zatcrh.<domain>.corp. -> New rebuild, new hostname, RHEL6 to RHEL7 upgrade <domain>.corp. 3600 IN NS prdc001zafsrh.<domain>.corp. -> New
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
...ILE_READ | SEC_FILE_EXECUTE; > + } > + if (mode & S_IWGRP) { > + /* note that delete is not granted - this matches posix behaviour */ > + access_mask |= SEC_RIGHTS_FILE_WRITE; > + } > + if (access_mask) { > + init_sec_ace(&aces[idx], > + &group_sid, > + SEC_ACE_TYPE_ACCESS_ALLOWED, > + access_mask, > + 0); > + idx++; > + } > + > + access_mask = 0; > + if (mode & S_IROTH) { > + access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE; > + } > + if (mode & S_IWOTH) { > + access_mask |= SEC_RIGHTS_FILE_WRITE; > + } > + if (acc...
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:33:26PM +0200, Ralph Böhme via samba wrote: > On Thu, Aug 25, 2016 at 12:14:00PM -0700, Jeremy Allison wrote: > > On Wed, Aug 24, 2016 at 04:06:42PM +0200, Ralph Böhme via samba wrote: > > > > > > Yeah, as much as I'd like to avoid adding a new option, I guess we > > > have to do something about it, my latest take on this is >
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
...ILE_READ | SEC_FILE_EXECUTE; > + } > + if (mode & S_IWGRP) { > + /* note that delete is not granted - this matches posix behaviour */ > + access_mask |= SEC_RIGHTS_FILE_WRITE; > + } > + if (access_mask) { > + init_sec_ace(&aces[idx], > + &group_sid, > + SEC_ACE_TYPE_ACCESS_ALLOWED, > + access_mask, > + 0); > + idx++; > + } > + > + access_mask = 0; > + if (mode & S_IROTH) { > + access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE; > + } > + if (mode & S_IWOTH) { > + access_mask |= SEC_RIGHTS_FILE_WRITE; > + } > + if (acc...
2016 Aug 27
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 04:03:49PM -0700, Jeremy Allison wrote: > On Fri, Aug 26, 2016 at 02:46:19PM -0700, Jeremy Allison via samba wrote: > > On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote: > > > > > > Cheerio! > > > -slow > > > > Still reviewing this - but a few things that will need changing: > > > > When adding the
2016 Jan 08
2
Security permissions issues after changing idmap backend from RID to AUTORID
...EVISION_NT4 (2) > size : 0x017c (380) > num_aces : 0x00000010 (16) > aces: ARRAY(16) > aces: struct security_ace > type : > SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT >...
2016 Jan 10
2
Security permissions issues after changing idmap backend from RID to AUTORID
...: 0x017c (380) >>> num_aces : 0x00000010 (16) >>> aces: ARRAY(16) >>> aces: struct security_ace >>> type : >>> SEC_ACE_TYPE_ACCESS_ALLOWED (0) >>> flags : 0x03 (3) >>> 1: SEC_ACE_FLAG_OBJECT_INHERIT >>> 1: SEC_ACE_FLAG_CONTAINER_INHERIT >>> 0: SEC_ACE_FL...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...size : 0x017c (380) >> num_aces : 0x00000010 (16) >> aces: ARRAY(16) >> aces: struct security_ace >> type : >> SEC_ACE_TYPE_ACCESS_ALLOWED (0) >> flags : 0x03 (3) >> 1: SEC_ACE_FLAG_OBJECT_INHERIT >> 1: SEC_ACE_FLAG_CONTAINER_INHERIT >> 0: SEC_ACE_FLAG_NO_PROPAGATE_...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...: 0x017c (380) > num_aces : 0x00000010 (16) > aces: ARRAY(16) > aces: struct security_ace > type : > SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: > SEC_ACE_FLAG_OBJECT_INHERIT > 1: > SEC_ACE_FLAG_CONTAINER_INHERIT >...