similar to: permission denied with windows acls

Displaying 20 results from an estimated 2000 matches similar to: "permission denied with windows acls"

2024 Jan 26
2
permission denied with windows acls
On Thu, 25 Jan 2024 18:45:52 -0800 Peter Carlson via samba <samba at lists.samba.org> wrote: > I am getting a permission denied when trying to ls as a domain user a > samba mount with windows ACLs (sigh I thought I had this figured > out). I tried to include self descriptive server names and include > them in the info below (fs1: file server, nc: addc, u2gui: ubuntu >
2022 Nov 25
1
samba-gpupdate nsswitch error
brief: gpupdate when run during login, fails with unable to get SID token. The same command run interactively runs with no issues. The SID is for the user (Peter) and the user can login over ssh. I can repost all the logs and configs here if needed. samba built from git master branch using bootstrap configure flags. tested both with built in heimdal and mit krb. after a bunch of testing with
2024 Jan 26
1
permission denied with windows acls
On 1/26/24 02:35, Rowland Penny via samba wrote: > On Thu, 25 Jan 2024 18:45:52 -0800 Peter Carlson via samba > <samba at lists.samba.org> wrote: >> The share mounts and I am a member of the correct groups >> CARLSON\peter at u2gui:~$ cat /etc/fstab //fs.carlson.lab/test /mnt/test >> cifs credentials=/root/smbcreds,multiuser,sec=ntlmssp,_netdev 0 0 > I think
2024 Jan 26
1
permission denied with windows acls
On 1/26/24 09:34, Peter Carlson via samba wrote: > > On 1/26/24 02:35, Rowland Penny via samba wrote: >> On Thu, 25 Jan 2024 18:45:52 -0800 Peter Carlson via samba >> <samba at lists.samba.org> wrote: >>> The share mounts and I am a member of the correct groups >>> CARLSON\peter at u2gui:~$ cat /etc/fstab //fs.carlson.lab/test >>> /mnt/test
2024 Jan 31
1
Behavior of acl_xattr:ignore system acls = yes on a share
On 1/31/24 11:19, Rowland Penny via samba wrote: > When I logged into Windows and connected to a share that has > 'acl_xattr:ignore system acls = yes' set and right clicked on its icon > in Explorer and selected 'Properties', I found that 'EVERYONE' was > listed. I removed 'EVERYONE', clicked 'Apply' then 'OK', which > completed
2024 Jan 31
1
Behavior of acl_xattr:ignore system acls = yes on a share
On Wed, 31 Jan 2024 10:09:53 +0100 Ralph Boehme via samba <samba at lists.samba.org> wrote: > On 1/31/24 09:50, Peter Milesson via samba wrote: > > The crucial problem here is, that Everyone (yes, really everyone) > > can write to the root share. > > why don't you just change it? That's how it's supposed to work. > > -slow > It might be
2024 Jan 31
2
Behavior of acl_xattr:ignore system acls = yes on a share
On Wed, 31 Jan 2024 11:53:44 +0100 Ralph Boehme <slow at samba.org> wrote: > On 1/31/24 11:19, Rowland Penny via samba wrote: > > When I logged into Windows and connected to a share that has > > 'acl_xattr:ignore system acls = yes' set and right clicked on its > > icon in Explorer and selected 'Properties', I found that 'EVERYONE' > > was
2017 Mar 21
3
Problem sysvolreset
Hai,   Here you go my output of the R2008R2. (64bit)   1) original GPO from the install ( the domain controller policy ) Path   : Microsoft.PowerShell.Core\FileSystem::C:\Windows\SYSVOL\domain\Policies\{6AC1786C-016F-11D2-945F-00C04fB984F9} Owner  : BUILTIN\Administrators Group  : NT AUTHORITY\SYSTEM Access : CREATOR OWNER Allow  268435456          NT AUTHORITY\Authenticated Users
2024 May 16
1
Security descriptors options of Group Policies
Hi Samba List, hope you're doing well all. We have realized a security audit of our Samba4 Active Directory. It returns that the security descriptors options of all our GPO objects are wrong. They should be : SE_DACL_AUTO_INHERITED SE_DACL_PRESENT instead of this, the options are by default : SE_DACL_PROTECTED SE_DACL_PRESENT We can change the options, but the "sysvolreset"
2024 Jan 31
2
Behavior of acl_xattr:ignore system acls = yes on a share
On 1/31/24 09:50, Peter Milesson via samba wrote: > The crucial problem here is, that Everyone (yes, really everyone) can > write to the root share. why don't you just change it? That's how it's supposed to work. -slow -- SerNet Samba Team Lead https://samba.plus/ Samba Team Member https://samba.org/ SAMBA+ packages https://samba.plus/ SerNet
2023 Mar 28
1
windows acls
On 28/03/2023 19:47, Peter Carlson via samba wrote: > > On 3/28/23 11:22, Rowland Penny via samba wrote: >> >> >> On 28/03/2023 18:43, Peter Carlson via samba wrote: >>> bumping the log to 5, there are a few more lines right before >>> NT_STATUS_ACCESS_DENIED, could the EA error be a clue? >> >> I do not think so, that is what you are trying
2017 Sep 05
1
BUILTIN\Administrators - failed to call wbcSidToUid: WBC_ERR_DOMAIN_NOT_FOUND
Well, we are getting somewere...;) >It is probably 'greyed' out because no Windows tools use it or will add it. You will probably need to use Unix tools (ldb or ldap) to remove>them, but you can if you so wish ignore them. What you should never do is to rely on them being there, because they may or may not be there.Ok, I'll let it be there> You need to remove the gidNumber
2024 Jan 30
1
permission denied with windows acls
On 1/29/24 13:08, Rowland Penny via samba wrote: > On Mon, 29 Jan 2024 12:51:37 -0800 > Peter Carlson via samba<samba at lists.samba.org> wrote: > > >> Just did a quick test, the big T comes after setting permissions in >> windows >> >> root at fs1:/var/log# cd /data >> root at fs1:/data# mkdir -m 1777 test2 > No it doesn't, you are setting
2024 Jan 30
1
permission denied with windows acls
On Mon, 29 Jan 2024 16:42:20 -0800 Peter Carlson via samba <samba at lists.samba.org> wrote: > > On 1/29/24 13:08, Rowland Penny via samba wrote: > > On Mon, 29 Jan 2024 12:51:37 -0800 > > Peter Carlson via samba<samba at lists.samba.org> wrote: > > > > > >> Just did a quick test, the big T comes after setting permissions in > >>
2018 Jan 26
6
Adding Share Windows ACL
Hello, im trying to setup a share using windows acls. I followed the step ins https://wiki.samba.org/index.php/Setting_up_a_Share_Using_Windows_ACLs but hanging at "Adding a Share" # mkdir -p /srv/samba/Demo/ # chown root:"Domain Admins" /srv/samba/Demo/ *--> chown: ungültige Gruppe: »root:Domain Admins“* # net rpc rights list privileges SeDiskOperatorPrivilege -U
2020 Jul 01
4
Users, home directories and profiles
> root at localhost:~# getfacl /home/samba/users/ > getfacl: Removing leading '/' from absolute path names > # file: home/samba/users/ > # owner: root > # group: root > user::rwx > group::rwx > other::rwx > root at localhost:~# samba-tool ntacl get /home/samba/users --as-sddl >
2020 Jul 01
3
Users, home directories and profiles
On 01/07/2020 09:03, Enrico Morelli wrote: > On Wed, 1 Jul 2020 08:43:37 +0100 > Rowland penny via samba <samba at lists.samba.org> wrote: > >> On 01/07/2020 08:36, Enrico Morelli via samba wrote: >>> On Tue, 30 Jun 2020 10:28:41 -0700 >>> Jeremy Allison via samba <samba at lists.samba.org> wrote: >>> >>>> On Tue, Jun 30, 2020 at
2016 Jul 24
3
Samba 4.2.14 GPO issue
Dear All, I've recently upgrade from samba 4.1.x to samba 4.2.14 and found that GPO are having issue Specifically when I'm adding new using they *never *got the gpupdate success fully. When I run samba-tool ntacl sysvolcheck or samba-tool ntacl sysvolreset But don't seem to got it fix.. Any suggestion? Thank in advance. #samba-tool ntacl sysvolcheck Processing section
2019 Aug 27
3
Permissions at the top of a Samba share
Am 2019-08-26 um 16:35 schrieb Rowland penny via samba: > On 26/08/2019 15:20, ? Peter Rindfuss via samba wrote: >> Hi, >> >> I have a question regarding permissions at the top of a share as seen >> from a Windows 10 client. >> >> We are using Samba 4.10.6-Debian (van Belle) on Debian 10 (Buster) with >> one AD controller and one file server. >>
2020 Jul 01
3
Users, home directories and profiles
On 01.07.2020 13:35, Rowland penny via samba wrote: > On 01/07/2020 12:15, Robi. T. Wagner via samba wrote: >>> root at localhost:~# getfacl /home/samba/users/ >>> getfacl: Removing leading '/' from absolute path names >>> # file: home/samba/users/ >>> # owner: root >>> # group: root >>> user::rwx >>> group::rwx >>>