~lefteris-nikoltsios/+junk/samba-lp1016895

« back to all changes in this revision

Viewing changes to libcli/security/session.c

  • Committer: Package Import Robot
  • Author(s): Chuck Short
  • Date: 2011-12-21 13:18:04 UTC
  • mfrom: (0.39.21 sid)
  • Revision ID: package-import@ubuntu.com-20111221131804-xtlr39wx6njehxxr
Tags: 2:3.6.1-3ubuntu1
* Merge from Debian testing.  Remaining changes:
  + debian/patches/VERSION.patch:
    - set SAMBA_VERSION_SUFFIX to Ubuntu.
  + debian/patches/error-trans.fix-276472:
    - Add the translation of Unix Error code -ENOTSUP to NT Error Code
    - NT_STATUS_NOT_SUPPORTED to prevent the Permission denied error.
  + debian/smb.conf:
    - add "(Samba, Ubuntu)" to server string.
    - comment out the default [homes] share, and add a comment about
      "valid users = %S" to show users how to restrict access to
      \\server\username to only username.
    - Set 'usershare allow guests', so that usershare admins are 
      allowed to create public shares in addition to authenticated
      ones.
    - add map to guest = Bad user, maps bad username to guest access.
  + debian/samba-common.config:
    - Do not change priority to high if dhclient3 is installed.
    - Use priority medium instead of high for the workgroup question.
  + debian/control:
    - Don't build against or suggest ctdb.
    - Add dependency on samba-common-bin to samba.
  + Add ufw integration:
    - Created debian/samba.ufw.profile
    - debian/rules, debian/samba.dirs, debian/samba.files: install
      profile
    - debian/control: have samba suggest ufw
  + Add apport hook:
    - Created debian/source_samba.py.
    - debian/rules, debian/samba.dirs, debian/samba-common-bin.files: install
  + Switch to upstart:
    - Add debian/samba.{nmbd,smbd}.upstart.
  + debian/samba.logrotate, debian/samba-common.dhcp, debian/samba.if-up:
    - Make them upstart compatible
  + debian/samba.postinst: 
    - Avoid scary pdbedit warnings on first import.
  + debian/samba-common.postinst: Add more informative error message for
    the case where smb.conf was manually deleted
  + debian/patches/fix-debuglevel-name-conflict.patch: don't use 'debug_level'
    as a global variable name in an NSS module 
  + Dropped:
    - debian/patches/error-trans.fix-276472
    - debian/patches/fix-debuglevel-name-conflict.patch

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
/*
 
2
   Unix SMB/CIFS implementation.
 
3
 
 
4
   session_info utility functions
 
5
 
 
6
   Copyright (C) Andrew Bartlett 2008-2010
 
7
 
 
8
   This program is free software; you can redistribute it and/or modify
 
9
   it under the terms of the GNU General Public License as published by
 
10
   the Free Software Foundation; either version 3 of the License, or
 
11
   (at your option) any later version.
 
12
 
 
13
   This program is distributed in the hope that it will be useful,
 
14
   but WITHOUT ANY WARRANTY; without even the implied warranty of
 
15
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
16
   GNU General Public License for more details.
 
17
 
 
18
   You should have received a copy of the GNU General Public License
 
19
   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
20
*/
 
21
 
 
22
#include "includes.h"
 
23
#include "libcli/security/security.h"
 
24
#include "librpc/gen_ndr/auth.h"
 
25
 
 
26
enum security_user_level security_session_user_level(struct auth_session_info *session_info,
 
27
                                                     const struct dom_sid *domain_sid)
 
28
{
 
29
        if (!session_info) {
 
30
                return SECURITY_ANONYMOUS;
 
31
        }
 
32
 
 
33
        if (security_token_is_system(session_info->security_token)) {
 
34
                return SECURITY_SYSTEM;
 
35
        }
 
36
 
 
37
        if (security_token_is_anonymous(session_info->security_token)) {
 
38
                return SECURITY_ANONYMOUS;
 
39
        }
 
40
 
 
41
        if (security_token_has_builtin_administrators(session_info->security_token)) {
 
42
                return SECURITY_ADMINISTRATOR;
 
43
        }
 
44
 
 
45
        if (domain_sid) {
 
46
                struct dom_sid *rodc_dcs;
 
47
                rodc_dcs = dom_sid_add_rid(session_info, domain_sid, DOMAIN_RID_READONLY_DCS);
 
48
                if (security_token_has_sid(session_info->security_token, rodc_dcs)) {
 
49
                        talloc_free(rodc_dcs);
 
50
                        return SECURITY_RO_DOMAIN_CONTROLLER;
 
51
                }
 
52
                talloc_free(rodc_dcs);
 
53
        }
 
54
 
 
55
        if (security_token_has_enterprise_dcs(session_info->security_token)) {
 
56
                return SECURITY_DOMAIN_CONTROLLER;
 
57
        }
 
58
 
 
59
        if (security_token_has_nt_authenticated_users(session_info->security_token)) {
 
60
                return SECURITY_USER;
 
61
        }
 
62
 
 
63
        return SECURITY_ANONYMOUS;
 
64
}