delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2024/11/19/03:59:30

DMARC-Filter: OpenDMARC Filter v1.4.2 delorie.com 4AJ8xTRb3039069
Authentication-Results: delorie.com; dmarc=pass (p=none dis=none) header.from=cygwin.com
Authentication-Results: delorie.com; spf=pass smtp.mailfrom=cygwin.com
DKIM-Filter: OpenDKIM Filter v2.11.0 delorie.com 4AJ8xTRb3039069
Authentication-Results: delorie.com;
dkim=pass (1024-bit key, unprotected) header.d=cygwin.com header.i=@cygwin.com header.a=rsa-sha256 header.s=default header.b=TZLda01N
X-Recipient: archive-cygwin AT delorie DOT com
DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org F105C3858D35
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cygwin.com;
s=default; t=1732006768;
bh=ytzW/UEOaz3fStYXvWZGWmW+yzGBdRoOV4USCcu5LgQ=;
h=Date:To:Subject:In-Reply-To:References:List-Id:List-Unsubscribe:
List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To:
From;
b=TZLda01NRpHIy2oC/ofYeYICNCiAjm4FdMQgHOi1FmEZKp+BeVgIP/2uEDJvx7ENt
afStE/oKLNbfOfvvArTVD9voBHjR9yZP1k+5/jLjrtDZnCa4iWHJkA135jAO10Azm0
7X6t3kjSzheMvzflTwtIwTPf1pQexiBVDqKn/Pck=
X-Original-To: cygwin AT cygwin DOT com
Delivered-To: cygwin AT cygwin DOT com
DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 0BA503858C31
ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 0BA503858C31
ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1732006689; cv=none;
b=oxKCz5iSCYtr1Q0MXi0LqQD2gY9+7MSPswoNOlhwRrabHEo876jMTxW9CLo03BeqZGDyyt2If9mUjaDItbfbQbEzZ1ZDQU0ClY0Bu0IKVQLfw7L0MIWILwuLW01Mautyz4Pmtpdkaqs0JGbISryOKL6XsuZnl7aOyEChw1AQzdE=
ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key;
t=1732006689; c=relaxed/simple;
bh=W59VFbwiGYTEZz8c1yRuJ2Zn/lbZBCvzWBCOC75xWLw=;
h=Date:From:To:Subject:Message-Id:Mime-Version:DKIM-Signature;
b=ozGvXyxlHwCjmAUhUcG5UMaYF9a5hR2x3b3Ul1lkcPq7UomZUNUqCRZb05dQnyVkSETdHxzVfq6aeP6o7TAhT2WWJScXMueqszNTdAzRY/oYEZzNN/3ff23wKXDaAcyOf5ios7pjctjU95TPbdLlQ4fNbsBzfm5czXFhodFJzMo=
ARC-Authentication-Results: i=1; server2.sourceware.org
DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 0BA503858C31
Date: Tue, 19 Nov 2024 17:58:06 +0900
To: cygwin AT cygwin DOT com
Subject: Re: SMBFS mount's file cannot be made executable
Message-Id: <20241119175806.321cdb7e65a727a2eb58c8a6@nifty.ne.jp>
In-Reply-To: <ZztqpBESgcTXcd3d@calimero.vinschen.de>
References: <ZzIIO2NxmdYpox2A AT calimero DOT vinschen DOT de>
<20241112042937 DOT 740185a42d476993b4b1e31c AT nifty DOT ne DOT jp>
<20241112175427 DOT 750ae77a8086594a765862c5 AT nifty DOT ne DOT jp>
<ZzNCXz3o9k40U9zA AT calimero DOT vinschen DOT de>
<20241113181755 DOT 02289e8e8d9af7e19e8f4387 AT nifty DOT ne DOT jp>
<CANV9t=SvYedzG-LmECwdT7kjipOyhgwsZ1yucnTm8mWMnNkJVw AT mail DOT gmail DOT com>
<20241114003740 DOT e573d7ec79d35da76225c9f1 AT nifty DOT ne DOT jp>
<CANV9t=TLh8xD7KBsF-MucZWNjP-L0KE04xUv2-2e=Z5fXTjk=w AT mail DOT gmail DOT com>
<20241114010807 DOT 99f46760b2240d472440c329 AT nifty DOT ne DOT jp>
<20241116002122 DOT 3f4fd325a497eb4261ad80f4 AT nifty DOT ne DOT jp>
<ZztqpBESgcTXcd3d AT calimero DOT vinschen DOT de>
X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.30; i686-pc-mingw32)
Mime-Version: 1.0
X-BeenThere: cygwin AT cygwin DOT com
X-Mailman-Version: 2.1.30
List-Id: General Cygwin discussions and problem reports <cygwin.cygwin.com>
List-Unsubscribe: <https://cygwin.com/mailman/options/cygwin>,
<mailto:cygwin-request AT cygwin DOT com?subject=unsubscribe>
List-Archive: <https://cygwin.com/pipermail/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-request AT cygwin DOT com?subject=help>
List-Subscribe: <https://cygwin.com/mailman/listinfo/cygwin>,
<mailto:cygwin-request AT cygwin DOT com?subject=subscribe>
From: Takashi Yano via Cygwin <cygwin AT cygwin DOT com>
Reply-To: Takashi Yano <takashi DOT yano AT nifty DOT ne DOT jp>
Errors-To: cygwin-bounces~archive-cygwin=delorie DOT com AT cygwin DOT com
Sender: "Cygwin" <cygwin-bounces~archive-cygwin=delorie DOT com AT cygwin DOT com>

This is a multi-part message in MIME format.

--Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

On Mon, 18 Nov 2024 17:26:12 +0100
Corinna Vinschen wrote:
> On Nov 16 00:21, Takashi Yano via Cygwin wrote:
> > I built a test program, whose important part is:
> > 
> >   AUTHZ_RESOURCE_MANAGER_HANDLE hManager = NULL;
> >   AUTHZ_CLIENT_CONTEXT_HANDLE hClient = NULL;
> >   AUTHZ_ACCESS_REQUEST AccessRequest = {0};
> >   AUTHZ_ACCESS_REPLY AccessReply = {0};
> > 
> >   AUTHZ_RPC_INIT_INFO_CLIENT authzRpcInitInfoClient = {0};
> > 
> >   WCHAR ObjectUuid[] = L"9a81c2bd-a525-471d-a4ed-49907c0b23da";
> >   WCHAR ProtSeq[] = L"ncacn_ip_tcp";
> >   WCHAR NetworkAddr[] = L"localhost";
> >   WCHAR Endpoint[] = L"135";
> > 
> >   authzRpcInitInfoClient.version = AUTHZ_INIT_INFO_VERSION_V1;
> >   authzRpcInitInfoClient.ObjectUuid = ObjectUuid;
> >   authzRpcInitInfoClient.ProtSeq = ProtSeq;
> >   authzRpcInitInfoClient.NetworkAddr = NetworkAddr;
> >   authzRpcInitInfoClient.Endpoint = Endpoint;
> > 
> >   AuthzInitializeRemoteResourceManager (&authzRpcInitInfoClient, &hManager);
> > 
> >   char buf[1024];
> >   PTOKEN_USER pTokenUser = (PTOKEN_USER) buf;
> >   DWORD len;
> > 
> >   GetTokenInformation(hToken, TokenUser, pTokenUser, 1024, &len);
> > 
> >   LUID luid = {0,};
> >   AuthzInitializeContextFromSid(0, pTokenUser->User.Sid, hManager,
> >                                 NULL, luid, NULL, &hClient);
> > 
> > 
> > This test code fails at AuthzInitializeContextFromSid() with
> > RPC_S_UNKNOWN_IF. If AuthzInitializeRemoteResourceManager()
> > is replaced with AuthzInitializeResourceManager(), the error
> > does not occur.
> > 
> > I searched the combination of AuthzInitializeContextFromSid()
> > and RPC_S_UNKNOWN_IF, however nothing was found.
> 
> RPC_S_UNKNOWN_IF means "unknown interface".  I assume this error has
> nothing to do with AuthzInitializeContextFromSid(), but with the
> AuthzInitializeRemoteResourceManager() call.
> 
> What I failed, though, is to find a working example for
> AuthzInitializeRemoteResourceManager().
> 
> > Any suggestion would be appreciated.
> 
> As I said in my previous posting, maybe we don't really need
> AuthzInitializeRemoteResourceManager().
> 
> We can safely assume that the current user is already authorized on the
> SMB server.  So... shouldn't AuthzInitializeResourceManager be
> sufficient and the code from class authz_ctx already does what we want?
> We may just have to use in in place of calling NtCheckAccess(),
> maybe with a tweak or two...

I already tried AuthzInitializeResourceManager(), but the result
was the same with current implementation...

BTW, I come up with another implementation. This make the things
much simpler. What do you think of the patch attached?

-- 
Takashi Yano <takashi DOT yano AT nifty DOT ne DOT jp>

--Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke
Content-Type: text/plain;
 name="smb.patch"
Content-Disposition: attachment;
 filename="smb.patch"
Content-Transfer-Encoding: base64
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--Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline


-- 
Problem reports:      https://cygwin.com/problems.html
FAQ:                  https://cygwin.com/faq/
Documentation:        https://cygwin.com/docs.html
Unsubscribe info:     https://cygwin.com/ml/#unsubscribe-simple

--Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke--

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019