Bug 8819 - smbd/open.c:inherit_new_acl will refuse to set Owner and Group Owner
Summary: smbd/open.c:inherit_new_acl will refuse to set Owner and Group Owner
Status: NEW
Alias: None
Product: Samba 3.6
Classification: Unclassified
Component: File services (show other bugs)
Version: unspecified
Hardware: All All
: P5 normal
Target Milestone: ---
Assignee: Volker Lendecke
QA Contact: Samba QA Contact
Depends on:
Reported: 2012-03-19 23:47 UTC by Richard Sharpe
Modified: 2012-03-20 16:53 UTC (History)
0 users

See Also:


Note You need to log in before you can comment on or make changes to this bug.
Description Richard Sharpe 2012-03-19 23:47:16 UTC
The above file contains this code:

        bool inherit_owner = lp_inherit_owner(SNUM(fsp->conn));
        bool inheritable_components = false;
        size_t size = 0;

        if (!parent_dirname(ctx, fsp->fsp_name->base_name, &parent_name, NULL)) {
                return NT_STATUS_NO_MEMORY;

        status = SMB_VFS_GET_NT_ACL(fsp->conn,
                                (SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL),
        if (!NT_STATUS_IS_OK(status)) {
                return status;

        inheritable_components = sd_has_inheritable_components(parent_desc,

        if (!inheritable_components && !inherit_owner) {
                /* Nothing to inherit and not setting owner. */
                return NT_STATUS_OK;

However, if the parent directory does not contain any inheritable entries, which a user can do, and the admin has not set inherit owner, then the file ends up without an owner or group SID.

I believe that in that case, Windows would at least set the owner SID and the group SID in the SD.
Comment 1 Richard Sharpe 2012-03-19 23:56:03 UTC
I have actually verified that thos problem exists, at least with the Samba 3.5.12 code in modules/acl_xattr_common.c, but the responsible code has migrated into smbd/open.c

It is interesting that W2K03, at least, seems to create ACEs for the CREATOR and the GROUP that gives them Full Control. (Even though there are no inheritable ACEs on the parent.)
Comment 2 Richard Sharpe 2012-03-20 16:19:21 UTC
Here is what Windows 2K03 does in that case:

    GROUP:TESTAD\Domain Users

Here is what the SD looks like on the parent:

    GROUP:TESTAD\Domain Admins
Comment 3 Richard Sharpe 2012-03-20 16:32:58 UTC
There is an additional interesting thing to note here.

A user loged in as DOM\Administrator (or MACHINE\Administrator) has the following token (extracted using the Windows debugger):

1: kd> !token
Thread is not impersonating. Using process token...
_EPROCESS fffffadfce265040, _ETHREAD fffffadfce02d040, _TOKEN fffffa80001cb060
TS Session ID: 0
User: S-1-5-21-3518369957-2465764196-3682812194-500
 00 S-1-5-21-3518369957-2465764196-3682812194-512
    Attributes - Mandatory Default Enabled
 01 S-1-1-0
    Attributes - Mandatory Default Enabled
 02 S-1-5-32-544
    Attributes - Mandatory Default Enabled Owner
 03 S-1-5-32-545
    Attributes - Mandatory Default Enabled
 04 S-1-5-4
    Attributes - Mandatory Default Enabled
 05 S-1-5-11
    Attributes - Mandatory Default Enabled
 06 S-1-5-15
    Attributes - Mandatory Default Enabled
 07 S-1-5-5-0-808621
    Attributes - Mandatory Default Enabled LogonId
 08 S-1-2-0
    Attributes - Mandatory Default Enabled
 09 S-1-5-21-3518369957-2465764196-3682812194-513
    Attributes - Mandatory Default Enabled
 10 S-1-5-21-3518369957-2465764196-3682812194-520
    Attributes - Mandatory Default Enabled
 11 S-1-5-21-3518369957-2465764196-3682812194-1103
    Attributes - Mandatory Default Enabled
 12 S-1-5-21-3518369957-2465764196-3682812194-519
    Attributes - Mandatory Default Enabled
 13 S-1-5-21-3518369957-2465764196-3682812194-518
    Attributes - Mandatory Default Enabled
 14 S-1-5-21-3518369957-2465764196-3682812194-572
    Attributes - Mandatory Default Enabled GroupResource
Primary Group: S-1-5-21-3518369957-2465764196-3682812194-512

However, files created by this user are marked as being owned by S-1-5-32-544 (ie, BUILTIN\Administrators), which is not the user SID of the process.

I don't currently understand the logic Windows uses here, although maybe it ises the SID of the parent directory if the user has that SID in its token.
Comment 4 Richard Sharpe 2012-03-20 16:34:20 UTC
Aha, there's the answer:

 02 S-1-5-32-544
    Attributes - Mandatory Default Enabled Owner

Note also, that MACHINE\Administrator would likely have a different set of SIDs in its token.
Comment 5 Richard Sharpe 2012-03-20 16:43:28 UTC
More info here:

Comment 6 Richard Sharpe 2012-03-20 16:53:31 UTC
And this contains more info:


Looks like I actually need to dump the token owner info to make the conclusion I did above.