TrustedBSD Supports Windows NT ACLs With Samba 82
Date: Tue, 24 Apr 2001 19:17:52 -0400
From: Chris Faulhaber <jedgar@fxp.org>
To: trustedbsd-discuss@TrustedBSD.org
Subject: Native ACL support for Samba
With the release of Samba 2.2.0, samba offers ACL support to remote clients. I just committed the changes to the FreeBSD CVS tree required to allow Samba to access the FreeBSD ACLs. With an updated -current system and samba-devel port (define WITH_ACL_SUPPORT), Windows NT 4.0 and 2000 clients can now remotely manipulate ACLs. Testing and comments are appreciated.
In addition, the ACL utilities, getfacl and setfacl, have been updated to fully make use of the ACL editing library. They should compile on most ACL-enabled systems (tested on Linux + ACL patches) with little or no change."
Re:Mirror of screen shot available (Score:2)
Alex Bischoff
---
Re:Can we really trust BSD? (Score:2)
I don't even know what he's talking about with the anti-american stuff.
+1 Insightful
Metamod to the rescue!
Down that path lies madness. On the other hand, the road to hell is paved with melting snowballs.
Re:Windows version? (Score:1)
Re:Is it really good? (Score:1)
I'd like to see even more options ala VMS or Novell, with read, write, execute, delete, modify, etc.. As an add-on of course, though an open-standard add-on (which is a big problem with ACLs: they're not standard yet
Your Working Boy,
- Otis (GAIM: OtisWild)
ACLs on Linux? (Score:3)
Is this a first for TrustedBSD, or can you get the same ACL support with Solaris, Linux or other 'nixes?
Re:Can we really trust BSD? (Score:1)
Matt
Re:It's like chocolate and peanut butter (Score:1)
ACLs in NT (Score:1)
They are a pain to manage.
Re:Just what the doctor ordered... (Score:3)
Of course the NetApp solution gives full NT ACL semantics, whereas the Samba solution doesn't, but I think the Samba solution gives better UNIX/NT integration.
Also I don't know any NT admins who understand the full NT ACL semantics
Cheers,
Jeremy Allison,
Samba Team.
Re:Is it really good? (Score:3)
Correct, admins use them, and when done properly, the users never know differently. Users still have uses for ACL's too, and it's really this simple, a question I got at least once a week when doing support for Sun: how to share some files of yours with a co-worker so he can read them but not change them, and with another co-worker that can read and write them (or some other combination of accesses). Answer: set up an ACL (no, we do not create groups every time there's a request for this kind of sharing). Thankfully dtfm could do one thing right, and that was manage ACL's with slightly less pain than manually using setfacl.
--
Re:Is it really good? (Score:1)
My totally uninformed and madly speculative opinion is that it's like the POSIX layer in Windows NT - no one ever uses it, but it was added to achieve sufficient buzzword compliancy and allow sales to organizations which required support for that particular standard even if they didn't use it. I'm not saying that was the sole motivation behind this development, but it didn't hurt :)
Re:Windows version? (Score:2)
--
Me too (Score:1)
Re:Just what the doctor ordered... (Score:1)
Re:Just what the doctor ordered... (Score:1)
Samba has offered working as a PDC and offering Login-into-domain functionality (tested by me on Win95 / Win98 boxes) for ages. This is what defines what Unix user you create files as on the Samba share etc. and accordingly your permissions.
TrustedBSD, not Linux.. Linux has no ACLs! (Score:2)
Q10 When will Posix ACLs be part of the kernel?
There are multiple steps to getting ACLs into the kernel. The first step, which we are heavily debating on the mailing lists right now, is how to design the system call interface for extended attributes and ACLs. The next step will be to include the extended attribute code into the kernel, or create even better extended attribute code for that purpose. Then, on top of that, we can include ACLs for the ext2 and ext3 filesystems. Other filesystems such as XFS be able to support ACLs directly, without needing extended attributes.
Image not available (Score:1)
Re:Windows version? (Score:1)
Re:Just what the doctor ordered... (Score:1)
Re:Can we really trust BSD? (Score:1)
Maybe they are simply america-independant people, don't you think so ?
Maybe you would think that they are pro-communist people, because you would like to (even if it's a non-sense to categorize people just by their political group).
Maybe the truth is that they don't care at all about such consideration... maybe they just want to develop their OS, with people motivated to participate, regardless of their country of origin or politic feeling.
If a russia OS was ever given to you with full source code, and if it was far better that any other OS known to the US. Would you even consider it?
Don't base your judgement on political/geographical propaganda.
You are a tech guy, that's your job. Look at the technical merits of the OS. If you want to, audit the products, or ask an american security auditing companie to do so. Every one would benefit.
Do you know that some major american-grown products did have backdoors (Interbase comes first to my mind)? what does this inspire you?
Re:Did Slashdot Layout change? (Score:1)
Ahh, emphasis! (Score:1)
READ MORE! 289 of 500 comments, dammit!
Cheers,
levine
Re:Did Slashdot Layout change? (Score:1)
Re:Mirror of screen shot available (Score:1)
Re:ACLs on Linux? (Score:2)
The NSA's SE Linux [nsa.gov] has been covered here many times.
Also mentioned in the past is PitBull from Argus Systems [argus-systems.com] (I work across the street from their offices) which stood up to the OpenHack III challenge a few moths back. PitBull gives Trusted OS extentions to Solaris, AIX and Linux. (There's free non-com licenses at Argus Revolution [argusrevolution.com].)
And Sun also already has a Trusted Solaris.
There's others as well.
It occurs to me that you might have meant is it a first to provide ACL support via Samba, in which case I appologize. This was of course already answered by someone else.
--
Re:ACLs on Linux? (Score:2)
The flaw in the OS isn't Solaris specific. Any x86 OS is/was potentially at risk.
For info on the LDT vulnerability, see this NetBSD Advisory [netbsd.org].
Additionally, Argus doesn't even sell a version of PitBull for Solaris/x86. Their Solaris/x86 version is only for R&D and it was the one that was used in the InfoSec challenge.
--
Re:Did Slashdot Layout change? (Score:1)
I'm sure that this doesn't matter to you, but it occasionally happens under Mozilla too.
Better browsers end text formatting at the end of a block element such as a table.
Is that part of the standard? I thought it was just discouraged to span formatting tags across tables, not banned.
Re:Did Slashdot Layout change? (Score:1)
If it's incorrect behavior as you say, then it's probably a Mozilla bug too, but trying to squeeze it out of Slashdot might be hard.
Re:ACLs on Linux? (Score:1)
Sorry, their latest "Open Hack" got them hacked, and they paid the $48,000 prize. This was a couple of days ago.
In defense of a good product, the hack was a flaw in the OS (Solaris x86) that was unpublished (but VERY nasty).
--
Charles E. Hill
Re:Mirror of screen shot available (Score:1)
There are several companies that accept only text resumes via e-mail, as they are automatically 47/*filtered, filed, sorted, etc. which isn't easy with Word
--
Charles E. Hill
Re:ACLs on Linux? (Score:1)
Argus PB *was* hacked at OpenHack III, the hacker just missed the deadline by a couple of hours. Still, they were hacked none the less.
I'm aware their Solaris X86 code isn't kept up to date -- it was pure foolishness on their part to run a contest then say 'well, it wasn't production code, etc.' They should have been using Solaris Sparc or Linux with their product.
Yes, it is a good product. Nothing is perfect, but PB is many steps ahead in the security game.
--
Charles E. Hill
/. in italics? (Score:1)
Re:ACLs on Linux? (Score:1)
Snapshots (Score:2)
Re:Windows version? (Score:1)
In my experiance, displaying WinNT under VNC is slow... but VNC isn't known for it's speed.
VMware + VNC = very slow, but still useful
Re:Can we really trust BSD? (Score:1)
I'm not going to risk my income by setting up a *BSD server with a fortune 500 company only to find out later that the system has back doors in it which allow the foreign BSD developers to access their critical data
Of course, you would rather have American Corporations put the back doors in. They have much more interest in critical data than foreign hackers do anyways; and, as an added bonus, they could give the back doors to the Feds, so that when the SEC is investigating them for insider trading, they don't even have to LOOK for the evidence.
I want to know if any outside and independant people have auditied the code
I want to know if any outside and independant people have audited Windows, Solaris, or AIX and why you think that M$ Sun and IBM have motives any more pure that of "foreign BSD Developers"; Oh Yeah, corporate closed-source OS'es can't be audited, so we'll never know. Open Source OS'es have source code; if anyone ever found an intentional back-door in an Open source OS that system would be DOOMED.
One More thing, out of which orifice did you pull these uninformed opinions ?
-- Rich
Re:Just what the doctor ordered... (Score:1)
I believe NetBSD [netbsd.org] would support all of those hardware platforms you mentioned. Unfortunately, I do not believe it has support in Samba concerning ACL's, but I do not know for certain. Check out Samba to see what OS's it supports ACL's.
FreeBSD [freebsd.org] is mainly an x86 OS with some support for a couple of other platforms.
No, but the current system is pathetic. (Score:2)
Actually, NT uses thw following method to determialternative ne your access:
1. Work out the greatest amount of privilege you have through ACLs
2. Work out the greatest amount of privilege you have through shares
3. The final privilege is the most restrictive of the two above
Complex huh? But we don't have to emulate the share/ACL combo on Linux. We do, however, need a system which allows for basic, realistic, access control situations:
* Some word processor templates are stored on a server
* A group of users edit these templates
* Another group of users can only read these templates
* All other users may not view these templates at all, as they contain business sensitive information.
A simple case found frequently in many offices. But not currently handled by RWX permissions at all, which are, in essence (and excuse the French) fucking pathetic.
Thank God the Linux ACL project is going to be one of the first Linux Security Module's for the 2.4 kernel. Thankyou SGI and everyone else making this a reality. With any luck, Linux will have a permission system that doesn't suck RSN.
No, but the current system is pathetic. (Score:2)
Actually, NT uses thw following method to determialternative ne your access:
1. Work out the greatest amount of privilege you have through ACLs
2. Work out the greatest amount of privilege you have through shares
3. The final privilege is the most restrictive of the two above
Complex huh? But we don't have to emulate the share/ACL combo on Linux. We do, however, need a system which allows for basic, realistic, access control situations:
* Some word processor templates are stored on a server
* A group of users edit these templates
* Another group of users can only read these templates
* All other users may not view these templates at all, as they contain business sensitive information.
A simple case found frequently in many offices. But not currently handled by RWX permissions at all, which are, in essence (and excuse the French) fucking pathetic.
Thank God the Linux ACL project is going to be one of the first Linux Security Module's for the 2.4 kernel. Thankyou SGI and everyone else making this a reality. With any luck, Linux will have a permission system that doesn't suck RSN.
Re:Is it really good? (Score:2)
Why? A single line ACL is less complex than 3 sets of rwxs bits. It seems to me ACLs are as complex as you want them to be.
Re:Windows version? (Score:2)
The icons are the high color icons available in Start -> Control Panel -> Display -> Effects, in the check box marked `show icons using all possible colors'.
Is it really good? (Score:2)
While adding functions to Open-Source system is certainly the whole point of FreeBSD, Linux, etc... I can't help but wonder why this particular function is interesting.
In my experience, most users of NT-based systems do not use ACLs and never bother to set them correctly (if at all). Keeping those (unset) ACLs on a Samba-based BSD server therefore seems like a waste of time... =(
Therefore, having Samba-based ACLs on a *BSD system seems to me totally uninteresting, except if, like a previous poster has remarked, you need some sort of TLA buzzword (Posix-compliant ACLs! Wow!) for your clueless PHB.
Could anyone please explain the interest of such a thing? Many thanks in advance...
Re:Can we really trust BSD? (Score:1)
I agree with the rest of your assessment though. Ruling out Open Source on the usual corporate-think grounds is pointless.
Re:Yay (Score:1)
The only thing that has changed now is that the FreeBSD ACL's are used by Samba, so that the ACL's that Windows security uses can be provided via a Samba server running on FreeBSD.
This might satisfy those people who want to replace their NT fileservers with UNIX/Samba fileservers, but who absolutely demand ACL's.
Re:Mirror of screen shot available (Score:1)
I mean, if you can read the page the link is on, then you can read the resume as well. Sounds like a good idea to me.
Re:Special message for Slashdotters !! (Score:1)
--
Re:Just what the doctor ordered... (Score:1)
Except that:
1) it is FreeBSD. (Now you may have said "Open Source OS" and it was heard as "linux" by others
2) it is in CURRENT.
Somedays CURRENT works, other days not. Using current on a business critical system is life on the edge. More power to you if you live there.
Re:Just what the doctor ordered... (Score:1)
If its an X86 machine with mainstream hardware, yes it should.
Re:Did Slashdot Layout change? (Score:1)
Re:ACLs on Linux? (Score:2)
And, yes, it is supported in Samba 2.2.
zsazsa
Re:TrustedBSD, not Linux.. Linux has no ACLs! (Score:1)
Re:Is it really good? (Score:2)
1) Linux users tend to be highly technical people, and would almost certainly find uses for ACLs. They would put in the time to understand them properly, something (I suspect) many Windows NT people don't need or want to do. So the inclusion of ACLs in Samba might actually encourage better use of ACLs overall, as the unix people see the advantage and start to educate everyone else (especially whoever maintains the NT desktops.)
2) Corporate use is one of the key target markets for Linux, and the corporate market is a market much more likely than desktop users to want and need ACLs. The PHB will only know that it is new and cool, but the techs in the back room can put it to real use. Any selling point such as ACLs is to be desired, since use in business will provide both a steady market and educate people about open source.
3) More power in software is ALWAYS better than less power, unless it eats an insane amount of resources. This wouldn't.
4) It might put more pressure on the general open source population to update their permissions system, which is also a good thing.
Re:Just what the doctor ordered... (Score:1)
Either FreeBSD or Linux would make suitable replacements for Win2K/NT file servers in this respect.
Re:Can we really trust BSD? (Score:1)
*sniff* *sniff*
There be trolls here. But given the fact there are gullible people who will buy into the conspiracy you push...
First, take a look at:
http://www.openbsd.org/goals.htmlWhere you see how many developers of OpenBSD are in the "American" sector.
Next, take a look at:
http://www.openbsd.org/users.html [openbsd.org]http://www.netbsd.org/gallery/sites.html [netbsd.org]
http://dmoz.org/Computers/Software/Operating_Syst
BTW, what outside independent group has reviewed M$ code, or DEC code, or Sun code, or AIX code...
I suppose you don't consult to the feds, since they use xbsd (DOJ uses OpenBSD).
As an expert on operating systems, you should be aware that the common commercial vendors are full of bugs and security holes. By telling your customers that they are safe because they are using American/commercial products, you are doing them a disservice.
How could you trust the agenda of an outside independent code review. After all, they might be just as anti-American!
I truly hope you make it as an anti-xbsd consultant. Good luck.
Re:Is it really good? (Score:1)
I'm too lazy to find links, but I believe that TrustedBSD is adding ACLs to FreeBSD for general use. The news today is that Samba can now manipulate those ACLs. So they are not "Samba-based ACLs", but general purpose ACLs that can be used by Samba.
I'm told that ACLs are a Good Thing (TM), though I have no personal experience to back this up.
Re:(MOD DOWN !) Forget it (Score:1)
Mirror of screen shot available (Score:3)
Windows version? (Score:2)
Re:Can we really trust BSD? (Score:1)
This is by far one of the best trolls I have ever seen, try following the link to wagnerconsulting.com. The usa.com is a freebee mail or fake (I remember another troll who used usa.com and my favorite bgates@hell.com).
Unfortunately the expert gave himself away early on with the non US crap and later again with the auditing - I think the auditing remark was intentional, in any case, a very creative little troll.
Special message for Slashdotters !! (Score:1)
ACL... (Score:1)
Did Slashdot Layout change? (Score:1)
My whole front page is in itallics...
Re:Did Slashdot Layout change? (Score:2)
Mine too. Fuck italics.
Re:Can we really trust BSD? (Score:1)
Ok. I don't know if you're serious or not. I suspect not, but I can't ignore such an absurd comment.
Anti-american?! Are you sure that your name isn't McCarthy? What a load of drivel. Even if this were the case, then surely this should only be an issue when recommending systems to the US government, not privately held companies/corporations?
Arguably, the US govt has made things a little difficult for any OS (open-source or not) with the crypto regulations, and this does affect secure OSes more than others. This is why ISTR OpenBSD is based in Canada.
The reason why BSD is released under such a liberal licence is that they want high quality code. This is why some/all of the BSD network stack made its' way into the Windows NT/2k networking stack. Perhaps you advise that your clients avoid MS products, too? I know I would, but, I suspect, for different reasons. (grin)
I cannot understand why some people have such an absurd distrust of others based on their nationality and/or political views.
And if you're that concerned about conspiracies and smokescreens, either see a psychiatrist or look at the code yourself.
Re:Can we really trust BSD? (Score:1)
Linux was created by a non-american guy. OOoooooh, I guess Linus Torvalds made a backdoor to take control of USA satellites and missiles, because he is "anti-american".
Let's face it. That argument was REALLY stupid.
-----------------------------------------------
You think Bill Gates is evil?
Definitely needed by me. (Score:1)
Re:Mirror of screen shot available (Score:1)
Re:Just what the doctor ordered... (Score:1)
Most people let the OS choice be driven by what the server is running, not the other way round (within certain parameters). Don't base a decision on blind religous open source reasons. If you can't come up with good reasons to change, don't.
Re:Linux is dead. (Score:1)
--
Tres_Status
Re:ACLs in NT (Score:4)
I don't use them on my home machines, but I often wish I had - and that is with two users, both of whom know the root password.
When I did sysadmin type stuff I used them extensively.
NT ACLs are very usefull since if you run IIS the file permissions map right through to the web server.
I agree however with a point raised by Butler Lampson several times, ACLs are a pain to manage they should not apply to files. Instead individual users should be allowed to define named access policies via an ACL and then apply the policy to the file.
What this would mean is that if you decide to kick Alice off the system you can revoke all her ACLs at one time, or if you decide to give her special privs you can do it all in one.
Just what the doctor ordered... (Score:1)
Does anyone have any other good points (besides the obvious) for a university to switch from running windows2k/NT on its fileservers? Right now, we have nearly 20 boxes in the machine room running winNT/2k, seems like there are too many machines. What about things like win2k logons/remote access? Is there a way to manage this under linux/bsd?
Re:Just what the doctor ordered... (Score:1)
With our current hardware, linux *could* run on all the machines (can BSD? I dont know. Im asking. Im not too familiar with BSD other than its another open source OS that is UNIX like)
Im not a linux zealot, just want to know...
Education is a good thing
As for CURRENT vs Stable... if a decision were to be made today to run BSD or Linux, it wouldnt actually happen for months...I would hope that within that time a Stable version would be out to incorporate the updates...
Screenshot has been taken down (Score:1)
Re:Is it really good? (Score:2)
They can be misused, make no mistake, but used correctly, they are far superior to rwx method that is the prefered by the *nix people.
Yay (Score:1)
I'm curious to know if there are similar projects being worked on for Linux, and if OpenBSD will eventually pick up the TrustedBSD work?
--
Keep attacking good things as "communist"
What `BSD' means in the context of Windows (Score:2)
And I thought you get enough BSDs on Windoze even without the official FreeBlueScreenofDeath `service pack'.
--
Re:Is it really good? (Score:2)
On the other hand, posix ACL's are optional. You still get the old *nix style permission system, which is perfect for most files (/usr/bin/* for example). You simply add ACL's to certain files where they're needed and leave the rest of the filesystem alone.
Using my home system as an example, I would probably use ACL's for all my html files, and for my cvs repository. Everything else would be left as-is.
The bottom line is: ACL's are great and wonderful and all that. Force them on every file in the system however, and you're looking for big trouble and even bigger headaches. NT is a text-book example of bad design in this area (and maybe one or two others
--
Damn it Jim, that's my sphincter, not a jelly donut!!!
Re:Just what the doctor ordered... (Score:1)
Re:Did Slashdot Layout change? (Score:1)
Re:Did Slashdot Layout change? (Score:1)
Text level elements
These don't cause paragraph breaks. Text level elements that define character styles can generally be nested. They can contain other text level elements but not block level elements.
Netscape clearly interpreted the rest of the table as being contained in the <I> element, in violation of the specification. Incorrect HTML, sure, but theoretically no worse than not closing your <P> tags.
Mozilla and IE both correctly assume that the italic element ends where the table cell does.
Re:Is it really good? (Score:1)
First of all, there's the partially priviledged "Power User" group. Probably a braindead idea because there's numerous priv escalation bugs to be found there (and it wasn't unitil NT5 did MS start considering Power User to Local Admin a bug!)
Second, there's the real problem of running legacy Win95-style applications. Personally, I'd love it if Microsoft just broke these for Power Users in the same way they broke them for Users (in W2K). But those of you who are running broken apps in legacy mode (such as Nutscrape 4.x or Office 97) probably wouldn't, and neither would Microsoft because their app base is the source of their strength.
Any old NetWare admin can tell you that ACLs are damn useful on file shares. Trying to discredit them via the abortion of NT's system files doesn't count because it doesn't apply to Unix (where there's root and there's everyone else).
Re:Is it really good? (Score:2)
There's also the kudgyness of creating groups just to solve a particular access control problem. Have many thousand users in a directory environment, and it just doesn't scale up.
Not to say that ACLs don't have their own problems, especially wrt to complexity. NT, for example, allows permissions on file/print shares, and those are often used instead of ACLs.
Not to mention that network types have gotten used to ACLs since Novell 3.x back in the early 90s. It has become a checkbox feature.