1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
|
#
# Author:: John Keiser (<jkeiser@opscode.com>)
# Copyright:: Copyright 2011-2016, Chef Software Inc.
# License:: Apache License, Version 2.0
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
require "chef/win32/security"
require "chef/win32/api/net"
require "chef/win32/api/error"
require "wmi-lite/wmi"
class Chef
module ReservedNames::Win32
class Security
class SID
include Chef::ReservedNames::Win32::API::Net
include Chef::ReservedNames::Win32::API::Error
class << self
include Chef::ReservedNames::Win32::API::Net
include Chef::ReservedNames::Win32::API::Error
end
def initialize(pointer, owner = nil)
@pointer = pointer
# Keep a reference to the actual owner of this memory so we don't get freed
@owner = owner
end
def self.from_account(name)
domain, sid, use = Chef::ReservedNames::Win32::Security.lookup_account_name(name)
sid
end
def self.from_string_sid(string_sid)
Chef::ReservedNames::Win32::Security::convert_string_sid_to_sid(string_sid)
end
def ==(other)
other != nil && Chef::ReservedNames::Win32::Security.equal_sid(self, other)
end
attr_reader :pointer
def account
Chef::ReservedNames::Win32::Security.lookup_account_sid(self)
end
def account_name
domain, name, use = account
(domain != nil && domain.length > 0) ? "#{domain}\\#{name}" : name
end
def size
Chef::ReservedNames::Win32::Security.get_length_sid(self)
end
def to_s
Chef::ReservedNames::Win32::Security.convert_sid_to_string_sid(self)
end
def valid?
Chef::ReservedNames::Win32::Security.is_valid_sid(self)
end
# Well-known SIDs
def self.Null
SID.from_string_sid("S-1-0")
end
def self.Nobody
SID.from_string_sid("S-1-0-0")
end
def self.World
SID.from_string_sid("S-1-1")
end
def self.Everyone
SID.from_string_sid("S-1-1-0")
end
def self.Local
SID.from_string_sid("S-1-2")
end
def self.Creator
SID.from_string_sid("S-1-3")
end
def self.CreatorOwner
SID.from_string_sid("S-1-3-0")
end
def self.CreatorGroup
SID.from_string_sid("S-1-3-1")
end
def self.CreatorOwnerServer
SID.from_string_sid("S-1-3-2")
end
def self.CreatorGroupServer
SID.from_string_sid("S-1-3-3")
end
def self.NonUnique
SID.from_string_sid("S-1-4")
end
def self.Nt
SID.from_string_sid("S-1-5")
end
def self.Dialup
SID.from_string_sid("S-1-5-1")
end
def self.Network
SID.from_string_sid("S-1-5-2")
end
def self.Batch
SID.from_string_sid("S-1-5-3")
end
def self.Interactive
SID.from_string_sid("S-1-5-4")
end
def self.Service
SID.from_string_sid("S-1-5-6")
end
def self.Anonymous
SID.from_string_sid("S-1-5-7")
end
def self.Proxy
SID.from_string_sid("S-1-5-8")
end
def self.EnterpriseDomainControllers
SID.from_string_sid("S-1-5-9")
end
def self.PrincipalSelf
SID.from_string_sid("S-1-5-10")
end
def self.AuthenticatedUsers
SID.from_string_sid("S-1-5-11")
end
def self.RestrictedCode
SID.from_string_sid("S-1-5-12")
end
def self.TerminalServerUsers
SID.from_string_sid("S-1-5-13")
end
def self.LocalSystem
SID.from_string_sid("S-1-5-18")
end
def self.NtLocal
SID.from_string_sid("S-1-5-19")
end
def self.NtNetwork
SID.from_string_sid("S-1-5-20")
end
def self.BuiltinAdministrators
SID.from_string_sid("S-1-5-32-544")
end
def self.BuiltinUsers
SID.from_string_sid("S-1-5-32-545")
end
def self.Guests
SID.from_string_sid("S-1-5-32-546")
end
def self.PowerUsers
SID.from_string_sid("S-1-5-32-547")
end
def self.AccountOperators
SID.from_string_sid("S-1-5-32-548")
end
def self.ServerOperators
SID.from_string_sid("S-1-5-32-549")
end
def self.PrintOperators
SID.from_string_sid("S-1-5-32-550")
end
def self.BackupOperators
SID.from_string_sid("S-1-5-32-551")
end
def self.Replicators
SID.from_string_sid("S-1-5-32-552")
end
def self.Administrators
SID.from_string_sid("S-1-5-32-544")
end
def self.None
SID.from_account("#{::ENV['COMPUTERNAME']}\\None")
end
def self.Administrator
SID.from_account("#{::ENV['COMPUTERNAME']}\\#{SID.admin_account_name}")
end
def self.Guest
SID.from_account("#{::ENV['COMPUTERNAME']}\\Guest")
end
def self.current_user
SID.from_account("#{::ENV['USERDOMAIN']}\\#{::ENV['USERNAME']}")
end
# See https://technet.microsoft.com/en-us/library/cc961992.aspx
# In practice, this is SID.Administrators if the current_user is an admin (even if not
# running elevated), and is current_user otherwise. On win2k3, it technically can be
# current_user in all cases if a certain group policy is set.
def self.default_security_object_owner
token = Chef::ReservedNames::Win32::Security.open_current_process_token
Chef::ReservedNames::Win32::Security.get_token_information_owner(token)
end
# See https://technet.microsoft.com/en-us/library/cc961996.aspx
# In practice, this seems to be SID.current_user for Microsoft Accounts, the current
# user's Domain Users group for domain accounts, and SID.None otherwise.
def self.default_security_object_group
token = Chef::ReservedNames::Win32::Security.open_current_process_token
Chef::ReservedNames::Win32::Security.get_token_information_primary_group(token)
end
def self.admin_account_name
@admin_account_name ||= begin
admin_account_name = nil
# Call NetUserEnum to enumerate the users without hitting network
# http://msdn.microsoft.com/en-us/library/windows/desktop/aa370652(v=vs.85).aspx
servername = nil # We are querying the local server
level = 3 # We want USER_INFO_3 structure which contains the SID
filter = FILTER_NORMAL_ACCOUNT # Only query the user accounts
bufptr = FFI::MemoryPointer.new(:pointer) # Buffer which will receive the data
prefmaxlen = MAX_PREFERRED_LENGTH # Let the system allocate the needed amount of memory
entriesread = FFI::Buffer.new(:long).write_long(0)
totalentries = FFI::Buffer.new(:long).write_long(0)
resume_handle = FFI::Buffer.new(:long).write_long(0)
status = ERROR_MORE_DATA
while(status == ERROR_MORE_DATA) do
status = NetUserEnum(servername, level, filter, bufptr, prefmaxlen, entriesread, totalentries, resume_handle)
if (status == NERR_Success || status == ERROR_MORE_DATA)
entriesread.read_long.times.collect do |i|
user_info = USER_INFO_3.new(bufptr.read_pointer + i * USER_INFO_3.size)
# Check if the account is the Administrator account
# RID for the Administrator account is always 500 and it's privilage is set to USER_PRIV_ADMIN
if user_info[:usri3_user_id] == 500 && user_info[:usri3_priv] == 2 # USER_PRIV_ADMIN (2) - Administrator
admin_account_name = user_info[:usri3_name].read_wstring
break
end
end
# Free the memory allocated by the system
NetApiBufferFree(bufptr.read_pointer)
end
end
raise "Can not determine the administrator account name." if admin_account_name.nil?
admin_account_name
end
end
end
end
end
end
|