|
|
//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 2000.
//
// File: S E C U R I T Y . C
//
// Contents: Support for process-wide security settings such as calls
// to CoInitializeSecurity.
//
// Notes:
//
// Author: shaunco 15 Jul 1998
//
//----------------------------------------------------------------------------
extern "C" { #include "pch.h"
}
#pragma hdrstop
extern "C" { #include "security.h"
}
#include <accctrl.h>
#include <aclapi.h>
#include <globalopt.h>
#define SIZE_ALIGNED_FOR_TYPE(_size, _type) \
(((_size) + sizeof(_type)-1) & ~(sizeof(_type)-1))
const SID AUTHENTICATED_USERS_SID = {SID_REVISION, 1, {0,0,0,0,0,5}, SECURITY_AUTHENTICATED_USER_RID };
DWORD DwInitializeSdFromThreadToken ( PSECURITY_DESCRIPTOR* ppSd, PACL* ppAcl ) { PSECURITY_DESCRIPTOR pSd; PTOKEN_USER pUserInfo; PTOKEN_PRIMARY_GROUP pGroupInfo; HANDLE hToken; DWORD dwErr = NOERROR; DWORD dwUserSize; DWORD dwGroupSize; DWORD dwAlignSdSize; DWORD dwAlignUserSize; PVOID pvBuffer; PACL pAcl = NULL;
// Here is the buffer we are building.
//
// |<- a ->|<--- b ---->|<--- c ---->|
// +-------+------------+------------+
// | p| p| |
// | SD a| User info a| Group info |
// | d| d| |
// +-------+------------+------------+
// ^ ^ ^
// | | |
// | | +--pGroupInfo
// | |
// | +--pUserInfo
// |
// +--pSd (this is returned via *ppSd)
//
// pad is so that pUserInfo and pGroupInfo are aligned properly.
//
// a = dwAlignSdSize
// b = dwAlignUserSize
// c = dwGroupSize
//
// Initialize output parameters.
//
*ppSd = NULL; *ppAcl = NULL;
// Open the thread token if we can. If we can't try for the process
// token.
//
if (!OpenThreadToken (GetCurrentThread(), TOKEN_QUERY, FALSE, &hToken)) { if (!OpenProcessToken (GetCurrentProcess(), TOKEN_QUERY, &hToken)) { dwErr = GetLastError (); goto finish; } }
// Get the size of the buffer required for the user information.
//
if (!GetTokenInformation (hToken, TokenUser, NULL, 0, &dwUserSize)) { dwErr = GetLastError (); if (ERROR_INSUFFICIENT_BUFFER != dwErr) { goto finish; } }
// Get the size of the buffer required for the group information.
//
if (!GetTokenInformation (hToken, TokenPrimaryGroup, NULL, 0, &dwGroupSize)) { dwErr = GetLastError (); if (ERROR_INSUFFICIENT_BUFFER != dwErr) { goto finish; } }
dwAlignSdSize = SIZE_ALIGNED_FOR_TYPE(SECURITY_DESCRIPTOR_MIN_LENGTH, PTOKEN_USER); dwAlignUserSize = SIZE_ALIGNED_FOR_TYPE(dwUserSize, PTOKEN_PRIMARY_GROUP);
// Allocate a buffer big enough for both making sure the sub-buffer
// for the group information is suitably aligned.
//
pvBuffer = MemAlloc (0, dwAlignSdSize + dwAlignUserSize + dwGroupSize);
if (pvBuffer) { dwErr = NOERROR;
// Setup the pointers into the buffer.
//
pSd = pvBuffer; pUserInfo = (PTOKEN_USER)((PBYTE)pvBuffer + dwAlignSdSize); pGroupInfo = (PTOKEN_PRIMARY_GROUP)((PBYTE)pUserInfo + dwAlignUserSize);
if (!InitializeSecurityDescriptor(pSd, SECURITY_DESCRIPTOR_REVISION)) { dwErr = GetLastError (); }
if (!SetSecurityDescriptorDacl (pSd, TRUE, NULL, FALSE)) { dwErr = GetLastError (); }
if (!GetTokenInformation (hToken, TokenUser, pUserInfo, dwUserSize, &dwUserSize)) { dwErr = GetLastError (); }
if (!GetTokenInformation (hToken, TokenPrimaryGroup, pGroupInfo, dwGroupSize, &dwGroupSize)) { dwErr = GetLastError (); }
if (!SetSecurityDescriptorOwner (pSd, pUserInfo->User.Sid, FALSE)) { dwErr = GetLastError (); }
if (!SetSecurityDescriptorGroup (pSd, pGroupInfo->PrimaryGroup, FALSE)) { dwErr = GetLastError (); }
if (!dwErr) { // Build the DACL.
//
EXPLICIT_ACCESS ea; ea.grfAccessPermissions = COM_RIGHTS_EXECUTE; ea.grfAccessMode = SET_ACCESS; ea.grfInheritance = NO_INHERITANCE; ea.Trustee.pMultipleTrustee = NULL; ea.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; ea.Trustee.TrusteeForm = TRUSTEE_IS_SID; ea.Trustee.TrusteeType = TRUSTEE_IS_GROUP; ea.Trustee.ptstrName = (LPWSTR)&AUTHENTICATED_USERS_SID; dwErr = SetEntriesInAcl (1, &ea, NULL, &pAcl); if (!dwErr) { if (!SetSecurityDescriptorDacl(pSd, TRUE, pAcl, FALSE)) { LocalFree(pAcl); dwErr = GetLastError(); } } } // All is well, so assign the output parameters.
//
if (!dwErr) { *ppSd = pSd; *ppAcl = pAcl; }
// Free our allocated buffer on failure.
//
else { MemFree (pvBuffer); } } else { dwErr = ERROR_OUTOFMEMORY; }
finish: return dwErr; }
BOOL InitializeSecurity ( DWORD dwParam, DWORD dwAuthLevel, DWORD dwImpersonationLevel, DWORD dwAuthCapabilities ) { HRESULT hr; PSECURITY_DESCRIPTOR pSd; PACL pAcl; IGlobalOptions *pIGLB;
ASSERT (0 != dwParam);
if (!DwInitializeSdFromThreadToken (&pSd, &pAcl)) { hr = CoInitializeEx (NULL, COINIT_MULTITHREADED | COINIT_DISABLE_OLE1DDE);
if (SUCCEEDED(hr)) { SVCHOST_LOG1(SECURITY, "Calling CoInitializeSecurity...(dwAuthCapabilities=0x%08x)\n", dwAuthCapabilities);
hr = CoInitializeSecurity ( pSd, -1, NULL, NULL, dwAuthLevel, dwImpersonationLevel, NULL, dwAuthCapabilities, NULL);
if (FAILED(hr)) { SVCHOST_LOG1(ERROR, "CoInitializeSecurity returned hr=0x%08x\n", hr); } }
MemFree (pSd); LocalFree (pAcl); } else { hr = E_FAIL; }
if (SUCCEEDED(hr)) { //
// Tell COM not to handle/mask fatal exceptions in server threads. If a service
// that runs in-proc as a COM server faults, we want to know about it.
//
hr = CoCreateInstance(CLSID_GlobalOptions, NULL, CLSCTX_INPROC_SERVER, IID_IGlobalOptions, (void **) &pIGLB);
if (SUCCEEDED(hr)) { hr = pIGLB->Set(COMGLB_EXCEPTION_HANDLING, COMGLB_EXCEPTION_DONOT_HANDLE);
pIGLB->Release(); }
ASSERT(SUCCEEDED(hr)); }
return SUCCEEDED(hr); }
|