上篇是通过修改文件的安全信息来实现。那么首先一个坑就是,如果文件本身没有写权限,麻烦就大了。虽然可以通过修改DCAL权限得到写权限,根据“代码多就是bug多”的原则,很容易夜长梦多,节外生枝。所以要在创建文件时直接指定权限。
总的过程:先喘一口气,然后根据sid和对应的权限创建Explicit Access,根据Explicit Access创建ACL,用ACL创建security descriptor,用security descriptor创建security attributes ,现在可以用security attributes 进行createfile了。有没有感受到Windows深深的恶意?
回过头来咱们细聊。
上篇中的CREATOR并不是posix中的owner。根据https://docs.microsoft.com/en-us/windows/win32/secauthz/searching-for-a-sid-in-an-access-token-in-c–,可以创建一个token来得到TokenOwner和TokenPrimaryGroup,进一步可以得到Owner和PrimaryGroup的sid。
再说权限的转换。根据https://docs.microsoft.com/en-us/windows/win32/secauthz/dacls-and-aces,若把GRP比OWN多权限,或者OTH比GRP多权限称为exception的话,只能支持最多一个exception:不管deny和grant是按什么顺序添加,最终的结果都是deny添加在前,grant添加在后,这样的话只能处理一个例外。总之,Windows最多能处理一个有效的deny。
所以Windows支持的文件权限组合很多,但是没有办法实现posix的某些特定组合(如0421)。理解了这个问题,就可以给感叹“全世界有三十多亿的异性,却没有一个合适的她/他”的文艺青年开导人生了。
由于OTH的deny并无实际意义–OTH作为最大的GROUP,显式的grant不会给不存在的后续GROUP添加不必要的权限。因此最后创建ea的时候,最多只会有一个deny。
刚才说的是创建文件,若是创建文件夹略有区别:后续在文件夹内创建文件涉及到继承,没有设置好的话,文件夹是能够创建成功,后续使用就有麻烦了。
这里我们再根据“少既是多”的原则,先CreateDirectoryW生成一个文件夹(继承权限全弄好了),再根据RWX进行修改,任务完美完成。
全文完。代码是更好的注释。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 |
#pragma comment(lib, "advapi32.lib") #include <accctrl.h> #include <aclapi.h> #include <stdio.h> #include <windows.h> #include <winternl.h> #define NUM_ACES 4 static HANDLE _createfile( PCWSTR fileName, DWORD dwDesiredAccess, DWORD dwShareMode, DWORD dwCreationDisposition, DWORD dwFlagsAndAttributes, HANDLE hTemplateFile, DWORD rwx) { HANDLE ret = INVALID_HANDLE_VALUE; PSECURITY_DESCRIPTOR pSD = NULL; SECURITY_ATTRIBUTES sa; PSID psid[3] = {NULL, NULL, NULL}; PSID everyonesid = NULL; PACL pACL = NULL; SID_IDENTIFIER_AUTHORITY SIDAuthWorld = SECURITY_WORLD_SID_AUTHORITY; HANDLE hToken; TOKEN_PRIMARY_GROUP* GroupInfo; TOKEN_OWNER* OwnerInfo; DWORD win_modes[] = {GENERIC_EXECUTE, GENERIC_WRITE, GENERIC_READ}; DWORD current_mode = 01; // bit zero set to 1, which is S_IXOTH DWORD grants[] = {0, 0, 0}; DWORD denies[] = {0, 0, 0}; for (int i = 2; i >= 0; i--) { for (int j = 0; j <= 2; j++) { if (rwx & current_mode) { grants[i] |= win_modes[j]; } else { denies[i] |= win_modes[j]; } // Shift the mode bit being examined to the next one in the order X, // W, R. current_mode <<= 1; } // Shift the group of mode bits being examined to the next one in the // order OTH, GRP, USR And also reset the value of current bit to 1. } // In this case it needs two deny ACEs, which is impossible. // GRP has some permission USR dones not have. if ((denies[0] & grants[1]) && // OTH has some permission GRP does not have. (denies[1] & grants[2])) { printf("This mode %04o is not supported on Windows.\n", rwx); _set_errno(EINVAL); goto done; } // Deny ACE for Everyone is not necessary since it is the last entry. denies[2] = 0; // We also need to disable any unnecessary deny for Owner or group. // (GRP has some permission USR dones not have) is not true. // Deny for USR is unnecessary. if (!(denies[0] & grants[1])) { denies[0] = 0; } // (OTH has some permission GRP does not have) is not true. // Deny for GRP is unneccesarry. if (!(denies[1] & grants[2])) { denies[1] = 0; } DWORD dwSize = 0, dwRes = 0; // Open a handle to the access token for the calling process. if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &hToken)) { _set_errno(GetLastError()); goto done; } // Call GetTokenInformation to get the buffer size. if (!GetTokenInformation(hToken, TokenOwner, NULL, 0, &dwSize)) { dwRes = GetLastError(); if (dwRes != ERROR_INSUFFICIENT_BUFFER) { _set_errno(GetLastError()); goto done; } } // Allocate the buffer. OwnerInfo = (TOKEN_OWNER*)calloc(dwSize, sizeof(char)); // Call GetTokenInformation again to get the group information. if (!GetTokenInformation(hToken, TokenOwner, OwnerInfo, dwSize, &dwSize)) { _set_errno(GetLastError()); goto done; } psid[0] = OwnerInfo->Owner; // Call GetTokenInformation to get the buffer size. if (!GetTokenInformation(hToken, TokenPrimaryGroup, NULL, 0, &dwSize)) { dwRes = GetLastError(); if (dwRes != ERROR_INSUFFICIENT_BUFFER) { _set_errno(GetLastError()); goto done; } } // Allocate the buffer. GroupInfo = (TOKEN_PRIMARY_GROUP*)calloc(dwSize, sizeof(char)); // Call GetTokenInformation again to get the group information. if (!GetTokenInformation( hToken, TokenPrimaryGroup, GroupInfo, dwSize, &dwSize)) { _set_errno(GetLastError()); goto done; } psid[1] = GroupInfo->PrimaryGroup; // Create a SID for the Everyone group. if (!AllocateAndInitializeSid( &SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &everyonesid)) { _set_errno(GetLastError()); goto done; } psid[2] = everyonesid; EXPLICIT_ACCESS ea[NUM_ACES]; ZeroMemory(&ea, NUM_ACES * sizeof(EXPLICIT_ACCESS)); // Track the number of effective ea, to avoid blank permission ea. int num_aces = 0; for (int i = 0; i < 3; i++) { // Set access to each ea. According to ACE canonical rule, // deny access must proceed before set access. if (i == 1 && denies[i]) { ea[num_aces].grfAccessPermissions = denies[i]; ea[num_aces].grfAccessMode = DENY_ACCESS; ea[num_aces].grfInheritance = NO_INHERITANCE; ea[num_aces].Trustee.TrusteeForm = TRUSTEE_IS_SID; ea[num_aces].Trustee.TrusteeType = TRUSTEE_IS_WELL_KNOWN_GROUP; ea[num_aces].Trustee.ptstrName = (LPTSTR)psid[i]; num_aces++; } if (grants[i]) { ea[num_aces].grfAccessPermissions = grants[i]; ea[num_aces].grfAccessMode = SET_ACCESS; ea[num_aces].grfInheritance = NO_INHERITANCE; ea[num_aces].Trustee.TrusteeForm = TRUSTEE_IS_SID; ea[num_aces].Trustee.TrusteeType = TRUSTEE_IS_WELL_KNOWN_GROUP; ea[num_aces].Trustee.ptstrName = (LPTSTR)psid[i]; num_aces++; } } if (ERROR_SUCCESS != SetEntriesInAcl(num_aces, ea, NULL, &pACL)) { _set_errno(GetLastError()); goto done; } // Deal with directory here. // Compared to file, dir has much more aces as for CREATOR OWNER, GROUP // It is much easy to let Windows finish the creation then apply the PACL. if (dwDesiredAccess == FILE_DIRECTORY_FILE) { if (!CreateDirectoryW(fileName, NULL)) { _set_errno((GetLastError())); goto done; } DWORD dwRes = SetNamedSecurityInfoW( (PWSTR)fileName, // name of the object SE_FILE_OBJECT, // type of object DACL_SECURITY_INFORMATION, // change only the object's DACL NULL, // do not change owner NULL, // do not change group pACL, // DACL specified NULL); // do not change SACL if (dwRes != ERROR_SUCCESS) { _set_errno(GetLastError()); goto done; } ret = (HANDLE)0; goto done; } // Initialize a security descriptor. pSD = (PSECURITY_DESCRIPTOR)calloc( SECURITY_DESCRIPTOR_MIN_LENGTH, sizeof(char)); if (NULL == pSD) { _set_errno(GetLastError()); goto done; } if (!InitializeSecurityDescriptor(pSD, SECURITY_DESCRIPTOR_REVISION)) { _set_errno(GetLastError()); goto done; } // Add the ACL to the security descriptor. if (!SetSecurityDescriptorDacl( pSD, TRUE, // bDaclPresent flag pACL, FALSE)) // not a default DACL { _set_errno(GetLastError()); goto done; } // Initialize a security attributes structure. sa.nLength = sizeof(SECURITY_ATTRIBUTES); sa.lpSecurityDescriptor = pSD; sa.bInheritHandle = FALSE; ret = CreateFileW( fileName, dwDesiredAccess, dwShareMode, &sa, dwCreationDisposition, dwFlagsAndAttributes, hTemplateFile); // Check GetLastError for CreateFile error code. if (ret == INVALID_HANDLE_VALUE) { _set_errno(GetLastError()); goto done; } done: if (OwnerInfo) { free(OwnerInfo); } if (GroupInfo) { free(GroupInfo); } if (everyonesid) { FreeSid(everyonesid); } if (pACL) { LocalFree(pACL); } if (pSD) { free(pSD); } return ret; } int wmain(int argc, wchar_t* argv[]) { HANDLE h; PCWSTR file = L"myfile.txt"; h = _createfile( file, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL, 0644 ); if (h == INVALID_HANDLE_VALUE) { DWORD dwErrorCode = 0; dwErrorCode = GetLastError(); printf("CreateFile error = %d\n", dwErrorCode); return -1; } printf("Successfully Create File!\n"); PCWSTR dir = L"mydir"; h = _createfile( dir, FILE_DIRECTORY_FILE, 0, 0, 0, NULL, 0644 ); if (h == INVALID_HANDLE_VALUE) { DWORD dwErrorCode = 0; dwErrorCode = GetLastError(); printf("CreateFile error = %d\n", dwErrorCode); return -1; } printf("Successfully Create DIR!\n"); return 0; } |
很厉害啊!写了这么多blog
记性不好,不写下来下次遇到了还得重来。