36 L
"management-forget-disconnect",
38 L
"management-query-passwords",
39 L
"management-query-proxy",
41 L
"management-up-down",
52static BOOL
IsUserInGroup(PSID sid,
const PTOKEN_GROUPS groups,
const WCHAR *group_name);
64 WCHAR config_path[MAX_PATH];
67 if (wcscmp(fname, L
"stdin") == 0)
72 if (PathIsRelativeW(fname))
74 res = PathCchCombine(config_path, _countof(config_path), workdir, fname);
78 res = PathCchCanonicalize(config_path, _countof(config_path), fname);
113 PSID admin_sid = NULL;
114 DWORD sid_size = SECURITY_MAX_SID_SIZE;
118 DWORD dlen = _countof(domain);
120 admin_sid = malloc(sid_size);
126 b = CreateWellKnownSid(WinBuiltinAdministratorsSid, NULL, admin_sid, &sid_size);
129 b = LookupAccountSidW(NULL, admin_sid, name, &nlen, domain, &dlen, &snu);
139 const WCHAR *ovpn_service_user)
141 const WCHAR *admin_group[2];
147 SID_NAME_USE sid_type;
150 if (!LookupAccountSidW(NULL, sid, username, &len, domain, &len, &sid_type))
159 if ((wcscmp(username, ovpn_service_user) == 0) && (wcscmp(domain, L
"NT SERVICE") == 0))
166 admin_group[0] = sysadmin_group;
171 L
"Failed to get the name of Administrators group. Using the default.");
175 admin_group[1] = ovpn_admin_group;
178 for (
int i = 0; i < 2; ++i)
184 L
"Authorizing user '%ls@%ls' by virtue of membership in group '%ls'",
185 username, domain, admin_group[i]);
203 PTOKEN_GROUPS groups = NULL;
206 if (!GetTokenInformation(token, TokenGroups, groups, buf_size, &buf_size)
207 && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
209 groups = malloc(buf_size);
215 else if (!GetTokenInformation(token, TokenGroups, groups, buf_size, &buf_size))
235 DWORD dlen = _countof(domain);
237 if (!LookupAccountName(NULL, name, sid, &sid_size, domain, &dlen, &su))
257IsUserInGroup(PSID sid,
const PTOKEN_GROUPS token_groups,
const WCHAR *group_name)
260 DWORD_PTR resume = 0;
262 BYTE grp_sid[SECURITY_MAX_SID_SIZE];
266 if (token_groups &&
LookupSID(group_name, (PSID)grp_sid, _countof(grp_sid)))
268 for (DWORD i = 0; i < token_groups->GroupCount; ++i)
270 if (EqualSid((PSID)grp_sid, token_groups->Groups[i].Sid))
285 LOCALGROUP_MEMBERS_INFO_0 *members = NULL;
286 err = NetLocalGroupGetMembers(NULL, group_name, 0, (LPBYTE *)&members, MAX_PREFERRED_LENGTH,
287 &nread, &nmax, &resume);
288 if ((err != NERR_Success && err != ERROR_MORE_DATA))
293 for (DWORD i = 0; i < nread && !ret; ++i)
295 ret = EqualSid(members[i].lgrmi0_sid, sid);
297 NetApiBufferFree(members);
299 }
while (err == ERROR_MORE_DATA && nloop++ < 100);
301 if (err != NERR_Success && err != NERR_GroupNotFound)
DWORD MsgToEventLog(DWORD flags, LPCWSTR format,...)
WCHAR config_dir[MAX_PATH]
static BOOL CheckConfigPath(const WCHAR *workdir, const WCHAR *fname, const settings_t *s)
static const WCHAR * white_list[]
static int OptionLookup(const WCHAR *name, const WCHAR *white_list[])
BOOL IsAuthorizedUser(PSID sid, const HANDLE token, const WCHAR *ovpn_admin_group, const WCHAR *ovpn_service_user)
static BOOL IsUserInGroup(PSID sid, const PTOKEN_GROUPS groups, const WCHAR *group_name)
User is in group if the token groups contain the SID of the group of if the user is a direct member o...
static BOOL LookupSID(const WCHAR *name, PSID sid, DWORD sid_size)
BOOL CheckOption(const WCHAR *workdir, int argc, WCHAR *argv[], const settings_t *s)
static BOOL GetBuiltinAdminGroupName(WCHAR *name, DWORD nlen)
static PTOKEN_GROUPS GetTokenGroups(const HANDLE token)
Get a list of groups in token.
#define SYSTEM_ADMIN_GROUP