Bug #11773

Need ways to override Domain Admins' full control

Added by Adam Stylinski over 1 year ago. Updated about 1 year ago.

cifs - CIFS server and client
Start date:
Due date:
% Done:


Estimated time:
Gerrit CR:


As a domain admin, I get full read/read/execute permission regardless of the ACL set. My dataset currently has aclmode=passthrough and aclinherit=passthrough (not that it should matter). I set ACLs explicitly, both through NFS clients and through Windows' security dialog (both which seem to otherwise take effect for non-DA users), and yet still have full access through Windows as the DA (but not as the DA through Kerberized NFS4).

I would think this is a security bug. The DA should, at the very worst, need to adjust the ACLs, which can generate an audit event.


Updated by Jorge Schrauwen over 1 year ago

Of intrest, our behavior seems to match the samba bahavior.

If you are part of the 'admin users' property for a share (aka domain admin) you basically ignore all ACLs set when accessing the data via samba.

So that seems to match what is happening here.


Updated by Adam Stylinski over 1 year ago

Does this behavior match Windows' behavior? It just doesn't jive with how ACLs usually operate. At the very least, it's inconsistent with NFS4 ACLs, which as you'd imagine, have no notion of a super admin. Does samba do this when joined to a domain rather than explicitly setting an "admin users" list in their local user database?


Updated by Jorge Schrauwen over 1 year ago

I believe, if you use the 'net' to add a user or group to the Adminisators or... I forgot the name of the another group, yes... it will have the same behavior.

On the point of ACLs... NFS4 ACLs != Windows ACLs though, they do not map a 100%


Updated by Adam Stylinski over 1 year ago

Just tried sharing a file on Windows 10 to another windows host with permission share permissions but an ACL on a file was restricted in such a way that only the owner could do anything with it. I received access denied from the domain admin's access (the file is owned by an otherwise ordinary user).

This is definitely a bug in that it doesn't match Windows' behavior.


Updated by Gordon Ross over 1 year ago

We have a fix for this. It's even in the "upstream" queue already.
Just takes time...


Updated by Adam Stylinski over 1 year ago

Gordon, can you point me to where these fixes are, or are they in a closed repo? I just want to make sure we're referring to the same bug behavior.


Updated by Gordon Ross about 1 year ago

  • Subject changed from Domain admins seem to be exempt from ACLs with smbd to Need ways to override Domain Admins' full control
  • Assignee set to Gordon Ross

Updated by Gordon Ross about 1 year ago

The fix for this issue modifies handling of "take ownership" privilege in the illumos SMB server to make it more consistent with behavior of Windows servers. The "take ownership" privilege is normally granted to members of the local Administrators group (i.e. local Administrator or "Domain Administratror").

Both illumos and Windows allow an SMB user with "take ownership” privilege (i.e. Administrator) to access any file or directory in an SMB share. However earlier versions of the server allow that access directly where Windows allows that access only via a two-step process where one first must “take ownership” of the objects, and then may access them. It's important to note that in the end the access is the same; only the number of steps it takes to get that access differs. With the fix for this issue in place, the illumos SMB server behaves the same as Windows; requiring an administrator to use the “two step" process of taking ownership of the objects, then accessing the objects.

System administrators who prefer the previous behavior of the SMB Administrator account having direct access to objects (without first taking ownership), may add either or both of two new privileges: "bypass ACL read", and "bypass ACL write" to the local Administrators group. Adding both of those privileges lets members of the group directly access all files and directories in an SMB share. Adding just "bypass ACL read" can be useful in deployments where an SMB account is being used to replicate data from a share and the system administrator would prefer to avoid the risk of that account accidentally modifying data.

Instructions for modifying SMB group privileges are found in


Updated by Gordon Ross about 1 year ago

Fix is out for review as part of this PR:


Updated by Electric Monk about 1 year ago

  • Status changed from New to Closed
  • % Done changed from 0 to 100

git commit 0292c176d853baa7e46c9ff8e4f16f63b8cbd6e5

commit  0292c176d853baa7e46c9ff8e4f16f63b8cbd6e5
Author: Matt Barden <>
Date:   2019-11-14T14:23:07.000Z

    11773 Need ways to override Domain Admins' full control
    Reviewed by: Gordon Ross <>
    Reviewed by: Evan Layton <>
    Reviewed by: Andrew Stormont <>
    Approved by: Garrett D'Amore <>

Also available in: Atom PDF