<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      IN2Windows: Case of the Unexplained Access Denied

      We received a strange case in April which is about "access denied" encountered when user tries to connect to a file share with a local admin account. In this case study, I will use a simplified and abstracted model from original case, to show you more details of the problem.

       

      What's the problem?

      Suppose there's a Windows 2012 server called "MLSDATA", and it has a local account named "test", which has admin rights. If you try to connect to \\MLSDATA\D$ with its local account "test", you will be prompted to input credentials more than once, and it will show "Access denied" at the same time. If we connect through CMD window, we can see something like this:

       

       

      What did we do to investigate?

      1. We called corporate IT helpdesk to check if they have any known solutions. They said they had received such kind of cases, but there's no escalation path, and they think it should be sporadical glitches, and they don't know under what kind of conditions this problem will happen. Emm… Since our customer said this problem happens on every new server on their team, I believe there must be a reason, so we did more tests.
      2. Queried IPSec enforcement, and all of the servers were enforced with IPSec policy.
      3. Tested with corporate (domain) credentials, and those work fine.
      4. Tested with server local account (even with accounts that have admin rights), do not work.
      5. Examined security logs, user authentication used NTLMv2, authentication passed, IPSec connections in the context worked fine, and local account accessed IPC$ named pipe successfully. But accessing administrative share "D$" was not even logged.



        We can see the user's network logon gained privileged tokens like SeTakeOwnershipPrivilege, it should have admin rights.
      6. We manually created a new share on drive D: and named this share as "D", then used local account "test" to access \\mlsdata\D, and this worked.
      7. We used Remote Desktop to connect to that server with server local account "test", worked.

       

      Based on all the tests we performed, we believe the problem is not an authentication issue because we saw user get appropriate security tokens, but something just happened in the authorization check phase. We can conclude this issue like this: There might be some restrictions implemented to restrict local user from accessing administrative shares remotely.

       

      What we found later?

      In the next day, an idea suddenly struck me that UAC might restrict admin users' rights according to LUA principles. But I was not very sure, because if the user is restricted, the user won't gain some of those security tokens. Maybe there's a technique that filtered user's tokens when system does authorization check to see if the user should access the hidden administrative share "D$".

       

      And finally we found this:

       

      To better protect users who are members of the local Administrators group, UAC restrictions are implemented on the network. This helps protect against "loopback" attacks and helps prevent local malicious software from running remotely with administrative rights. http://technet.microsoft.com/en-us/library/ee844186(v=ws.10).aspx

       

      According to this article, we just created a new registry key called "LocalAccountTokenFilterPolicy" under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System, and assigned a value of "1". And then rebooted the server. After that, everything works fine.

       

      And we found more…

      Since it is UAC that implemented this restriction, I believe that turning UAC off can always help solve this problem. I turned UAC off on Server 2012 through UI, and rebooted. But after it boots up, I see there's no effect. I launched a CMD window, and it's still running in a protected admin context with less security tokens. So I search the Internet, and found we need to use registry keys to turn UAC off on server 2012.

       

      They key is called "EnableLUA", and is under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system. To turn UAC off, we need to change the value from 1 to 0.

       

      The trends

      We can see that Windows team believe UAC is an effective technique to help reduce risks caused by privileged user rights, though UAC is not a security boundary (because it can be bypassed somehow). And it seems that they will continue to implement and improve UAC in next generations of Windows and Windows Server.

       

      Since this time we see the UAC is mandatorily enforced in Windows Server 2012 UI, I think this is a trend, and will be implemented primordially in Windows server and client later. (If one day it will be less annoying to users, I think it will enforce implementation on client OS.)

       

      Well, last but not least, we encourage people to use corporate credentials in corporate IT environment.

      posted @ 2013-05-19 15:35  佘華煜  閱讀(740)  評論(0)    收藏  舉報
      主站蜘蛛池模板: 中文字幕久久久久人妻| 国产午精品午夜福利757视频播放| 一二三三免费观看视频| 一区二区三区国产不卡| 久久人人妻人人爽人人爽| 办公室强奷漂亮少妇视频| 中文字幕制服国产精品| 亚洲欧美另类久久久精品播放的| 亚洲一本大道在线| 国产成人无码aa精品一区| 国产精品综合av一区二区| 宾川县| 亚洲精品一区久久久久一品av| 国产免费午夜福利在线播放| 久久精品国产99久久美女| 国内精品视频一区二区三区八戒 | 疯狂做受XXXX高潮国产| 久久碰国产一区二区三区| 欧美极品色午夜在线视频 | 亚洲精品一区国产精品| 久久亚洲综合精品成人网| 丰满熟妇人妻中文字幕| av日韩在线一区二区三区| 国产精品久久蜜臀av| 天堂在/线中文在线资源 官网| 免费无遮挡无码视频网站| 东方四虎在线观看av| 国产网红女主播精品视频| 国产在线98福利播放视频| 国产高潮视频在线观看| 国产目拍亚洲精品二区| 成人国产一区二区三区精品 | 无码精品人妻一区二区三区中| 国产h视频在线观看| 97人妻蜜臀中文字幕| 一本色道婷婷久久欧美| 亚洲国产激情一区二区三区| 国产亚洲人成网站在线观看| 少妇人妻偷人精品无码视频| 性一交一乱一伦| 最近中文字幕国产精选|