* ntsec.xml: More language and typo fixes.
This commit is contained in:
		| @@ -1,3 +1,7 @@ | |||||||
|  | 2014-10-24  Luke Kendall  <luke.kendall@cisra.canon.com.au> | ||||||
|  |  | ||||||
|  | 	* ntsec.xml: More language and typo fixes. | ||||||
|  |  | ||||||
| 2014-10-23  Corinna Vinschen  <corinna@vinschen.de> | 2014-10-23  Corinna Vinschen  <corinna@vinschen.de> | ||||||
|  |  | ||||||
| 	* ntsec.xml: Fix language. | 	* ntsec.xml: Fix language. | ||||||
|   | |||||||
| @@ -216,7 +216,7 @@ from the permission to change object data, and even changing object data | |||||||
| can be separated into different permission bits for different kind of | can be separated into different permission bits for different kind of | ||||||
| data.  But there's a problem with the definition of a "correct" ACL | data.  But there's a problem with the definition of a "correct" ACL | ||||||
| which disallows mapping of certain POSIX permissions cleanly.  See | which disallows mapping of certain POSIX permissions cleanly.  See | ||||||
| <xref linkend="ntsec-mapping"></xref>.</para> | <xref linkend="ntsec-files"></xref>.</para> | ||||||
|  |  | ||||||
| <para>POSIX is able to create only three different permissions?  Not quite. | <para>POSIX is able to create only three different permissions?  Not quite. | ||||||
| Newer operating systems and file systems on POSIX systems also provide | Newer operating systems and file systems on POSIX systems also provide | ||||||
| @@ -241,8 +241,8 @@ contain an expanded copy of the full information from | |||||||
| </para> | </para> | ||||||
|  |  | ||||||
| <para> | <para> | ||||||
| This approach has a few downsides.  One of them is that the idea to have | This approach has a few downsides.  One of them is that the idea that these | ||||||
| always small files is flawed.  Another one is that reading the entire | files will always be small, is flawed.  Another one is that reading the entire | ||||||
| file is most of the time entirely useless, since most processes only | file is most of the time entirely useless, since most processes only | ||||||
| need information on their own user and the primary group.  Last but not | need information on their own user and the primary group.  Last but not | ||||||
| least, the passwd and group files have to be maintained separately from | least, the passwd and group files have to be maintained separately from | ||||||
| @@ -252,7 +252,7 @@ Directory. | |||||||
|  |  | ||||||
| <para> | <para> | ||||||
| On the other hand, we have to have this mapping between Windows SIDs and | On the other hand, we have to have this mapping between Windows SIDs and | ||||||
| POSIX uid/gid values, so we rely on some mechanism to convert SIDs to uid/gid | POSIX uid/gid values, so we need a mechanism to convert SIDs to uid/gid | ||||||
| values and vice versa. | values and vice versa. | ||||||
| </para> | </para> | ||||||
|  |  | ||||||
| @@ -260,7 +260,7 @@ values and vice versa. | |||||||
| Microsoft "Services for UNIX" (SFU) (deprecated since Windows 8/Server 2012) | Microsoft "Services for UNIX" (SFU) (deprecated since Windows 8/Server 2012) | ||||||
| never used passwd/group files.  Rather, SFU used a fixed, computational mapping | never used passwd/group files.  Rather, SFU used a fixed, computational mapping | ||||||
| between SIDs and POSIX uid/gid which even has Active Directory support.  It | between SIDs and POSIX uid/gid which even has Active Directory support.  It | ||||||
| allows to generate uid/gid values from SIDs and vice versa.  The mechanism is | allows us to generate uid/gid values from SIDs and vice versa.  The mechanism is | ||||||
| documented, albeit in a confusing way and spread over multiple MSDN articles. | documented, albeit in a confusing way and spread over multiple MSDN articles. | ||||||
| </para> | </para> | ||||||
|  |  | ||||||
| @@ -284,8 +284,8 @@ Cygwin's mapping between SIDs and uid/gid values works in two ways. | |||||||
|  |  | ||||||
| <itemizedlist spacing="compact"> | <itemizedlist spacing="compact"> | ||||||
| <listitem><para>Read <filename>/etc/passwd<filename> and | <listitem><para>Read <filename>/etc/passwd<filename> and | ||||||
| </filename>/etc/group</filename> files, just as in the olden days, mainly for | </filename>/etc/group</filename> files if they exist, just as in the olden | ||||||
| backward compatibility.</para></listitem> | days, mainly for backward compatibility.</para></listitem> | ||||||
| <listitem><para>If no files are present, or if an entry is missing in the files, | <listitem><para>If no files are present, or if an entry is missing in the files, | ||||||
| ask Windows.</para></listitem> | ask Windows.</para></listitem> | ||||||
| </itemizedlist> | </itemizedlist> | ||||||
| @@ -298,8 +298,8 @@ for now. | |||||||
| </para> | </para> | ||||||
|  |  | ||||||
| <para> | <para> | ||||||
| If files are present, they will be scanned on demand as soon as a | If the passwd or group files are present, they will be scanned on demand as | ||||||
| mapping from SIDs to uid/gid or account names is required.  The new | soon as a mapping from SIDs to uid/gid or account names is required.  The new | ||||||
| mechanism will never read the entire file into memory, but only scan for | mechanism will never read the entire file into memory, but only scan for | ||||||
| the requested entry and cache this one in memory. | the requested entry and cache this one in memory. | ||||||
| </para> | </para> | ||||||
| @@ -406,9 +406,9 @@ Other well-known SIDs: | |||||||
|  |  | ||||||
| <listitem> | <listitem> | ||||||
| <para> | <para> | ||||||
| Logon SIDs: The own LogonSid is converted to the fixed uid 0xfff == 4095 and | Logon SIDs: The LogonSid of the current user's session is converted to the | ||||||
| named "CurrentSession".  Any other LogonSid is converted to the fixed uid | fixed uid 0xfff == 4095 and named "CurrentSession".  Any other LogonSid is | ||||||
| 0xffe == 4094 and named "OtherSession". | converted to the fixed uid 0xffe == 4094 and named "OtherSession". | ||||||
| </para> | </para> | ||||||
| </listitem> | </listitem> | ||||||
|  |  | ||||||
| @@ -509,7 +509,7 @@ permission denied.  In this case Cygwin will fake a sensible | |||||||
| </para> | </para> | ||||||
|  |  | ||||||
| <para> | <para> | ||||||
| Another problem is if the AD administrators chose an unreasonable small | Another problem is if the AD administrators chose an unreasonably small | ||||||
| <literal>trustPosixOffset</literal> value.  Anything below the hexadecimal | <literal>trustPosixOffset</literal> value.  Anything below the hexadecimal | ||||||
| value 0x100000 (the POSIX offset of the primary domain) is bound to produce | value 0x100000 (the POSIX offset of the primary domain) is bound to produce | ||||||
| collisions with system accounts as well as local accounts.  The right thing | collisions with system accounts as well as local accounts.  The right thing | ||||||
| @@ -545,12 +545,12 @@ for its local account. | |||||||
| <para> | <para> | ||||||
| Now we have a semi-bijective mapping between SIDs and POSIX uid/gid values, | Now we have a semi-bijective mapping between SIDs and POSIX uid/gid values, | ||||||
| but given that we have potentially users and groups in different domains having | but given that we have potentially users and groups in different domains having | ||||||
| the same name, how do we uniquely differ between them by name?  Well, we can do | the same name, how do we uniquely distinguish between them by name?  Well, we | ||||||
| that by making their names unique in a per-machine way.  Dependent on the | can do that by making their names unique in a per-machine way.  Dependent on | ||||||
| domain membership of the account, and dependent of the machine being a domain | the domain membership of the account, and dependent of the machine being a | ||||||
| member or not, the user and group names will be generated using a domain prefix | domain member or not, the user and group names will be generated using a domain | ||||||
| and a separator character between domain and account name.  The <!-- default --> | prefix and a separator character between domain and account name. | ||||||
| separator character is the plus sign, <literal>+</literal>. | The <!-- default --> separator character is the plus sign, <literal>+</literal>. | ||||||
| </para> | </para> | ||||||
|  |  | ||||||
| <itemizedlist spacing="compact"> | <itemizedlist spacing="compact"> | ||||||
| @@ -649,7 +649,7 @@ You want to use a Cygwin username different from your Windows username. | |||||||
| <note><para> | <note><para> | ||||||
| Note: This is only supported via <filename>/etc/passwd</filename> and | Note: This is only supported via <filename>/etc/passwd</filename> and | ||||||
| <filename>/etc/group</filename> files.  A Cygwin username maintained in | <filename>/etc/group</filename> files.  A Cygwin username maintained in | ||||||
| the Windows user databases would require very costly (read: slow) seach | the Windows user databases would require very costly (read: slow) search | ||||||
| operations. | operations. | ||||||
| </para></note> | </para></note> | ||||||
| </listitem> | </listitem> | ||||||
| @@ -909,7 +909,7 @@ at the time, <command>mintty</command>, the shell, and all child processes will | |||||||
| use <command><link linkend="using-cygserver">cygserver</link></command> caching. | use <command><link linkend="using-cygserver">cygserver</link></command> caching. | ||||||
| If you start a Cygwin Terminal and | If you start a Cygwin Terminal and | ||||||
| <command><link linkend="using-cygserver">cygserver</link></command> is not | <command><link linkend="using-cygserver">cygserver</link></command> is not | ||||||
| running a the time, none of the processes started inside this terminal window | running at the time, none of the processes started inside this terminal window | ||||||
| will use <command><link linkend="using-cygserver">cygserver</link></command> | will use <command><link linkend="using-cygserver">cygserver</link></command> | ||||||
| caching. | caching. | ||||||
| </para> | </para> | ||||||
| @@ -933,7 +933,7 @@ be cached inside the process itself and, again, propagated to child processes. | |||||||
| <para> | <para> | ||||||
| Microsoft's NFS client does not map the uid/gid values on the NFS shares | Microsoft's NFS client does not map the uid/gid values on the NFS shares | ||||||
| to SIDs.  There's no such thing as a (fake) security descriptor returned | to SIDs.  There's no such thing as a (fake) security descriptor returned | ||||||
| to the application.  Rather, via an undocumented API an applications can | to the application.  Rather, via an undocumented APIr an application can | ||||||
| fetch <ulink url="https://tools.ietf.org/html/rfc1813">RFC 1813</ulink> | fetch <ulink url="https://tools.ietf.org/html/rfc1813">RFC 1813</ulink> | ||||||
| compatible NFSv3 stat information from the share.  This is what Cygwin is | compatible NFSv3 stat information from the share.  This is what Cygwin is | ||||||
| using to show stat information for files on NFS shares. | using to show stat information for files on NFS shares. | ||||||
| @@ -965,7 +965,7 @@ in the attribute <literal>uidNumber</literal>.  For groups, the gid is in the | |||||||
| </para> | </para> | ||||||
|  |  | ||||||
| <para> | <para> | ||||||
| When Cygwin stat's files on an NFS share, it asks the mapping server via | When Cygwin stat()s files on an NFS share, it asks the mapping server via | ||||||
| LDAP in two different ways, depending on the role of the mapping server. | LDAP in two different ways, depending on the role of the mapping server. | ||||||
| </para> | </para> | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user