Here is an interesting tidbit related to Windows security:
- Create a test file share, e.g. C:\temp\test, and share it with full permissions for eveyone (share, not NTFS permissions) as “test”
- Create the following directory hierarchy below the share: C:\temp\test\1\2\3\4
- Assign ownership of the four folders 1, 2, 3 and 4 to any user (but do not use your own account, just anyone else’s)
- Set permissions on 1, 2, 3 and 4 that only the user from the previous step has full access, nobody else, not even the SYSTEM
- Now try to use SetACL to change the owner of directory “4” over the network (SetACL uses backup and restore privileges so this should be no problem) by issuing the following command locally:
setacl -on \\localhost\test\1\2\3\4 -ot file -actn setowner -ownr n:domain\administrator
- SetACL will fail with access denied (full message: “ERROR: Writing SD to <\\?\UNC\localhost\test\1\2\3\4> failed with: Access is denied.”)
- Now issue the same command, but instead of using a UNC path use the local drive letter:
setacl -on c:\temp\test\1\2\3\4 -ot file -actn setowner -ownr n:domain\administrator
- That works!
Why is this so? I have no clue.
This is also documented in the FAQ for SetACL.