On 09/02/2013 04:20 PM, Gordon Lack wrote: >>>>> What my patch does is to run the map script under the UID of the user requesting the mount, rather than root. >>>>> That is actually an improvement of the security situation, AFAICS. >>> >>> Possibly not. >> >> Can you explain? > > It won't be an improvement if it enables something that is inherently insecure. I don't think that it's inherently insecure, at least not any more than clicking on a network share in nautilus et al. UID/GID mapping between client and server and permission control is a general security challenge for Network file systems. That's not specific to CIFS, NFS has similar problems. Yet aufofs has had the "-hosts" map for a long time. My patch aims at something similar to '-hosts' for CIFS, using kerberos credentials for access control. For both NFS and CIFS, this kind of feature must not be enabled without proper security considerations, but that shouldn't be used as an argument not to implement the feature at all. >>> Which I take to mean that if you are specifying $UID in the mount options then you've just foiled this bit, the bit that you actually want. >> >> Permission checks are done on the server. > > Then why do you need to specify a specific UID at mount time? Depending on configuration, CIFS won't let you mount anything without credentials. You may have to be authorized just to see the list of shares. Once a user on a Windows client is logged in in AD (Kerberos), he will usually see all relevant shares and be able to access them in various ways. My goal is to provide a similarly easy access to users with AD credentials on Linux clients, and one that works on the command line too, not only from the GUI. >> On the client, without unix extensions, the user/group IDs of files may be displayed wrongly. >> That may confuse users because they may not be able to open files listed as owned by themselves, but >> it's not a security problem. > > OK - so now I'm confused. you mentioned the multiuser option to mount.cifs as something that enables individual users to get > their own individual access permissions. But you're also saying (above) that they won't. They will have individual access permissions. But without CIFS Unix extensions, stat(2) will not return real Unix user and group IDs on files or directories; instead every user will see his own user and group ID. The real user and group IDs on the server are the Active Directory Ids of the user owning the file. Regards Martin -- Dr. Martin Wilck PRIMERGY System Software Engineer x86 Server Engineering FUJITSU Fujitsu Technology Solutions GmbH Heinz-Nixdorf-Ring 1 33106 Paderborn, Germany Phone: ++49 5251 525 2796 Fax: ++49 5251 525 2820 Email: martin.wilck@xxxxxxxxxxxxxx Internet: http://ts.fujitsu.com Company Details: http://ts.fujitsu.com/imprint -- To unsubscribe from this list: send the line "unsubscribe autofs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html