Hello, I am trying to figure out how to make use of the new multiuser option in mount.cifs. What I am trying to accomplish is that on a server which is joined to an AD-Domain every user has access to their part on the shares without the need to add an fstab entry for every one of them. If I understood correctly this is what the multiuser option is for. >From what I understand I would have to mount the share (from the AD-DC) with some kind of server-account and then every user could just access that share while his own Kerberos ticket is used for granting permissions. My question is now how exactly to do the first part: - which kerberos ticket is used? - should I use the host Principal created by winbind when I joined the AD? I already tried to use it by setting 'kerberos method = secrets and keytab' in the smb.conf and then exporting it to /etc/krb5.keytab. via 'net ads keytab create -U euhus' But I still get: -------------------------- root@goto:~# mount -t cifs -o directio,sec=krb5i,multiuser //dc1.workgroup.intern/test /mnt/test/ mount error(126): Required key not available Refer to the mount.cifs(8) manual page (e.g. man mount.cifs) -------------------------- and in the log I found -------------------------- Jan 25 17:55:12 goto cifs.upcall: key description: cifs.spnego;0;0;3f000000;ver=0x2;host=dc1.workgroup.intern;ip4=130.75.5.220;sec=krb5;uid=0x0;user=root;pid=0x4bca Jan 25 17:55:12 goto cifs.upcall: ver=2 Jan 25 17:55:12 goto cifs.upcall: host=dc1.workgroup.intern Jan 25 17:55:12 goto cifs.upcall: ip=130.75.5.220 Jan 25 17:55:12 goto cifs.upcall: sec=1 Jan 25 17:55:12 goto cifs.upcall: uid=0 Jan 25 17:55:12 goto cifs.upcall: user=root Jan 25 17:55:12 goto cifs.upcall: pid=19402 Jan 25 17:55:12 goto cifs.upcall: find_krb5_cc: considering /tmp/krb5cc_101125 Jan 25 17:55:12 goto cifs.upcall: find_krb5_cc: /tmp/krb5cc_101125 is owned by 101125, not 0 Jan 25 17:55:12 goto cifs.upcall: krb5_get_init_creds_keytab: -1765328378 Jan 25 17:55:12 goto cifs.upcall: handle_krb5_mech: getting service ticket for cifs/dc1.workgroup.intern Jan 25 17:55:12 goto cifs.upcall: cifs_krb5_get_req: unable to resolve (null) to ccache Jan 25 17:55:12 goto cifs.upcall: handle_krb5_mech: failed to obtain service ticket (-1765328245) -------------------------- So it seems like I would somehow have to tell cifs.upcall to use the host key stored in /etc/krb5.keytab ? This is my /etc/request-key.conf: -------------------------- #OP TYPE DESCRIPTION CALLOUT INFO PROGRAM ARG1 ARG2 ARG3 ... #====== ======= =============== =============== =============================== create user debug:* negate /bin/keyctl negate %k 30 %S create user debug:loop:* * |/bin/cat create user debug:* * /usr/share/keyutils/request-key-debug.sh %k %d %c %S create cifs.spnego * * /usr/sbin/cifs.upcall -c %k create dns_resolver * * /usr/sbin/cifs.upcall %k negate * * * /bin/keyctl negate %k 30 %S -------------------------- Now I don't know what else to try, so any hints are very much appreciated. Thanks a lot. -- Robert Euhus, IT-Sicherheit, RRZN, Leibniz Universität Hannover Tel: +49-(0)511-762-79-4467 Schlosswender Str. 5 Fax: +49-(0)511-762-3003 D-30159 Hannover -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html