Re: Kerberized mount.cifs with SMB>1?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>
On 19/10/14 21:58, Jurjen Bokma wrote:
On 08/20/2014 07:16 PM, Jurjen Bokma wrote:
On 08/20/2014 04:43 PM, steve wrote:
On Wed, 2014-08-20 at 16:08 +0200, Jurjen Bokma wrote:
<snip>
The upcall has nothing to go on. Get it working with cifs first:

Who mounts the share? Add a domain user with a uid:gid key to the keytab
and:
<snip>
mount.cifs //your/share /mnt -ousername=cifsuser,sec=krb5
This works, as it uses SMB1. SMB1 also works *with* all the frills. But
it fails with 2.0, 2.1 or 3.0:

mount.cifs //your/share /mnt -ousername=cifsuser,sec=krb5,vers=3.0
<snip>

No matter whether I use my own Samba server or a Windows (2012) server,
vers=2.0 or vers=3.0 fails with "permission denied", while 'vers=1.0'
works perfectly:

mount.cifs //server.mydom.com/cnc  /mnt/cnc
-overs=1.0,sec=krb5,username=cifsuser,cruid=1234567,domain=MYDOM.COM

With SMB>1, no Kerberos traffic in Wireshark. If it is encapsulated,
that would explain a part. But the ticket still would have to be granted
by the Kerberos server, and I don't see that either. Also, request-key
is not being called with SMB>1. So I must conclude that Steve is right:
the upcall has nothing to go on. But how to tell it?

Any hints as to why this fails with SMB>1 would be much appreciated.

Best Regards

Not sure why you would want smb2 with Linux boxes. Does it improve performance? Loading a big jpg to gimp to a lxde client still beats a w7 client on the same hardware.
Cheers,

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux