share level security mounts and user credentials

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



For the case of mounts to servers (Windows 9x, Windows ME and some appliances etc.) which only support "share level" security (passwords on mounts, but no username) ... any opinions about the right multiuser behavior (in regards to credentials). cifs vfs has two security modes:

1) (default) credentials (the smb_uid on all network requests) used is always the same over the mount for all users on the system 2) (not default, but enabled when /proc/fs/cifs/MultiuserMount is set to 1) cifs client tries to find a matching smb_uid for the particular user corresponding to the local linux uid making the request

The difficulty with the latter is that we may have to multiplex among smb_tids (tree ids) to the same resource, each mounted with different passwords. It is common to have two different passwords on the same share (one for full access, one for read only access) so it is reasonable to assume that one uid would have all requests to that superblock use a different tid than other users - but it is odd because there is no username on the wire. Currently cifs code checks at mount time to see if we have a connection to the target server (ip address) with a particular username - but it looks like this has to change - we have to not only check if we have a particular connection with this password if it is a share level security server but also have to map access (when MultiuserMount is enabled) to that share from on tid to another based on the incoming uid.

Ideas?


-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux