On Mon, Aug 24, 2009 at 01:06:58PM -0400, Trond Myklebust wrote: > On Mon, 2009-08-24 at 12:10 -0400, J. Bruce Fields wrote: > > On Fri, Aug 21, 2009 at 05:51:02PM -0400, Trond Myklebust wrote: > > > On Fri, 2009-08-21 at 17:47 -0400, J. Bruce Fields wrote: > > > > On Fri, Aug 21, 2009 at 05:40:36PM -0400, Trond Myklebust wrote: > > > > > On Fri, 2009-08-21 at 17:30 -0400, J. Bruce Fields wrote: > > > > > > 3c1bb23c037, first in 1.1.3, removes AUTH_NULL from that static > > > > > > list. > > > > > > > > > > Does the server support auth_null security? I didn't think it did. > > > > > > > > Just off the top of my head, without looking at the code: I believe it > > > > treats auth_null rpc calls exactly as if they were auth_sys calls with > > > > uid and gid set to the "anonymous" uid and gid. > > > > > > OK, so that would break too. > > > > I've lost track of the antecedent to "that". > > Negotiating AUTH_NULL security for those mountd programs that fake up a > list of flavours that excludes AUTH_NULL. OK, got it. (And note (a reminder to anyone that forgot) the omission of AUTH_NULL is a workaround for a bug in older mount.nfs which caused the client to prefer flavors at the end of the list. (Fixed in 3c1bb23c03, which went into 1.1.3. When was that bug introduced?) That means some clients read the list forwards, and some backwards, so if you want clients to avoid picking AUTH_NULL by default, there's no safe place to put it. Since AUTH_NULL seems rarely needed, it seemed best just to leave it off.) Anyway, we could add a second special case on the client side that allowed an explicit sec=null to bypass checking against the server list. I don't know who actually needs mounts with sec=null. And/or we could plan to put AUTH_NULL back on the server's list some day, depending on how widely disseminated we think the backwards mount behavior was.... --b. -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html