Is there any way to allow setuid daemon to access krb5 automounted nfs
directories? Specifically I'm looking to run spamassassin's spamd on a remote
server and access user's home directories via krb5 nfs4. spamd changes user
to the user receiving the email being processes and needs to modify files in
the user's home directory. Is there any reasonably secure way to give this
daemon the ability to do this? Any way to tell rpc.gssd to use a specific
credential cache for this type of access rather than the default for that
effective uid?
--
Orion Poplawski
Technical Manager 303-415-9701 x222
NWRA, Boulder Office FAX: 303-415-9702
3380 Mitchell Lane orion@xxxxxxxx
Boulder, CO 80301 http://www.nwra.com
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html