Displaying 20 results from an estimated 1000 matches similar to: "ANNOUNCE: cifs-utils release 6.6 ready for download"
2017 Feb 10
2
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Thu, 2017-02-09 at 14:45 -0600, Chad William Seys wrote:
> Hi Jeff,
> Could you look at the following mailing list posting?
>
> https://lists.samba.org/archive/samba/2017-February/206468.html
>
> It looks like cifs.upcall has changed its behavior. As described in
> that post, I can mount with root / kerberos, but then cannot access with
> another user who has
2017 Feb 10
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 14:14 -0500, Simo Sorce wrote:
> On Fri, 2017-02-10 at 13:30 -0500, Jeff Layton wrote:
> > On Fri, 2017-02-10 at 12:39 -0500, Jeff Layton wrote:
> > > On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys wrote:
> > > > Hi Jeff,
> > > >
> > > > > So we have a default credcache for the user for whom we are
> > >
2017 Mar 02
0
cifs-utils release 6.7 ready for download
The main change in this release is to address some regressions that
crept in when we switched to a scheme that does not rely on walking /tmp
to look for credcaches.
We now will use the information from the kernel about the initiating
pid, reach into that task's environment and scrape out the $KRB5CCNAME
variable. This can be problematic in setuid situations, so we avoid
doing that for the
2013 Oct 04
0
ANNOUNCE: cifs-utils release 6.2 ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Again, nothing earth-shattering in this release. Mostly some minor
bugfixes and cleanups. Some highlights:
- - setcifsacl can now work without a plugin
- - systemd-ask-password is found using $PATH now
- - cifs.upcall now works with KEYRING: credcaches
Go forth and download!
webpage: https://wiki.samba.org/index.php/LinuxCIFS_utils
tarball:
2017 Feb 10
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 15:14 -0500, Simo Sorce wrote:
> On Fri, 2017-02-10 at 14:29 -0500, Jeff Layton wrote:
> > On Fri, 2017-02-10 at 14:14 -0500, Simo Sorce wrote:
> > > On Fri, 2017-02-10 at 13:30 -0500, Jeff Layton wrote:
> > > > On Fri, 2017-02-10 at 12:39 -0500, Jeff Layton wrote:
> > > > > On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys
2017 Feb 09
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
Hi Jeff,
Could you look at the following mailing list posting?
https://lists.samba.org/archive/samba/2017-February/206468.html
It looks like cifs.upcall has changed its behavior. As described in
that post, I can mount with root / kerberos, but then cannot access with
another user who has credentials.
The logs indicate that cifs.upcall cannot find the kerberos ticket for
the non-root user.
2017 Feb 13
0
[RFC][cifs-utils PATCH] cifs.upcall: allow scraping of KRB5CCNAME out of initiating task's /proc/<pid>/environ file
On Mon, 2017-02-13 at 05:02 -0500, Simo Sorce wrote:
> On Sat, 2017-02-11 at 10:16 -0500, Jeff Layton wrote:
> > On Sat, 2017-02-11 at 08:41 -0500, Jeff Layton wrote:
> > > Chad reported that he was seeing a regression in cifs-utils-6.6.
> > > Prior
> > > to that, cifs.upcall was able to find credcaches in non-default
> > > FILE:
> > >
2010 Jul 30
0
ANNOUNCE: cifs-utils release 4.6 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
It has been a while since I've cut a new release for cifs-utils. This
one has more visible changes than were in the last few releases. Major
highlights:
- - documentation additions for the fsc option
- - mount.cifs deals with _netdev, mand and nomand options correctly now
- - a change in how mount.cifs handles the MS_MANDLOCK flag. It used to
2017 Feb 10
5
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys wrote:
> Hi Jeff,
>
> > So we have a default credcache for the user for whom we are operating
> > as, but we can't get the default principal name from it. My guess is
> > that it's not finding the
>
> This mount is run by root UID=0 and seems to be find that credential
> cache without problem (earlier
2012 Oct 10
1
ANNOUNCE: cifs-utils release 5.6 is ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Time for another cifs-utils release!
Nothing terribly earth shattering here. Some distros (like Fedora) are
moving krb5 credcaches out of /tmp by default. Users of these distros
will definitely want to upgrade.
Highlights:
* Fixes for mounting with '/' in usernames with sec=krb5
* Support for DIR: type krb5 ccaches
* support for
2017 Feb 11
2
[RFC][cifs-utils PATCH] cifs.upcall: allow scraping of KRB5CCNAME out of initiating task's /proc/<pid>/environ file
Chad reported that he was seeing a regression in cifs-utils-6.6. Prior
to that, cifs.upcall was able to find credcaches in non-default FILE:
locations, but with the rework of that code, that ability was lost.
Unfortunately, the krb5 library design doesn't really take into account
the fact that we might need to find a credcache in a process that isn't
descended from the session.
When the
2012 Nov 11
0
ANNOUNCE: cifs-utils release 5.8 is ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Time for another cifs-utils release!
Most of the patches in this release are for cifs.idmap, getcifsacl and
setcifsacl. There were many bugs in those tools, so anyone that's
deploying or using them is highly encouraged to upgrade.
Highlights:
* NFS-style device names are being deprecated in 6.0. Anyone using that
sort of device name should
2012 Jan 28
0
ANNOUNCE: cifs-utils release 5.3 is ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
With the overhaul of the cifscreds utility, I figured this would be a
good time to do a new release.
Highlights:
* admins can now tell cifs.upcall to use an alternate krb5.conf file
* on remount, mount.cifs no longer adds a duplicate mtab entry
* the cifscreds utility has seen a major overhaul to allow for
multiuser mounts without krb5 auth
2013 Jan 07
0
ANNOUNCE: cifs-utils release 5.9 ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
With the merge of the new plugin interface, it's probably a good time
for a new cifs-utils release. Distro packagers should take special note
of the changes with the new plugin interface since it has implications
for how the tools are packaged. In particular, it's necessary to set a
symlink to the plugin in the correct location
2010 Mar 23
1
ANNOUNCE: cifs-utils release 4.1 available for download
This release is primarily a number of small bugfixes and cleanups. I
wanted to do a release with those prior to the coming overhaul of
mount.cifs to allow it to more safely be installed setuid root.
There a couple of other noticeable changes too:
- the version reported by all programs in the tarball now matches the
VERSION define set by autoconf. That is, if someone runs
"mount.cifs
2010 Apr 02
0
ANNOUNCE: cifs-utils release 4.2 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This release contains a significant overhaul of mount.cifs that is
intended to make it safer to install setuid root. With this release,
setuid capability is no longer disabled by default. Among the changes
are:
- - mount.cifs now does privilege separation. It forks very early and the
child drops privileges. Most of the mount option processing is
2011 Jan 16
0
ANNOUNCE: cifs-utils release 4.8 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The last release (4.7) was back in October. We've had a number of good
fixes committed in the last few weeks, so it's a good time to cut a new
release.
Also, note that I've transplanted the cifs-utils manpage to the Samba
Wiki. The old URL still works and redirects browsers to the new page.
o hardcoded paths in the cifs.upcall manpage
2010 Apr 09
0
ANNOUNCE: cifs-utils release 4.3 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This release is primarily to fix a few bugs that were introduced with
the mount.cifs overhaul in the last release. Most of the problems were
issues with the handling of capabilities that prevented credential files
from being accessed when mount.cifs was run by root.
There are a few other changes:
- - credential files accept parameter names
2011 Dec 10
0
ANNOUNCE: cifs-utils release 5.2 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Things have been relatively quiet lately. Time for a release!
Highlights:
* A lot of manpage updates, additions and corrections
* cifs.idmap can now map uid/gid to SID in addition to the other way around
* getcifsacl/setcifsacl are now installed by default in /usr/bin
instead of /usr/sbin. The manpages are now in section 1.
* cifs.upcall has a
2013 Mar 25
0
ANNOUNCE: cifs-utils release 6.0 ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
It has been a few months since the last cifs-utils release. There
hasn't been much activity, but there are a few bugfixes that we ought
to get into a release.
So, nothing much earth-shattering here, mostly just bugfixes and
documentation updates. With this release too, support for NFS-style
devicenames has now been removed (as previously