Displaying 20 results from an estimated 1000 matches similar to: "cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'"
2017 Feb 09
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
Chad William Seys via samba <samba at lists.samba.org> writes:
> But when cifs-utils 6.4-1 is installed (from jessie) the different
> user can access as expect. AFAIK there are no other differences besides
> the cifs-utils version.
Not counting any distro-specific patches it seems cifs.upcall only had 5
commits affecting it between these 2 releases:
$ git log
2013 Apr 11
1
Samba4 Does cifs need a keytab for the multiuser option?
Hi
samba --version
Version 4.0.6-GIT-4bebda4
smb.conf:
[users]
path = /home/users
read only = No
Working on the DC which is also the fileserver
user steve2 can write to his folder at /home/users/steve2
But if we now mount the share:
sudo mount -t cifs //doloresdc/users /mnt -osec=krb5,multiuser
he can't write to the mounted share at /mnt/users/steve2 He gets
'Permission denied'.
2017 Feb 10
5
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys wrote:
> Hi Jeff,
>
> > So we have a default credcache for the user for whom we are operating
> > as, but we can't get the default principal name from it. My guess is
> > that it's not finding the
>
> This mount is run by root UID=0 and seems to be find that credential
> cache without problem (earlier
2013 May 26
1
samba3 file-server crash for Samba4 DC
Hi
I have a s3 fileserver joined to a s4 DC
Here is smb.conf on the fileserver:
[global]
workgroup = HH3
realm = HH3.SITE
security = ADS
kerberos method = system keytab
winbind enum users = Yes
winbind enum groups = Yes
idmap config *:backend = tdb
idmap config *:range = 3000-4000
idmap config HH3:backend = ad
idmap config HH3:range = 20000-40000000
idmap config HH3:schema_mode = rfc2307
winbind
2017 Feb 10
2
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Thu, 2017-02-09 at 14:45 -0600, Chad William Seys wrote:
> Hi Jeff,
> Could you look at the following mailing list posting?
>
> https://lists.samba.org/archive/samba/2017-February/206468.html
>
> It looks like cifs.upcall has changed its behavior. As described in
> that post, I can mount with root / kerberos, but then cannot access with
> another user who has
2019 Jan 08
0
mount cifs with sec=krb5
Hai Mourik-Jan,
Beste wensen he ;-)
Lets start here..
A and PTR record exists for both servers?
Does CIFS/spn and root/spn exist in the AD?
In krb5.conf, set these :
; not used for nfs4 but cifs might need it.
; for Windows 2003
; default_tgs_enctypes = rc4-hmac des-cbc-crc des-cbc-md5
; default_tkt_enctypes = rc4-hmac des-cbc-crc des-cbc-md5
; permitted_enctypes = rc4-hmac
2019 Jan 07
2
mount cifs with sec=krb5
Hi,
I am trying to mount fileserver (samba, 10.20.30.16) shares on a linux
domain member server, where I logged on via ssh using AD my credentials.
I am unable to get past the "mount error(126): Required key not
available" error message. I have read and googled a lot, and could use
some help.
See this:
> domainuser at memberserver-45:~$ sudo tail -f /var/log/debug &
>
2024 Jan 26
1
permission denied with windows acls
On 1/26/24 02:35, Rowland Penny via samba wrote:
> On Thu, 25 Jan 2024 18:45:52 -0800 Peter Carlson via samba
> <samba at lists.samba.org> wrote:
>> The share mounts and I am a member of the correct groups
>> CARLSON\peter at u2gui:~$ cat /etc/fstab //fs.carlson.lab/test /mnt/test
>> cifs credentials=/root/smbcreds,multiuser,sec=ntlmssp,_netdev 0 0
> I think
2020 Mar 09
0
mount share using kerberos ticket fails
Did you "deleated the computer object" to allow kerberos services.
And did you add the CIFS/spn to the computer and keytab ?
https://wiki.samba.org/index.php/Generating_Keytabs
If its a member, which i assume.
kinit Administrator
net ads keytab add cifs/$(hostname -f) -k
net ads keytab add_update_ads -k
Add these and it should work.
You might need to restart or reboot., sometimes
2020 Mar 09
3
mount share using kerberos ticket fails
Hi list,
I joined a workstation (Debian 10, Samba from distribution) to our AD
domain (Windows 2012 Server). The domain ends by ".local" (yes I know,
not my fault).
However, after a domain user logged to the machine, I can't mount a
share that exists on the AD server using user's kerberos ticket: it
fails with error "Required key not available".
Mounting using
2020 Mar 09
1
mount share using kerberos ticket fails
After re-join
kinit Administrator
net ads keytab add cifs/$(hostname -f) -k
net ads keytab add_update_ads -k
samba-tool delegation for-any-service COMPUTERNAME$ on
( or use : delegation add-service accountname principal [options] )
Reboot
Should work now. ;-)
Greetz,
Louis
> -----Oorspronkelijk bericht-----
> Van: samba [mailto:samba-bounces at lists.samba.org] Namens Yvan
2020 Mar 09
2
mount share using kerberos ticket fails
Thanks for your help!
Le 09/03/2020 ? 15:39, L.P.H. van Belle via samba a ?crit?:
> Did you "deleated the computer object" to allow kerberos services.
> And did you add the CIFS/spn to the computer and keytab ?
>
I am sorry, I don't really understand the above: mount requires a keytab
AND a user ticket?
> https://wiki.samba.org/index.php/Generating_Keytabs
>
>
2017 Feb 10
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 14:14 -0500, Simo Sorce wrote:
> On Fri, 2017-02-10 at 13:30 -0500, Jeff Layton wrote:
> > On Fri, 2017-02-10 at 12:39 -0500, Jeff Layton wrote:
> > > On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys wrote:
> > > > Hi Jeff,
> > > >
> > > > > So we have a default credcache for the user for whom we are
> > >
2017 Feb 09
2
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
Hi Aurélien,
Thanks for the idea!
For Debian packages:
6.4-1 works
6.5-1 works
6.5-2 works
6.6-1 fails
6.6-5 fails
So looks like something changed from 6.5 to 6.6...
When I have time I'll figure out how to compile the upcall binary.
2017 Feb 10
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 15:14 -0500, Simo Sorce wrote:
> On Fri, 2017-02-10 at 14:29 -0500, Jeff Layton wrote:
> > On Fri, 2017-02-10 at 14:14 -0500, Simo Sorce wrote:
> > > On Fri, 2017-02-10 at 13:30 -0500, Jeff Layton wrote:
> > > > On Fri, 2017-02-10 at 12:39 -0500, Jeff Layton wrote:
> > > > > On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys
2023 Oct 15
1
reliability of mounting shares while login
Hi @all,
I have some problems when using pam_mount.conf.xml to mount shares via kerberos (and also for ntlm) regarding reliability of the mount. I have tested the issue with 2 different environments. My environments are: 2 Microsoft Domain Controllers + a separate fileserver and Ubuntu 18.04 or 22.04 as clients. My other tested environment is one Microsoft Server 2019 (as domain controller and
2015 Nov 02
4
Pam_mount not working with "sec=krb5"
Am 02.11.2015 um 15:10 schrieb buhorojo:
> On 02/11/15 14:42, Ole Traupe wrote:
>>
>> Am 02.11.2015 um 13:12 schrieb buhorojo:
>>> On 02/11/15 12:54, Ole Traupe wrote:
>
>>> Why can't the user do it with his own key file?
> Only root can perform mounts and anyway,
Right, sorry.
> cifs upcall looks for a key, not a cache.
So you just _have_ to use the
2017 Feb 09
0
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
Hi Jeff,
Could you look at the following mailing list posting?
https://lists.samba.org/archive/samba/2017-February/206468.html
It looks like cifs.upcall has changed its behavior. As described in
that post, I can mount with root / kerberos, but then cannot access with
another user who has credentials.
The logs indicate that cifs.upcall cannot find the kerberos ticket for
the non-root user.
2010 Jul 30
0
ANNOUNCE: cifs-utils release 4.6 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
It has been a while since I've cut a new release for cifs-utils. This
one has more visible changes than were in the last few releases. Major
highlights:
- - documentation additions for the fsc option
- - mount.cifs deals with _netdev, mand and nomand options correctly now
- - a change in how mount.cifs handles the MS_MANDLOCK flag. It used to
2015 Nov 02
0
Pam_mount not working with "sec=krb5"
On 02/11/15 15:51, Ole Traupe wrote:
>
>
> Am 02.11.2015 um 15:10 schrieb buhorojo:
>> On 02/11/15 14:42, Ole Traupe wrote:
>>>
>>> Am 02.11.2015 um 13:12 schrieb buhorojo:
>>>> On 02/11/15 12:54, Ole Traupe wrote:
>>
>>>> Why can't the user do it with his own key file?
>> Only root can perform mounts and anyway,
> Right,