mount.cifs cannot mount with kerberos
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cifs-utils (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: cifs-utils
Please tell me if this is the wrong channel. I have put this in the ubuntu forum with no reply here:
http://
From the thread:
mount.cifs used to be able to work with kerberos tickets so long as I changed the binary to suid root. I understand why this may have fallen out of favour but since Meerkat, I am unable to get mount.cifs to mount using kerberos and sudo.
# Non sudo mount.cifs with/without suid root
$ mount.cifs //server/
mount.cifs: permission denied: no match for /home/CauserC/
# Sudo mount.cifs with/without suid root
$ sudo mount.cifs //server/
mount error(126): Required key not available
I do definitely have a kerberos ticket, and both klist and "sudo klist" show it to me.
Now, it does work if I do a "sudo kinit $USERNAME." Then a sudo mount.cifs mounts the share no problem. This is obviously less than ideal because it involves typing in a password again, and subsequent non sudo klists result in:
$ klist
klist: Credentials cache permissions incorrect while setting cache flags (ticket cache FILE:/tmp/
I'm tempted to file this as a bug report but wanted to check in here first to make sure that I'm not doing anything stupid. As I say, I never tried this in Lucid as suid root worked fine.
Any help appreciated
Chris
ProblemType: Bug
DistroRelease: Ubuntu 10.10
Package: smbfs 2:4.5-2
ProcVersionSign
Uname: Linux 2.6.35-
NonfreeKernelMo
Architecture: i386
Date: Wed Nov 17 15:20:14 2010
InstallationMedia: Ubuntu 10.04 LTS "Lucid Lynx" - Release i386 (20100429)
ProcEnviron:
PATH=(custom, user)
LANG=en_GB.UTF-8
SHELL=/bin/bash
SourcePackage: cifs-utils
Looking at the source and although I haven't tested it:
Line 1597: thisprogram, mountpoint, orig_dev,
if (getuid()) {
rc = check_fstab(
&orgoptions);
if (rc)
goto assemble_exit;
/* enable any default user mount flags */ info->flags |= CIFS_SETUID_FLAGS;
parsed_
}
If the conditional were changed to geteuid(), then running mount.cifs as suid root would not result in an fstab error. Obviously I'd rather not do that and work with sudo if at all possible.