On Thu, 23 Apr 2009 07:46:06 +0200, Frank Batschulat (Home) <Frank.Batschulat 
at sun.com> wrote:

> On Thu, 23 Apr 2009 07:34:45 +0200, Tom Haynes <Thomas.Haynes at sun.com> 
> wrote:
>
>> The credentials problem is a known bug.
>>
>> I just can't find the bug number right now.
>>
>> I *think* if you say:
>>
>> mount -o sec=sys ......
>>
>> it will start working as expected.
>>
>> There was a recent change to add server support for sec=none and the Linux 
>> client hands it out first if no security flavor is supplied.
>>
>> So, if you supply your flavor, you should not see the issue.
>
> yes, in build 108 we integrated real kernel RPC support for AUTH_NONE,
> previously it was silently matched and handled as AUTH_SYS
>
> 6790413 AUTH_NONE implementation in kernel RPC
> http://bugs.opensolaris.org/view_bug.do?bug_id=6790413
>
> it appears that the linux server as default has sec=none before sec=sys in 
> the share so
> we'd start using real AUTH_NONE support for the mount and future access 
> causing following problems
>
> 6828396 snv_111 sends wrong uid/gid to Linux NFSv3 server
> http://bugs.opensolaris.org/view_bug.do?bug_id=6828396
>
> since AUTH_NONE is the first security flavour our client gets from the Linux 
> server
> during mount, our client will then use AUTH_NONE for future access of course
> and will fail as described in 6828396
>
> using sec=sys as either the first flavour or leave out sec=none completely
> brings us back to AUTH_SYS.
>
> sample snoop to illustrate the problem:
>
>   5   0.00156 solaris-client -> linux-server MOUNT3 C Mount /v3-server-test
>   6   0.00859 linux-server -> solaris-client MOUNT3 R Mount OK FH=5F67 
> Auth=none,unix,390003,390004,390005

has also been discussed here:

http://www.opensolaris.org/jive/thread.jspa?threadID=99671&tstart=60

current workarounds:

1) on the linux server side, remove the sec=none from the share 
or
2) on the linux server side, explicitely share with sec=sys
or
3) on the solaris client side, comment out the 'none' entry from the list
    of supported security flavours in /etc/nfssec.conf
or
4) on the solaris client side, explicitely perform the mount with a security 
flavour
    specified other then sec=none

---
frankB

Reply via email to