|
|
5eee7b |
From 2f36d879c3522fe423ffd14fb7e568cdc9df0b48 Mon Sep 17 00:00:00 2001
|
|
|
5eee7b |
From: Aurelien Aptel <aaptel@suse.com>
|
|
|
5eee7b |
Date: Tue, 15 May 2018 10:12:32 +0200
|
|
|
5eee7b |
Subject: [PATCH 01/36] docs: cleanup rst formating
|
|
|
5eee7b |
|
|
|
5eee7b |
Signed-off-by: Aurelien Aptel <aaptel@suse.com>
|
|
|
5eee7b |
Reviewed-by: Steve French <smfrench@gmail.com>
|
|
|
5eee7b |
Reviewed-by: Pavel Shilovsky <piastryyy@gmail.com>
|
|
|
5eee7b |
(cherry picked from commit 81dcfb24f54a5757f7c9fe08285bf527b8333506)
|
|
|
5eee7b |
Signed-off-by: Sachin Prabhu <sprabhu@redhat.com>
|
|
|
5eee7b |
---
|
|
|
5eee7b |
cifs.idmap.rst.in | 71 ++++++-------------
|
|
|
5eee7b |
cifs.upcall.rst.in | 200 ++++++++++++++++++++---------------------------------
|
|
|
5eee7b |
cifscreds.rst | 92 ++++++++----------------
|
|
|
5eee7b |
getcifsacl.rst.in | 40 +++--------
|
|
|
5eee7b |
idmapwb.rst.in | 19 +++--
|
|
|
5eee7b |
mount.cifs.rst | 9 ++-
|
|
|
5eee7b |
pam_cifscreds.rst | 61 +++++-----------
|
|
|
5eee7b |
setcifsacl.rst.in | 143 ++++++++++----------------------------
|
|
|
5eee7b |
8 files changed, 201 insertions(+), 434 deletions(-)
|
|
|
5eee7b |
|
|
|
5eee7b |
diff --git a/cifs.idmap.rst.in b/cifs.idmap.rst.in
|
|
|
5eee7b |
index 91b585e..60d7f0a 100644
|
|
|
5eee7b |
--- a/cifs.idmap.rst.in
|
|
|
5eee7b |
+++ b/cifs.idmap.rst.in
|
|
|
5eee7b |
@@ -11,124 +11,93 @@ Userspace helper for mapping ids for Common Internet File System (CIFS)
|
|
|
5eee7b |
SYNOPSIS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-cifs.idmap [--help|-h] [--timeout|-t] [--version|-v] {keyid}
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ cifs.idmap [--help|-h] [--timeout|-t] [--version|-v] {keyid}
|
|
|
5eee7b |
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
This tool is part of the cifs-utils suite.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.idmap**\ is a userspace helper program for the linux CIFS client
|
|
|
5eee7b |
+``cifs.idmap`` is a userspace helper program for the linux CIFS client
|
|
|
5eee7b |
filesystem. There are a number of activities that the kernel cannot
|
|
|
5eee7b |
easily do itself. This program is a callout program that does these
|
|
|
5eee7b |
things for the kernel and then returns the result.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.idmap**\ is generally intended to be run when the kernel calls
|
|
|
5eee7b |
+``cifs.idmap`` is generally intended to be run when the kernel calls
|
|
|
5eee7b |
request-key(8) for a particular key type. While it can be run
|
|
|
5eee7b |
directly from the command-line, it is not generally intended to be run
|
|
|
5eee7b |
that way.
|
|
|
5eee7b |
|
|
|
5eee7b |
-This program is only called if a share is mounted with the \ **cifsacl**\
|
|
|
5eee7b |
+This program is only called if a share is mounted with the ``cifsacl``
|
|
|
5eee7b |
mount option. The kernel will only upcall to do this conversion if
|
|
|
5eee7b |
that mount option is specified.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.idmap**\ relies on a plugin to handle the ID mapping. If it can't
|
|
|
5eee7b |
+``cifs.idmap`` relies on a plugin to handle the ID mapping. If it can't
|
|
|
5eee7b |
find the plugin then it will not work properly. The plugin (or a
|
|
|
5eee7b |
symlink to it) must be at @pluginpath@.
|
|
|
5eee7b |
|
|
|
5eee7b |
-In the case where \ **cifs.idmap**\ or the plugin are unavailable, file
|
|
|
5eee7b |
+In the case where ``cifs.idmap`` or the plugin are unavailable, file
|
|
|
5eee7b |
objects in a mounted share are assigned uid and gid of the credentials
|
|
|
5eee7b |
of the process that mounted the share. It is strongly recomemended to
|
|
|
5eee7b |
use mount options of uid and gid to specify a default uid and gid to
|
|
|
5eee7b |
map owner SIDs and group SIDs in this situation.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
+--help|-h
|
|
|
5eee7b |
+ Print the usage message and exit.
|
|
|
5eee7b |
|
|
|
5eee7b |
+--timeout|-t
|
|
|
5eee7b |
+ Set the expiration timer, in seconds on the key. The default is 600
|
|
|
5eee7b |
+ seconds (10 minutes). Setting this to 0 will cause the key to never
|
|
|
5eee7b |
+ expire.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **--help|-h**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Print the usage message and exit.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--timeout|-t**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Set the expiration timer, in seconds on the key. The default is 600
|
|
|
5eee7b |
- seconds (10 minutes). Setting this to 0 will cause the key to never
|
|
|
5eee7b |
- expire.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--version|-v**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Print version number and exit.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+--version|-v
|
|
|
5eee7b |
+ Print version number and exit.
|
|
|
5eee7b |
|
|
|
5eee7b |
************************
|
|
|
5eee7b |
CONFIGURATION FOR KEYCTL
|
|
|
5eee7b |
************************
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **cifs.idmap**\ is designed to be called from the kernel via the
|
|
|
5eee7b |
+``cifs.idmap`` is designed to be called from the kernel via the
|
|
|
5eee7b |
request-key callout program. This requires that request-key be told
|
|
|
5eee7b |
-where and how to call this program. Currently \ **cifs.idmap**\ handles a
|
|
|
5eee7b |
-key type of:
|
|
|
5eee7b |
+where and how to call this program. Currently ``cifs.idmap`` handles a
|
|
|
5eee7b |
+key type of::
|
|
|
5eee7b |
|
|
|
5eee7b |
+ cifs.idmap
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.idmap**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This keytype is for mapping a SID to either an uid or a gid
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+This keytype is for mapping a SID to either an uid or a gid.
|
|
|
5eee7b |
|
|
|
5eee7b |
To make this program useful for CIFS, you will need to set up entry for it in
|
|
|
5eee7b |
-request-key.conf(5). Here is an example of an entry for this key type:
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
+request-key.conf(5). Here is an example of an entry for this key type::
|
|
|
5eee7b |
|
|
|
5eee7b |
#OPERATION TYPE D C PROGRAM ARG1 ARG2...
|
|
|
5eee7b |
#========= ============= = = ================================
|
|
|
5eee7b |
create cifs.idmap * * @sbindir@/cifs.idmap %k
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
See request-key.conf(5) for more info on each field.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
NOTES
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Support for upcalls to cifs.idmap was initially introduced in the 3.0
|
|
|
5eee7b |
kernel.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
request-key.conf(5), mount.cifs(8)
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
******
|
|
|
5eee7b |
AUTHOR
|
|
|
5eee7b |
******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Shirish Pargaonkar wrote the cifs.idmap program.
|
|
|
5eee7b |
|
|
|
5eee7b |
The Linux CIFS Mailing list is the preferred place to ask questions
|
|
|
5eee7b |
regarding these programs.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
diff --git a/cifs.upcall.rst.in b/cifs.upcall.rst.in
|
|
|
5eee7b |
index 8f4ee62..1b8df3f 100644
|
|
|
5eee7b |
--- a/cifs.upcall.rst.in
|
|
|
5eee7b |
+++ b/cifs.upcall.rst.in
|
|
|
5eee7b |
@@ -7,178 +7,131 @@ Userspace upcall helper for Common Internet File System (CIFS)
|
|
|
5eee7b |
--------------------------------------------------------------
|
|
|
5eee7b |
:Manual section: 8
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SYNOPSIS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- cifs.upcall [--trust-dns|-t] [--version|-v] [--legacy-uid|-l]
|
|
|
5eee7b |
- [--krb5conf=/path/to/krb5.conf|-k /path/to/krb5.conf]
|
|
|
5eee7b |
- [--keytab=/path/to/keytab|-K /path/to/keytab] {keyid}
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ cifs.upcall [--trust-dns|-t] [--version|-v] [--legacy-uid|-l]
|
|
|
5eee7b |
+ [--krb5conf=/path/to/krb5.conf|-k /path/to/krb5.conf]
|
|
|
5eee7b |
+ [--keytab=/path/to/keytab|-K /path/to/keytab] {keyid}
|
|
|
5eee7b |
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
This tool is part of the cifs-utils suite.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.upcall**\ is a userspace helper program for the linux CIFS client
|
|
|
5eee7b |
+``cifs.upcall`` is a userspace helper program for the linux CIFS client
|
|
|
5eee7b |
filesystem. There are a number of activities that the kernel cannot
|
|
|
5eee7b |
easily do itself. This program is a callout program that does these
|
|
|
5eee7b |
things for the kernel and then returns the result.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.upcall**\ is generally intended to be run when the kernel calls
|
|
|
5eee7b |
+``cifs.upcall`` is generally intended to be run when the kernel calls
|
|
|
5eee7b |
request-key(8) for a particular key type. While it can be run
|
|
|
5eee7b |
directly from the command-line, it's not generally intended to be run
|
|
|
5eee7b |
that way.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-c**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This option is deprecated and is currently ignored.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--no-env-probe|-E**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Normally, \ **cifs.upcall**\ will probe the environment variable space of
|
|
|
5eee7b |
- the process that initiated the upcall in order to fetch the value of
|
|
|
5eee7b |
- \ ``$KRB5CCNAME``\ . This can assist the program with finding credential
|
|
|
5eee7b |
- caches in non-default locations. If this option is set, then the
|
|
|
5eee7b |
- program won't do this and will rely on finding credcaches in the
|
|
|
5eee7b |
- default locations specified in \ *krb5.conf*\ . Note that this is never
|
|
|
5eee7b |
- performed when the uid is 0. The default credcache location is always
|
|
|
5eee7b |
- used when the uid is 0, regardless of the environment variable setting
|
|
|
5eee7b |
- in the process.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--krb5conf|-k=/path/to/krb5.conf**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This option allows administrators to set an alternate location for the
|
|
|
5eee7b |
- \ *krb5.conf*\ file that \ **cifs.upcall**\ will use.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--keytab=|-K=/path/to/keytab**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This option allows administrators to specify a keytab file to be
|
|
|
5eee7b |
- used. When a user has no credential cache already established,
|
|
|
5eee7b |
- \ **cifs.upcall**\ will attempt to use this keytab to acquire them. The
|
|
|
5eee7b |
- default is the system-wide keytab \ */etc/krb5.keytab*\ .
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--trust-dns|-t**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- With krb5 upcalls, the name used as the host portion of the service
|
|
|
5eee7b |
- principal defaults to the hostname portion of the UNC. This option
|
|
|
5eee7b |
- allows the upcall program to reverse resolve the network address of
|
|
|
5eee7b |
- the server in order to get the hostname.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This is less secure than not trusting DNS. When using this option,
|
|
|
5eee7b |
- it's possible that an attacker could get control of DNS and trick the
|
|
|
5eee7b |
- client into mounting a different server altogether. It's preferable to
|
|
|
5eee7b |
- instead add server principals to the KDC for every possible hostname,
|
|
|
5eee7b |
- but this option exists for cases where that isn't possible. The
|
|
|
5eee7b |
- default is to not trust reverse hostname lookups in this fashion.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--legacy-uid|-l**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Traditionally, the kernel has sent only a single uid= parameter to the
|
|
|
5eee7b |
- upcall for the SPNEGO upcall that's used to determine what user's
|
|
|
5eee7b |
- credential cache to use. This parameter is affected by the \ **uid=**\
|
|
|
5eee7b |
- mount option, which also governs the ownership of files on the mount.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Newer kernels send a creduid= option as well, which contains what uid
|
|
|
5eee7b |
- it thinks actually owns the credentials that it's looking for. At
|
|
|
5eee7b |
- mount time, this is generally set to the real uid of the user doing
|
|
|
5eee7b |
- the mount. For multisession mounts, it's set to the fsuid of the mount
|
|
|
5eee7b |
- user. Set this option if you want cifs.upcall to use the older \ **uid=**\
|
|
|
5eee7b |
- parameter instead of the creduid= parameter.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **--version|-v**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Print version number and exit.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+-c
|
|
|
5eee7b |
+ This option is deprecated and is currently ignored.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+--no-env-probe|-E
|
|
|
5eee7b |
+ Normally, ``cifs.upcall`` will probe the environment variable space of
|
|
|
5eee7b |
+ the process that initiated the upcall in order to fetch the value of
|
|
|
5eee7b |
+ ``$KRB5CCNAME``. This can assist the program with finding credential
|
|
|
5eee7b |
+ caches in non-default locations. If this option is set, then the
|
|
|
5eee7b |
+ program won't do this and will rely on finding credcaches in the
|
|
|
5eee7b |
+ default locations specified in *krb5.conf*. Note that this is never
|
|
|
5eee7b |
+ performed when the uid is 0. The default credcache location is always
|
|
|
5eee7b |
+ used when the uid is 0, regardless of the environment variable setting
|
|
|
5eee7b |
+ in the process.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+--krb5conf|-k=/path/to/krb5.conf
|
|
|
5eee7b |
+ This option allows administrators to set an alternate location for the
|
|
|
5eee7b |
+ *krb5.conf* file that ``cifs.upcall`` will use.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+--keytab=|-K=/path/to/keytab
|
|
|
5eee7b |
+ This option allows administrators to specify a keytab file to be
|
|
|
5eee7b |
+ used. When a user has no credential cache already established,
|
|
|
5eee7b |
+ ``cifs.upcall`` will attempt to use this keytab to acquire them. The
|
|
|
5eee7b |
+ default is the system-wide keytab */etc/krb5.keytab*.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+--trust-dns|-t
|
|
|
5eee7b |
+ With krb5 upcalls, the name used as the host portion of the service
|
|
|
5eee7b |
+ principal defaults to the hostname portion of the UNC. This option
|
|
|
5eee7b |
+ allows the upcall program to reverse resolve the network address of
|
|
|
5eee7b |
+ the server in order to get the hostname.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+ This is less secure than not trusting DNS. When using this option,
|
|
|
5eee7b |
+ it's possible that an attacker could get control of DNS and trick the
|
|
|
5eee7b |
+ client into mounting a different server altogether. It's preferable to
|
|
|
5eee7b |
+ instead add server principals to the KDC for every possible hostname,
|
|
|
5eee7b |
+ but this option exists for cases where that isn't possible. The
|
|
|
5eee7b |
+ default is to not trust reverse hostname lookups in this fashion.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+--legacy-uid|-l
|
|
|
5eee7b |
+ Traditionally, the kernel has sent only a single uid= parameter to the
|
|
|
5eee7b |
+ upcall for the SPNEGO upcall that's used to determine what user's
|
|
|
5eee7b |
+ credential cache to use. This parameter is affected by the uid=
|
|
|
5eee7b |
+ mount option, which also governs the ownership of files on the mount.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+ Newer kernels send a creduid= option as well, which contains what uid
|
|
|
5eee7b |
+ it thinks actually owns the credentials that it's looking for. At
|
|
|
5eee7b |
+ mount time, this is generally set to the real uid of the user doing
|
|
|
5eee7b |
+ the mount. For multisession mounts, it's set to the fsuid of the mount
|
|
|
5eee7b |
+ user. Set this option if you want cifs.upcall to use the older uid=
|
|
|
5eee7b |
+ parameter instead of the creduid= parameter.
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+--version|-v
|
|
|
5eee7b |
+ Print version number and exit.
|
|
|
5eee7b |
|
|
|
5eee7b |
************************
|
|
|
5eee7b |
CONFIGURATION FOR KEYCTL
|
|
|
5eee7b |
************************
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **cifs.upcall**\ is designed to be called from the kernel via the
|
|
|
5eee7b |
+``cifs.upcall`` is designed to be called from the kernel via the
|
|
|
5eee7b |
request-key callout program. This requires that request-key be told
|
|
|
5eee7b |
-where and how to call this program. The current \ **cifs.upcall**\
|
|
|
5eee7b |
+where and how to call this program. The current ``cifs.upcall``
|
|
|
5eee7b |
program handles two different key types:
|
|
|
5eee7b |
|
|
|
5eee7b |
+cifs.spnego
|
|
|
5eee7b |
+ This keytype is for retrieving kerberos session keys
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+dns_resolver
|
|
|
5eee7b |
+ This key type is for resolving hostnames into IP addresses. Support
|
|
|
5eee7b |
+ for this key type may eventually be deprecated (see below).
|
|
|
5eee7b |
+
|
|
|
5eee7b |
+ To make this program useful for CIFS, you'll need to set up entries
|
|
|
5eee7b |
+ for them in request-key.conf(5). Here's an example of an entry for
|
|
|
5eee7b |
+ each key type::
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **cifs.spnego**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This keytype is for retrieving kerberos session keys
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **dns_resolver**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- This key type is for resolving hostnames into IP addresses. Support
|
|
|
5eee7b |
- for this key type may eventually be deprecated (see below).
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- To make this program useful for CIFS, you'll need to set up entries
|
|
|
5eee7b |
- for them in request-key.conf(5). Here's an example of an entry for
|
|
|
5eee7b |
- each key type:
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- .. code-block:: perl
|
|
|
5eee7b |
-
|
|
|
5eee7b |
#OPERATION TYPE D C PROGRAM ARG1 ARG2...
|
|
|
5eee7b |
#========= ============= = = ================================
|
|
|
5eee7b |
create cifs.spnego * * @sbindir@/cifs.upcall %k
|
|
|
5eee7b |
create dns_resolver * * @sbindir@/cifs.upcall %k
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- See request-key.conf(5) for more info on each field.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- The keyutils package has also started including a dns_resolver
|
|
|
5eee7b |
- handling program as well that is preferred over the one in
|
|
|
5eee7b |
- \ **cifs.upcall.**\ If you are using a keyutils version equal to or
|
|
|
5eee7b |
- greater than 1.5, you should use \ ``key.dns_resolver``\ to handle the
|
|
|
5eee7b |
- \ ``dns_resolver``\ keytype instead of \ **cifs.upcall**\ . See
|
|
|
5eee7b |
- key.dns_resolver(8) for more info.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
|
|
|
5eee7b |
+ See request-key.conf(5) for more info on each field.
|
|
|
5eee7b |
|
|
|
5eee7b |
+ The keyutils package has also started including a dns_resolver
|
|
|
5eee7b |
+ handling program as well that is preferred over the one in
|
|
|
5eee7b |
+ ``cifs.upcall``. If you are using a keyutils version equal to or
|
|
|
5eee7b |
+ greater than 1.5, you should use ``key.dns_resolver`` to handle the
|
|
|
5eee7b |
+ ``dns_resolver`` keytype instead of ``cifs.upcall``. See
|
|
|
5eee7b |
+ key.dns_resolver(8) for more info.
|
|
|
5eee7b |
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
request-key.conf(5), mount.cifs(8), key.dns_resolver(8)
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
******
|
|
|
5eee7b |
AUTHOR
|
|
|
5eee7b |
******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Igor Mammedov wrote the cifs.upcall program.
|
|
|
5eee7b |
|
|
|
5eee7b |
Jeff Layton authored this manpage.
|
|
|
5eee7b |
@@ -187,4 +140,3 @@ The maintainer of the Linux CIFS VFS is Steve French.
|
|
|
5eee7b |
|
|
|
5eee7b |
The Linux CIFS Mailing list is the preferred place to ask questions
|
|
|
5eee7b |
regarding these programs.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
diff --git a/cifscreds.rst b/cifscreds.rst
|
|
|
5eee7b |
index 5c2a195..a6676cb 100644
|
|
|
5eee7b |
--- a/cifscreds.rst
|
|
|
5eee7b |
+++ b/cifscreds.rst
|
|
|
5eee7b |
@@ -5,125 +5,91 @@ cifscreds
|
|
|
5eee7b |
-----------------------------------------
|
|
|
5eee7b |
manage NTLM credentials in kernel keyring
|
|
|
5eee7b |
-----------------------------------------
|
|
|
5eee7b |
-
|
|
|
5eee7b |
:Manual section: 1
|
|
|
5eee7b |
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SYNOPSIS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-cifscreds add|clear|clearall|update [-u username] [-d] host|domain
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ cifscreds add|clear|clearall|update [-u username] [-d] host|domain
|
|
|
5eee7b |
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-The \ **cifscreds**\ program is a tool for managing credentials (username
|
|
|
5eee7b |
+The ``cifscreds`` program is a tool for managing credentials (username
|
|
|
5eee7b |
and password) for the purpose of establishing sessions in multiuser
|
|
|
5eee7b |
mounts.
|
|
|
5eee7b |
|
|
|
5eee7b |
When a cifs filesystem is mounted with the "multiuser" option, and does
|
|
|
5eee7b |
not use krb5 authentication, it needs to be able to get the credentials
|
|
|
5eee7b |
-for each user from somewhere. The \ **cifscreds**\ program is the tool used
|
|
|
5eee7b |
+for each user from somewhere. The ``cifscreds`` program is the tool used
|
|
|
5eee7b |
to provide these credentials to the kernel.
|
|
|
5eee7b |
|
|
|
5eee7b |
The first non-option argument to cifscreds is a command (see the
|
|
|
5eee7b |
-\ **COMMANDS**\ section below). The second non-option argument is a hostname
|
|
|
5eee7b |
+`COMMANDS`_ section below). The second non-option argument is a hostname
|
|
|
5eee7b |
or address, or an NT domain name.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
COMMANDS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
+add
|
|
|
5eee7b |
+ Add credentials to the kernel to be used for connecting to the given
|
|
|
5eee7b |
+ server, or servers in the given domain.
|
|
|
5eee7b |
|
|
|
5eee7b |
+clear
|
|
|
5eee7b |
+ Clear credentials for a particular host or domain from the kernel.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **add**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Add credentials to the kernel to be used for connecting to the given server, or servers in the given domain.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **clear**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Clear credentials for a particular host or domain from the kernel.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **clearall**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Clear all cifs credentials from the kernel.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **update**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Update stored credentials in the kernel with a new username and
|
|
|
5eee7b |
- password.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+clearall
|
|
|
5eee7b |
+ Clear all cifs credentials from the kernel.
|
|
|
5eee7b |
|
|
|
5eee7b |
+update
|
|
|
5eee7b |
+ Update stored credentials in the kernel with a new username and
|
|
|
5eee7b |
+ password.
|
|
|
5eee7b |
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
+-d, --domain
|
|
|
5eee7b |
+ The provided host/domain argument is a NT domainname.
|
|
|
5eee7b |
|
|
|
5eee7b |
+ Ordinarily the second argument provided to cifscreds is treated as a
|
|
|
5eee7b |
+ hostname or IP address. This option causes the cifscreds program to
|
|
|
5eee7b |
+ treat that argument as an NT domainname instead.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **-d**\ , \ **--domain**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- The provided host/domain argument is a NT domainname.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Ordinarily the second argument provided to cifscreds is treated as a
|
|
|
5eee7b |
- hostname or IP address. This option causes the cifscreds program to
|
|
|
5eee7b |
- treat that argument as an NT domainname instead.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- If there are not host specific credentials for the mounted server, then
|
|
|
5eee7b |
- the kernel will next look for a set of domain credentials equivalent to
|
|
|
5eee7b |
- the domain= option provided at mount time.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-u**\ , \ **--username**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Ordinarily, the username is derived from the unix username of the user
|
|
|
5eee7b |
- adding the credentials. This option allows the user to substitute a
|
|
|
5eee7b |
- different username.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ If there are not host specific credentials for the mounted server, then
|
|
|
5eee7b |
+ the kernel will next look for a set of domain credentials equivalent to
|
|
|
5eee7b |
+ the domain= option provided at mount time.
|
|
|
5eee7b |
|
|
|
5eee7b |
+-u, --username
|
|
|
5eee7b |
+ Ordinarily, the username is derived from the unix username of the user
|
|
|
5eee7b |
+ adding the credentials. This option allows the user to substitute a
|
|
|
5eee7b |
+ different username.
|
|
|
5eee7b |
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
NOTES
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
The cifscreds utility requires a kernel built with support for the
|
|
|
5eee7b |
-\ **login**\ key type. That key type was added in v3.3 in mainline Linux
|
|
|
5eee7b |
+``login`` key type. That key type was added in v3.3 in mainline Linux
|
|
|
5eee7b |
kernels.
|
|
|
5eee7b |
|
|
|
5eee7b |
-Since \ **cifscreds**\ adds keys to the session keyring, it is highly
|
|
|
5eee7b |
-recommended that one use \ **pam_keyinit**\ to ensure that a session keyring
|
|
|
5eee7b |
+Since ``cifscreds`` adds keys to the session keyring, it is highly
|
|
|
5eee7b |
+recommended that one use ``pam_keyinit`` to ensure that a session keyring
|
|
|
5eee7b |
is established at login time.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
pam_keyinit(8)
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
AUTHORS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
The cifscreds program was originally developed by Igor Druzhinin
|
|
|
5eee7b |
<jaxbrigs@gmail.com>. This manpage and a redesign of the code was done
|
|
|
5eee7b |
by Jeff Layton <jlayton@samba.org>.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
diff --git a/getcifsacl.rst.in b/getcifsacl.rst.in
|
|
|
5eee7b |
index 42af258..21a10cd 100644
|
|
|
5eee7b |
--- a/getcifsacl.rst.in
|
|
|
5eee7b |
+++ b/getcifsacl.rst.in
|
|
|
5eee7b |
@@ -7,80 +7,60 @@ Userspace helper to display an ACL in a security descriptor for Common Internet
|
|
|
5eee7b |
--------------------------------------------------------------------------------------------------
|
|
|
5eee7b |
:Manual section: 1
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SYNOPSIS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-getcifsacl [-v|-r] {file system object}
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ getcifsacl [-v|-r] {file system object}
|
|
|
5eee7b |
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
This tool is part of the cifs-utils suite.
|
|
|
5eee7b |
|
|
|
5eee7b |
-getcifsacl is a userspace helper program for the Linux CIFS client
|
|
|
5eee7b |
+``getcifsacl`` is a userspace helper program for the Linux CIFS client
|
|
|
5eee7b |
file system. It is intended to display a security descriptor including
|
|
|
5eee7b |
ACL for a file system object.
|
|
|
5eee7b |
|
|
|
5eee7b |
This program uses a plugin to handle the mapping of SIDs to user and
|
|
|
5eee7b |
-group names. \ *@pluginpath@*\ should be a symlink that points to the
|
|
|
5eee7b |
+group names. *@pluginpath@* should be a symlink that points to the
|
|
|
5eee7b |
correct plugin to use.
|
|
|
5eee7b |
|
|
|
5eee7b |
Fields of an ACE such as SID, type, flags, and mask are displayed
|
|
|
5eee7b |
-separated by /. Numeric values of type, flags, and mask are displayed
|
|
|
5eee7b |
+separated by /. Numeric values of type, flags, and mask are displayed
|
|
|
5eee7b |
in hexadecimal format.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
+-v
|
|
|
5eee7b |
+ Print version number and exit.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-v**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Print version number and exit.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-r**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Display a security descriptor in raw mode. Values such as type and
|
|
|
5eee7b |
- flags are displayed in hexadecimal format, a SID is not mapped to a
|
|
|
5eee7b |
- name.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+-r
|
|
|
5eee7b |
+ Display a security descriptor in raw mode. Values such as type and
|
|
|
5eee7b |
+ flags are displayed in hexadecimal format, a SID is not mapped to a
|
|
|
5eee7b |
+ name.
|
|
|
5eee7b |
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
NOTES
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Kernel support for getcifsacl/setcifsacl utilities was initially
|
|
|
5eee7b |
introduced in the 2.6.37 kernel.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
mount.cifs(8), setcifsacl(1)
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
******
|
|
|
5eee7b |
AUTHOR
|
|
|
5eee7b |
******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Shirish Pargaonkar wrote the getcifsacl program.
|
|
|
5eee7b |
|
|
|
5eee7b |
The Linux CIFS Mailing list is the preferred place to ask questions
|
|
|
5eee7b |
regarding these programs.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
diff --git a/idmapwb.rst.in b/idmapwb.rst.in
|
|
|
5eee7b |
index 4d7fd62..c03e4ca 100644
|
|
|
5eee7b |
--- a/idmapwb.rst.in
|
|
|
5eee7b |
+++ b/idmapwb.rst.in
|
|
|
5eee7b |
@@ -7,31 +7,28 @@ winbind ID mapping plugin for cifs-utils
|
|
|
5eee7b |
----------------------------------------
|
|
|
5eee7b |
:Manual section: 8
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
This plugin allows the utilities in cifs-utils to work in conjuction with
|
|
|
5eee7b |
the winbind facility of Samba suite. It handles several functions including
|
|
|
5eee7b |
mapping UID and GID to SIDs and vice versa.
|
|
|
5eee7b |
|
|
|
5eee7b |
Utilities are usually configured to use the correct plugin by creating a
|
|
|
5eee7b |
-symlink at @pluginpath@ that points to the correct plugin that you wish
|
|
|
5eee7b |
+symlink at *@pluginpath@* that points to the correct plugin that you wish
|
|
|
5eee7b |
to use.
|
|
|
5eee7b |
|
|
|
5eee7b |
-This plugin requires that \ **winbindd(8)**\ be properly configured and running.
|
|
|
5eee7b |
+This plugin requires that winbindd(8) be properly configured and running.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-*******************************************************************************
|
|
|
5eee7b |
+********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
-*******************************************************************************
|
|
|
5eee7b |
-getcifsacl(1), setcifsacl(1), cifs.idmap(8), samba(7), smb.conf(5), winbindd(8)
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+********
|
|
|
5eee7b |
|
|
|
5eee7b |
+getcifsacl(1), setcifsacl(1), cifs.idmap(8), samba(7), smb.conf(5), winbindd(8)
|
|
|
5eee7b |
|
|
|
5eee7b |
-*****************************************************************
|
|
|
5eee7b |
+******
|
|
|
5eee7b |
AUTHOR
|
|
|
5eee7b |
-*****************************************************************
|
|
|
5eee7b |
+******
|
|
|
5eee7b |
+
|
|
|
5eee7b |
idmapwb.so was written by Jeff Layton <jlayton@samba.org>
|
|
|
5eee7b |
diff --git a/mount.cifs.rst b/mount.cifs.rst
|
|
|
5eee7b |
index a81c6c4..c0f0bdb 100644
|
|
|
5eee7b |
--- a/mount.cifs.rst
|
|
|
5eee7b |
+++ b/mount.cifs.rst
|
|
|
5eee7b |
@@ -47,7 +47,6 @@ unmounted (usually via the ``umount`` utility).
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
username=arg|user=arg
|
|
|
5eee7b |
specifies the username to connect as. If this is not
|
|
|
5eee7b |
given, then the environment variable USER is used.
|
|
|
5eee7b |
@@ -84,9 +83,9 @@ credentials=filename|cred=filename
|
|
|
5eee7b |
password=value
|
|
|
5eee7b |
domain=value
|
|
|
5eee7b |
|
|
|
5eee7b |
- This is preferred over having passwords in plaintext in a shared file,
|
|
|
5eee7b |
- such as ``/etc/fstab`` . Be sure to protect any credentials file
|
|
|
5eee7b |
- properly.
|
|
|
5eee7b |
+ This is preferred over having passwords in plaintext in a shared file,
|
|
|
5eee7b |
+ such as */etc/fstab* . Be sure to protect any credentials file
|
|
|
5eee7b |
+ properly.
|
|
|
5eee7b |
|
|
|
5eee7b |
uid=arg
|
|
|
5eee7b |
sets the uid that will own all files or directories on the mounted
|
|
|
5eee7b |
@@ -558,7 +557,7 @@ It's generally preferred to use forward slashes (/) as a delimiter in
|
|
|
5eee7b |
service names. They are considered to be the "universal delimiter"
|
|
|
5eee7b |
since they are generally not allowed to be embedded within path
|
|
|
5eee7b |
components on Windows machines and the client can convert them to
|
|
|
5eee7b |
-backslashes (\) unconditionally. Conversely, backslash characters are
|
|
|
5eee7b |
+backslashes (\\) unconditionally. Conversely, backslash characters are
|
|
|
5eee7b |
allowed by POSIX to be part of a path component, and can't be
|
|
|
5eee7b |
automatically converted in the same way.
|
|
|
5eee7b |
|
|
|
5eee7b |
diff --git a/pam_cifscreds.rst b/pam_cifscreds.rst
|
|
|
5eee7b |
index 8e8308c..4e89bfd 100644
|
|
|
5eee7b |
--- a/pam_cifscreds.rst
|
|
|
5eee7b |
+++ b/pam_cifscreds.rst
|
|
|
5eee7b |
@@ -7,110 +7,83 @@ PAM module to manage NTLM credentials in kernel keyring
|
|
|
5eee7b |
-------------------------------------------------------
|
|
|
5eee7b |
:Manual section: 8
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SYNOPSIS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Edit the PAM configuration files for the systems that you want to
|
|
|
5eee7b |
-automatically register NTLM credentials for, e.g. /etc/pam.d/login,
|
|
|
5eee7b |
-and modify as follows:
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
+automatically register NTLM credentials for, e.g. */etc/pam.d/login*,
|
|
|
5eee7b |
+and modify as follows::
|
|
|
5eee7b |
|
|
|
5eee7b |
...
|
|
|
5eee7b |
auth substack system-auth
|
|
|
5eee7b |
+++ auth optional pam_cifscreds.so
|
|
|
5eee7b |
auth include postlogin
|
|
|
5eee7b |
...
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+
|
|
|
5eee7b |
...
|
|
|
5eee7b |
session include system-auth
|
|
|
5eee7b |
+++ session optional pam_cifscreds.so domain=DOMAIN
|
|
|
5eee7b |
session include postlogin
|
|
|
5eee7b |
...
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Change DOMAIN to the name of you Windows domain, or use host= as
|
|
|
5eee7b |
described below.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-The \ **pam_cifscreds**\ PAM module is a tool for automatically adding
|
|
|
5eee7b |
+The ``pam_cifscreds`` PAM module is a tool for automatically adding
|
|
|
5eee7b |
credentials (username and password) for the purpose of establishing
|
|
|
5eee7b |
sessions in multiuser mounts.
|
|
|
5eee7b |
|
|
|
5eee7b |
When a cifs filesystem is mounted with the "multiuser" option, and does
|
|
|
5eee7b |
not use krb5 authentication, it needs to be able to get the credentials
|
|
|
5eee7b |
-for each user from somewhere. The \ **pam_cifscreds**\ module can be used
|
|
|
5eee7b |
+for each user from somewhere. The ``pam_cifscreds`` module can be used
|
|
|
5eee7b |
to provide these credentials to the kernel automatically at login.
|
|
|
5eee7b |
|
|
|
5eee7b |
In the session section of the PAM configuration file, the module can
|
|
|
5eee7b |
either an NT domain name or a list of hostname or addresses.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
+``pam_cifscreds`` supports a couple options which can be set in the PAM
|
|
|
5eee7b |
+configuration files. You must have one (and only one) of ``domain=`` or
|
|
|
5eee7b |
+``host=``.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **pam_cifscreds**\ supports a couple options which can be set in the PAM
|
|
|
5eee7b |
-configuration files. You must have one (and only one) of domain= or
|
|
|
5eee7b |
-host=.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **debug**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Turns on some extra debug logging.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **domain**\ =<NT domain name>
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Credentials will be added for the specified NT domain name.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **host**\ =<hostname or IP address>[,...]
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Credentials will be added for the specified hostnames or IP addresses.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+debug
|
|
|
5eee7b |
+ Turns on some extra debug logging.
|
|
|
5eee7b |
|
|
|
5eee7b |
+domain=<NT domain name>
|
|
|
5eee7b |
+ Credentials will be added for the specified NT domain name.
|
|
|
5eee7b |
|
|
|
5eee7b |
+host=<hostname or IP address>[,...]
|
|
|
5eee7b |
+ Credentials will be added for the specified hostnames or IP addresses.
|
|
|
5eee7b |
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
NOTES
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
The pam_cifscreds PAM module requires a kernel built with support for
|
|
|
5eee7b |
-the \ **login**\ key type. That key type was added in v3.3 in mainline Linux
|
|
|
5eee7b |
+the ``login`` key type. That key type was added in v3.3 in mainline Linux
|
|
|
5eee7b |
kernels.
|
|
|
5eee7b |
|
|
|
5eee7b |
-Since \ **pam_cifscreds**\ adds keys to the session keyring, it is highly
|
|
|
5eee7b |
-recommended that one use \ **pam_keyinit**\ to ensure that a session keyring
|
|
|
5eee7b |
+Since ``pam_cifscreds`` adds keys to the session keyring, it is highly
|
|
|
5eee7b |
+recommended that one use ``pam_keyinit`` to ensure that a session keyring
|
|
|
5eee7b |
is established at login time.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
cifscreds(1), pam_keyinit(8)
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
******
|
|
|
5eee7b |
AUTHOR
|
|
|
5eee7b |
******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
The pam_cifscreds PAM module was developed by Orion Poplawski
|
|
|
5eee7b |
<orion@nwra.com>.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
diff --git a/setcifsacl.rst.in b/setcifsacl.rst.in
|
|
|
5eee7b |
index ea981e2..de9c758 100644
|
|
|
5eee7b |
--- a/setcifsacl.rst.in
|
|
|
5eee7b |
+++ b/setcifsacl.rst.in
|
|
|
5eee7b |
@@ -7,179 +7,110 @@ Userspace helper to alter an ACL in a security descriptor for Common Internet Fi
|
|
|
5eee7b |
------------------------------------------------------------------------------------------------
|
|
|
5eee7b |
:Manual section: 1
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SYNOPSIS
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-setcifsacl [-v|-a|-D|-M|-S] "{one or more ACEs}" {file system object}
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ setcifsacl [-v|-a|-D|-M|-S] "{one or more ACEs}" {file system object}
|
|
|
5eee7b |
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
DESCRIPTION
|
|
|
5eee7b |
***********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
This tool is part of the cifs-utils suite.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **setcifsacl**\ is a userspace helper program for the Linux CIFS client
|
|
|
5eee7b |
-file system. It is intended to alter an ACL of a security descriptor
|
|
|
5eee7b |
-for a file system object. Whether a security descriptor to be set is
|
|
|
5eee7b |
+``setcifsacl`` is a userspace helper program for the Linux CIFS client
|
|
|
5eee7b |
+file system. It is intended to alter an ACL of a security descriptor
|
|
|
5eee7b |
+for a file system object. Whether a security descriptor to be set is
|
|
|
5eee7b |
applied or not is determined by the CIFS/SMB server.
|
|
|
5eee7b |
|
|
|
5eee7b |
This program uses a plugin to handle the mapping of user and group
|
|
|
5eee7b |
-names to SIDs. ``@pluginpath@`` should be a symlink that points to the
|
|
|
5eee7b |
+names to SIDs. *@pluginpath@* should be a symlink that points to the
|
|
|
5eee7b |
correct plugin to use.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
OPTIONS
|
|
|
5eee7b |
*******
|
|
|
5eee7b |
|
|
|
5eee7b |
+-h
|
|
|
5eee7b |
+ Print usage message and exit.
|
|
|
5eee7b |
|
|
|
5eee7b |
+-v
|
|
|
5eee7b |
+ Print version number and exit.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **-h**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Print usage message and exit.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-v**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Print version number and exit.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+-a
|
|
|
5eee7b |
+ Add one or more ACEs to an ACL of a security descriptor. An ACE is
|
|
|
5eee7b |
+ added even if the same ACE exists in the ACL.
|
|
|
5eee7b |
|
|
|
5eee7b |
+-D
|
|
|
5eee7b |
+ Delete one or more ACEs from an ACL of a security descriptor. Entire
|
|
|
5eee7b |
+ ACE has to match in an existing ACL for the listed ACEs to be deleted.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **-a**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Add one or more ACEs to an ACL of a security descriptor. An ACE is
|
|
|
5eee7b |
- added even if the same ACE exists in the ACL.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+-M
|
|
|
5eee7b |
+ Modify one or more ACEs from an ACL of a security descriptor. SID and
|
|
|
5eee7b |
+ type are used to match for existing ACEs to be modified with the list
|
|
|
5eee7b |
+ of ACEs specified.
|
|
|
5eee7b |
|
|
|
5eee7b |
+-S
|
|
|
5eee7b |
+ Set an ACL of security descriptor with the list of ACEs Existing ACL
|
|
|
5eee7b |
+ is replaced entirely with the specified ACEs.
|
|
|
5eee7b |
|
|
|
5eee7b |
-\ **-D**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Delete one or more ACEs from an ACL of a security descriptor. Entire
|
|
|
5eee7b |
- ACE has to match in an existing ACL for the listed ACEs to be deleted.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-M**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Modify one or more ACEs from an ACL of a security descriptor. SID and
|
|
|
5eee7b |
- type are used to match for existing ACEs to be modified with the list
|
|
|
5eee7b |
- of ACEs specified.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-\ **-S**\
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Set an ACL of security descriptor with the list of ACEs Existing ACL
|
|
|
5eee7b |
- is replaced entirely with the specified ACEs.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Every ACE entry starts with "ACL:" One or more ACEs are specified
|
|
|
5eee7b |
- within double quotes. Multiple ACEs are separated by a comma.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- Following fields of an ACE can be modified with possible values:
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- \ **SID**\ - Either a name or a raw SID value.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- \ **type**\ - ALLOWED (0x0), DENIED (0x1), OBJECT_ALLOWED (0x5), OBJECT_DENIED (0x6)
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- \ **flags**\ - OBJECT_INHERIT_FLAG (OI or 0x1), CONTAINER_INHERIT_FLAG (CI or 0x2), NO_PROPAGATE_INHERIT_FLAG (NI or
|
|
|
5eee7b |
- 0x4), INHERIT_ONLY_FLAG (IO or 0x8), INHERITED_ACE_FLAG (IA or 0x10)
|
|
|
5eee7b |
- or a combination/OR of these values.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- \ **mask**\ - Either one of FULL, CHANGE, READ, a combination of R W X D P O, or a hex value
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ Every ACE entry starts with "ACL:" One or more ACEs are specified
|
|
|
5eee7b |
+ within double quotes. Multiple ACEs are separated by a comma.
|
|
|
5eee7b |
|
|
|
5eee7b |
+ Following fields of an ACE can be modified with possible values:
|
|
|
5eee7b |
|
|
|
5eee7b |
+ - ``SID`` - Either a name or a raw SID value.
|
|
|
5eee7b |
+ - ``type`` - ALLOWED (0x0), DENIED (0x1), OBJECT_ALLOWED (0x5), OBJECT_DENIED (0x6)
|
|
|
5eee7b |
+ - ``flags`` - OBJECT_INHERIT_FLAG (OI or 0x1),
|
|
|
5eee7b |
+ CONTAINER_INHERIT_FLAG (CI or 0x2), NO_PROPAGATE_INHERIT_FLAG (NI
|
|
|
5eee7b |
+ or 0x4), INHERIT_ONLY_FLAG (IO or 0x8), INHERITED_ACE_FLAG (IA or
|
|
|
5eee7b |
+ 0x10) or a combination/OR of these values.
|
|
|
5eee7b |
+ - ``mask`` - Either one of FULL, CHANGE, READ, a combination of R W X D P O, or a hex value.
|
|
|
5eee7b |
|
|
|
5eee7b |
********
|
|
|
5eee7b |
EXAMPLES
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Add an ACE
|
|
|
5eee7b |
==========
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- setcifsacl -a "ACL:CIFSTESTDOM\user2:DENIED/0x1/D" <file_name>
|
|
|
5eee7b |
- setcifsacl -a "ACL:CIFSTESTDOM\user1:ALLOWED/OI|CI|NI/D" <file_name>
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ setcifsacl -a "ACL:CIFSTESTDOM\user2:DENIED/0x1/D" <file_name>
|
|
|
5eee7b |
+ setcifsacl -a "ACL:CIFSTESTDOM\user1:ALLOWED/OI|CI|NI/D" <file_name>
|
|
|
5eee7b |
|
|
|
5eee7b |
Delete an ACE
|
|
|
5eee7b |
=============
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- setcifsacl -D "ACL:S-1-1-0:0x1/OI/0x1201ff" <file_name>
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ setcifsacl -D "ACL:S-1-1-0:0x1/OI/0x1201ff" <file_name>
|
|
|
5eee7b |
|
|
|
5eee7b |
Modify an ACE
|
|
|
5eee7b |
=============
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- setcifsacl -M "ACL:CIFSTESTDOM\user1:ALLOWED/0x1f/CHANGE" <file_name>
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ setcifsacl -M "ACL:CIFSTESTDOM\user1:ALLOWED/0x1f/CHANGE" <file_name>
|
|
|
5eee7b |
|
|
|
5eee7b |
Set an ACL
|
|
|
5eee7b |
==========
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-.. code-block:: perl
|
|
|
5eee7b |
-
|
|
|
5eee7b |
- setcifsacl -S "ACL:CIFSTESTDOM\Administrator:0x0/0x0/FULL,ACL:CIFSTESTDOM\user2:0x0/0x0/FULL" <file_name>
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
-
|
|
|
5eee7b |
+ setcifsacl -S "ACL:CIFSTESTDOM\Administrator:0x0/0x0/FULL,ACL:CIFSTESTDOM\user2:0x0/0x0/FULL" <file_name>
|
|
|
5eee7b |
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
NOTES
|
|
|
5eee7b |
*****
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Kernel support for getcifsacl/setcifsacl utilities was initially
|
|
|
5eee7b |
introduced in the 2.6.37 kernel.
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
********
|
|
|
5eee7b |
SEE ALSO
|
|
|
5eee7b |
********
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
mount.cifs(8), getcifsacl(1)
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
******
|
|
|
5eee7b |
AUTHOR
|
|
|
5eee7b |
******
|
|
|
5eee7b |
|
|
|
5eee7b |
-
|
|
|
5eee7b |
Shirish Pargaonkar wrote the setcifsacl program.
|
|
|
5eee7b |
|
|
|
5eee7b |
The Linux CIFS Mailing list is the preferred place to ask questions
|
|
|
5eee7b |
regarding these programs.
|
|
|
5eee7b |
-
|
|
|
5eee7b |
--
|
|
|
5eee7b |
1.8.3.1
|
|
|
5eee7b |
|