From: Udo Müller on
Am 07.04.10 22:44, schrieb Gary Dale:
> How do I mount an smb/cifs share as a normal user without running
> mount.cifs? Or if I have to mount the share as root, how can I get
> reasonable access to the shares?

Use FUSE.

Regards Udo
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Jeff Layton on
On Wed, 07 Apr 2010 16:44:47 -0400
Gary Dale <garydale(a)rogers.com> wrote:

> I'm running Debian/Squeeze on an AMD64 system. For some reason they have
> recently stopped shipping mount.cifs with the setuid bit set.

That would be because it was horribly unsecure.

> Now it
> appears that they have changed the internal settings to prevent it from
> running setuid. This means that I can't define the share in fstab with
> "user" and connect from my Linux user account. Mounting smb/cifs shares
> seems to be blocked except for root.
>

Yes, we added a patch a while back to make it such that mount.cifs
would not allow itself to run as a setuid root program unless it that
check was compiled out.

This was done due to a rather constant stream of "security issues" that
were brought about when people installed mount.cifs setuid root. Since
it had never been vetted for security, we really had no other choice to
communicate that installing it setuid root was unsafe.

> Presumably this has been done for security reasons. However, I can't
> currently do much with my network shares unless I'm root because the
> shares and all the files are owned by root:root. This is despite the
> fstab setting username=<my windows account name> and I get prompted for
> the password. That only seems to be used for connecting to the share,
> not for the permissions.
>
> My Debian box hasn't joined a domain - I'm just using local accounts. I
> mainly have the domain for some Windows boxes used by my family.
>
> How do I mount an smb/cifs share as a normal user without running
> mount.cifs? Or if I have to mount the share as root, how can I get
> reasonable access to the shares?
>

You need to set the uid=/gid= options when mounting. When it's run by a
non-root user, /bin/mount adds these options automatically.

It's also worthwhile to note that I've recently re-enabled the ability
to run mount.cifs as a setuid root program in the latest cifs-utils
release:

http://linux-cifs.samba.org/cifs-utils/

....you may want to switch to using that instead if you need the ability
to use mount.cifs in this way.

--
Jeff Layton <jlayton(a)samba.org>
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Gary Dale on
Jeff Layton wrote:
> On Wed, 07 Apr 2010 16:44:47 -0400
> Gary Dale <garydale(a)rogers.com> wrote:
>
>
>> I'm running Debian/Squeeze on an AMD64 system. For some reason they have
>> recently stopped shipping mount.cifs with the setuid bit set.
>>
>
> That would be because it was horribly unsecure.
>
>
>> Now it
>> appears that they have changed the internal settings to prevent it from
>> running setuid. This means that I can't define the share in fstab with
>> "user" and connect from my Linux user account. Mounting smb/cifs shares
>> seems to be blocked except for root.
>>
>>
>
> Yes, we added a patch a while back to make it such that mount.cifs
> would not allow itself to run as a setuid root program unless it that
> check was compiled out.
>
> This was done due to a rather constant stream of "security issues" that
> were brought about when people installed mount.cifs setuid root. Since
> it had never been vetted for security, we really had no other choice to
> communicate that installing it setuid root was unsafe.
>
>
>> Presumably this has been done for security reasons. However, I can't
>> currently do much with my network shares unless I'm root because the
>> shares and all the files are owned by root:root. This is despite the
>> fstab setting username=<my windows account name> and I get prompted for
>> the password. That only seems to be used for connecting to the share,
>> not for the permissions.
>>
>> My Debian box hasn't joined a domain - I'm just using local accounts. I
>> mainly have the domain for some Windows boxes used by my family.
>>
>> How do I mount an smb/cifs share as a normal user without running
>> mount.cifs? Or if I have to mount the share as root, how can I get
>> reasonable access to the shares?
>>
>>
>
> You need to set the uid=/gid= options when mounting. When it's run by a
> non-root user, /bin/mount adds these options automatically.
>
Except that when I run mount as a non-root user, I get the error about
mount.cifs not being setuid. This is generated from the user option in
fstab. If I remove the user option, I am told that only root can mount
the share. Thus my problem that normal users cannot mount smbfs/cifs
shares. This appears to be reserved now only for root.

> It's also worthwhile to note that I've recently re-enabled the ability
> to run mount.cifs as a setuid root program in the latest cifs-utils
> release:
>
> http://linux-cifs.samba.org/cifs-utils/
>
> ...you may want to switch to using that instead if you need the ability
> to use mount.cifs in this way.
>
I would except that Debian/Squeeze has its own repositories that I'd
prefer to stick with. Hopefully they'll catch up shortly.

While the ability to run mount.cifs setuid again is appreciated, how
does that fit in with the "horribly unsecure" reasoning that led to it
being removed?
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Chris Smith on
On Wed, Apr 7, 2010 at 9:39 PM, Jeff Layton <jlayton(a)samba.org> wrote:
> Yes, we added a patch a while back to make it such that mount.cifs
> would not allow itself to run as a setuid root program unless it that
> check was compiled out.
>
> This was done due to a rather constant stream of "security issues" that
> were brought about when people installed mount.cifs setuid root. Since
> it had never been vetted for security, we really had no other choice to
> communicate that installing it setuid root was unsafe.

Not the place for it so the inquiry is only rhetorical.
How can you equate adding a patch preventing a sysadmin from using an
app as designed to communicating? Communication is one thing,
handcuffs are another.
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Christian PERRIER on
Quoting Jeff Layton (jlayton(a)samba.org):

> It's also worthwhile to note that I've recently re-enabled the ability
> to run mount.cifs as a setuid root program in the latest cifs-utils
> release:
>
> http://linux-cifs.samba.org/cifs-utils/
>
> ...you may want to switch to using that instead if you need the ability
> to use mount.cifs in this way.

cifs-utils 4.2 has yet to be packaged for Debian
(http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576314).

Will we decide to re-enable setuid? We already have a bug report
asking for this..:-)

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576713

--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba