Date: Fri, 5 Oct 2018 02:22:17 +0000 From: Rick Macklem <rmacklem@uoguelph.ca> To: Felix Winterhalter <felix@audiofair.de>, "freebsd-fs@freebsd.org" <freebsd-fs@freebsd.org> Subject: Re: NFSv4 Kerberos mount from Linux Message-ID: <YTOPR0101MB18200565BB9457062D3D8D85DDEB0@YTOPR0101MB1820.CANPRD01.PROD.OUTLOOK.COM> In-Reply-To: <YTOPR0101MB1820A5756D172342AF441C25DDEA0@YTOPR0101MB1820.CANPRD01.PROD.OUTLOOK.COM> References: <30f6446c-6fed-4b1e-9cae-9c417974ec46@audiofair.de>, <YTOPR0101MB1820A5756D172342AF441C25DDEA0@YTOPR0101MB1820.CANPRD01.PROD.OUTLOOK.COM>
next in thread | previous in thread | raw e-mail | index | archive | help
I wrote: [stuff snipped] Btw, if you only mounting "/testexport", you can specify the "V4:" as "if you are only.." typo [more stuff snipped] >Btw, in case the Linux client is falling back on using AUTH_SYS at some po= int >during the mount, you could try allowing both krb5 and auth_sys by setting >"-sec=3Dsys,krb5,krb5i,krb5p" for both of the above lines. (I'd also sugge= st you Oops, the syntax is "-sec=3Dsys:krb5:krb5i:krb5p" (':'s and not ','s) And if you want to capture packets during a Linux mount attempt, you can run this on the FreeBSD server: # tcpdump -s 0 -w out.pcap host <client-host> However you will want to look at out.pcap in wireshark, since it can decode= NFS. Good luck with it and please let us know if you learn more, rick
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?YTOPR0101MB18200565BB9457062D3D8D85DDEB0>