From nobody Wed Apr 5 01:32:43 2023 X-Original-To: fs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PrnF80by0z43YBC for ; Wed, 5 Apr 2023 01:32:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PrnF75DQZz3jNs for ; Wed, 5 Apr 2023 01:32:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1680658363; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ElzU4AKIG5QdfvMoctyhXl88+tARolKC6Qh0IXrGM0w=; b=TexQCA5Pbyi6SEdzd3Dq+c7HyzM0xAeVWdPsbG/Ya4rVDkVUKBcbj8Rtpa75CDHImuAyYU Z26oDhg9Nat+QwaYxqjSCGl3jrD7j4JTW4zLn5C/FRIfdBu57VwcsXK9icMD69zA4jWQA+ BeoOobZ0BdBlt39nLnTRSF7OjrAWPZxtsWWpgnvY8O5CQFg1I0zuyLVhZ5CeMk2K2+xvQC 8BhCw/RNNpn6b0/gcB6hPT+BogSBTCVpq54SZXtzV7q9D6NEmnxzYDSVaXAooXggwcQtY1 VUOM66UOdBNzi+4Z0tBtE1wXssLA6sL470OxQrL/pLIeaN5xeSjUreel6Tyjbg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1680658363; a=rsa-sha256; cv=none; b=dKH5gi/8Mj93MXbZicJW8iEjK3mKJwmKCBLmw3qZAoa/HgNufyAoGNrAxRs8fG1i+NO/Ej psKVC9g53tLMw5cVA9BCT2N6L1zy4S3S7F5xm7Nfzu3vu7T+D1+vZL8NwmCi5CryqI9TV5 s09F66lUdalzThetzQkXQ8fRvZHwoFMJmG2yiR+Sn6qU0ah+238Gf+dkchYTpF77jeqCST uguIaoklamqtoS0h3e3qKaDRhNiN8bMZOHl98QAADa2Jw2B40xNIM3tdB+qq7vI9CJMKQD 1rdLgH1ijF528FrV0mrNkl5h0rAqmEkGbYnDgodvg8Hjg6eGYk1vRqUwGPg5Gg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PrnF74HXRz13ZD for ; Wed, 5 Apr 2023 01:32:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3351WhSB059643 for ; Wed, 5 Apr 2023 01:32:43 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3351WhB5059642 for fs@FreeBSD.org; Wed, 5 Apr 2023 01:32:43 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: fs@FreeBSD.org Subject: [Bug 270592] nfsv4 /etc/exports with -sec=krb5p gives permission denied Date: Wed, 05 Apr 2023 01:32:43 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: conf X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rmacklem@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status assigned_to Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Filesystems List-Archive: https://lists.freebsd.org/archives/freebsd-fs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-fs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270592 Rick Macklem changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|New |Closed Assignee|fs@FreeBSD.org |rmacklem@FreeBSD.org --- Comment #2 from Rick Macklem --- Btw, a recent commit (that is in 13.2) modifies the server so that it will allow the use of krb5i for state maintenance operations for NFSv4.1/4.2 when SP4_NONE is used. This should allow the Linux NFS client to do the mount, without "krb5i" being in the V4: line in /etc/exports. I will note that adding "krb5i" to the -sec option only in the V4: line should make the Linux mounts work to versions prior to 13.2 and for 13.2 and later, it is not required and your failing test case would work. As such, I'll close this bug report. --=20 You are receiving this mail because: You are the assignee for the bug.=