From owner-svn-src-head@freebsd.org Wed Apr 18 21:15:38 2018 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0F5D0F8118D; Wed, 18 Apr 2018 21:15:38 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-eopbgr660067.outbound.protection.outlook.com [40.107.66.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT TLS CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 88FF680AD5; Wed, 18 Apr 2018 21:15:37 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM (52.132.66.153) by YQBPR0101MB1252.CANPRD01.PROD.OUTLOOK.COM (52.132.68.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.696.12; Wed, 18 Apr 2018 21:15:36 +0000 Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a]) by YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a%13]) with mapi id 15.20.0696.013; Wed, 18 Apr 2018 21:15:36 +0000 From: Rick Macklem To: Julian Elischer , Konstantin Belousov CC: Andriy Gapon , "src-committers@freebsd.org" , "svn-src-all@freebsd.org" , "svn-src-head@freebsd.org" Subject: Re: svn commit: r332559 - head/usr.sbin/mountd Thread-Topic: svn commit: r332559 - head/usr.sbin/mountd Thread-Index: AQHT1d2LvqfGyf/rSkGmX+1c3ssiQaQE5HwAgAESHgCAAQ1uCQ== Date: Wed, 18 Apr 2018 21:15:36 +0000 Message-ID: References: <20180417123212.GM1774@kib.kiev.ua>, In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=rmacklem@uoguelph.ca; x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; YQBPR0101MB1252; 7:S+aUh+9q9NBnYcWyZoI6c/itw8uqd20bJgFNwxuIdmYY9MvM31p28evaoItVXTqpKWj5IGrknCEDmX6oGd0QbXfk53FT+WoWWrULOO/QfsQJijgEJGrXuK0k3LhMQter9wX6yu+ajPDFKFK9utP6tlNhXB5OflUnKKRWOCWaqXUTSb2q7O7loSSLvpNPyxNAKZP1bfLml2knP86rOyVRe2IBcfrrXJvwOPds1BYDBr/DaH7CQj+p1VljLrJpNYML x-ms-exchange-antispam-srfa-diagnostics: SOS; x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(8990040)(2017052603328)(7153060)(7193020); SRVR:YQBPR0101MB1252; x-ms-traffictypediagnostic: YQBPR0101MB1252: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(158342451672863); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231232)(944501327)(52105095)(93006095)(93001095)(6041310)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123562045)(20161123560045)(20161123558120)(6072148)(201708071742011); SRVR:YQBPR0101MB1252; BCL:0; PCL:0; RULEID:; SRVR:YQBPR0101MB1252; x-forefront-prvs: 06469BCC91 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39380400002)(396003)(376002)(346002)(39860400002)(366004)(186003)(316002)(81166006)(5660300001)(8936002)(786003)(2900100001)(6436002)(86362001)(3280700002)(110136005)(3660700001)(54906003)(33656002)(74482002)(25786009)(6506007)(26005)(102836004)(4326008)(6246003)(39060400002)(446003)(53936002)(476003)(14454004)(11346002)(5250100002)(7696005)(55016002)(229853002)(76176011)(9686003)(478600001)(305945005)(2906002)(8676002)(74316002)(59450400001)(99286004); DIR:OUT; SFP:1101; SCL:1; SRVR:YQBPR0101MB1252; H:YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; MLV:ovrnspm; PTR:InfoNoRecords; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-microsoft-antispam-message-info: fvFyXHAhfHoG9pFKqP+9OOY0W+0o7ifrF2tiuMBxvJMAUOeE+TcFLssYKe94gA2uhtNSK6OYh7KbPcVWHrU6KTe/H1p8bZx5jlO6vWAZJ2GaTsWGOU59Vf/4q4eku6/ZMHd+p0nCYpE8p4Ewq1IVDnnBnE8N55KrNM3UNoN8u9cAbZ5C3TIhcVT7MtDGWEY6 spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 02ebc62b-a564-46f9-f257-08d5a5718740 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 02ebc62b-a564-46f9-f257-08d5a5718740 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2018 21:15:36.1548 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQBPR0101MB1252 X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Apr 2018 21:15:38 -0000 Julian Elischer wrote: [stuff snipped] >our issue is that we make a server that combines CIFS/SMB access (via >samba), credential setting from a company wide AD server (windows) >via winbindd (samba) via nsswitch.. and NFS. > >The problem is that when one looks up a user name from the AD server >One can get back a credential with a large number of groups, because >some companies use windows groups extensively. SO a sinel user may be >in a group for every project they are involved with and a method of >giving them access to files related to a project. >In this scenario a group manager may be given access to a lot of groups. > >A user looking at a file via NFS needs to be able to see what he needs >and still be blocked as per company policy. >I am investigating the new user-manager daemon may help but I don't >fully understand it yet. >I gather it maps an incoming request to a set of groups as defined on >the server rather than on the client, but I'm not sure yet how that >relates to mountd. I am happy to say I know nothing about AD, but I thought it included an LDAP service? If there is a way to configure FreeBSD so that getgrouplist(3= ) gets this list of AD groups, then "nfsuserd -manage-gids" on the NFS server should do what you want. (It takes the "uid" from the AUTH_SYS RPC request header and then creates a list of groups for that "uid" via getgrouplist(3)= . It basically does a getpwuid() and then uses the pw_name as the first arg to getgrouplist(3). It ignores the list of groups in the RPC header and, therefore, is not limi= ted to 16.) =20 If getgrouplist(3) can't see the set of AD groups, then something needs to = be done to make that work. rick