Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 31 Jul 2010 21:58:01 -0400 (EDT)
From:      Rick Macklem <rmacklem@uoguelph.ca>
To:        Joe Auty <joe@netmusician.org>
Cc:        freebsd-fs@freebsd.org
Subject:   Re: NFSv4 permissions issues
Message-ID:  <235033195.215985.1280627881678.JavaMail.root@erie.cs.uoguelph.ca>
In-Reply-To: <4C54C8E0.8020504@netmusician.org>

next in thread | previous in thread | raw e-mail | index | archive | help
[stuff snipped for brevity]
> At the time the user/groups were showing up as root:joe.
> 

Ok, so an "ls -lg" on the NFSv4 mounted volume showed the files
owned by root/joe? If so, nfsuserd seems to be working.

Does root and joe have the same uid and gid #s on the client
and server. NFSv4 will be pickier about the gid, so make sure
joe is in both the client and server as the same gid#.

> Is snoop trace an strace?
> 
I was referring to using snoop to capture packets and then
look at them. On Solaris I use something like:
# snoop -q -o xx.cap host <client_host>
- I run an offending command(s), then kill the above and:
# snoop -t r -v -i xx.cap > xx
The file "xx" now has a verbose description of the packets.
Take a look at the AUTH_SYS part of the RPC header (where the
uid and gids live) and the various attributes in the request
that probably failed with NFS4ERR_ACCESS.

Alternately, you can use wireshark. (tcpdump knows diddly
about NFSv4, so it can only be used for the packet capture
and not the analysis.

rick




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?235033195.215985.1280627881678.JavaMail.root>