Your message dated Fri, 02 Mar 2007 19:17:17 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#407264: fixed in nfs-utils 1:1.0.12-2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: nfs-common
Version: 1:1.0.10-5tkk1
Severity: normal
Tags: patch
Currently root UID on krb5-mounts is mapped as nobody, and upstream
knows about this:
http://linux-nfs.org/pipermail/nfsv4/2006-December/005454.html
Linked is a patch, described by the author:
"Use root/[EMAIL PROTECTED] principal instead of nfs/[EMAIL PROTECTED] for
machine
credentials until Linux NFSv4 guys get their act [#1] sorted
out.. AFAIK this behaviour is identical to Solaris 10 client. This
patch is pretty much necessary if you're not using a Linux based NFSv4
server and idmapd with umich_ldap method to handle principal
mapping. Tested against NetApp's file server, the root access works
fine after applying the patch."
http://users.tkk.fi/~aet/nfs-utils-1.0.9.patch.aet
We've been running this patch for over a month now on several clients,
and it works. AFAIK, it doesn't affect nfs-server at all, since
rpc.svcgssd doesn't use gssd/krb5_util.*, but we might be wrong since
we don't use nfs-server on linux.
ps. yes, we use Ubuntu, but this needs to get in Debian first :)
-- System Information:
Debian Release: testing/unstable
APT prefers dapper-updates
APT policy: (500, 'dapper-updates'), (500, 'dapper-security'), (500,
'dapper-backports'), (500, 'dapper')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/dash
Kernel: Linux 2.6.15-27-686
Locale: LANG=C, LC_CTYPE=fi_FI.ISO8859-1 (charmap=ISO-8859-1)
Versions of packages nfs-common depends on:
ii adduser 3.80ubuntu2 Add and remove users and groups
ii libc6 2.3.6-0ubuntu20 GNU C Library: Shared libraries an
ii libcomerr2 1.38-2ubuntu2 common error description library
ii libevent1 1.1a-1 An asynchronous event notification
ii libgssapi2 0.10-4 A mechanism-switch gssapi library
ii libkrb53 1.4.4-4tkk1 MIT Kerberos runtime libraries
ii libnfsidmap2 0.18-0 An nfs idmapping library
ii librpcsecgss3 0.14-2 allows secure rpc communication us
ii lsb-base 3.1-5ubuntu2 Linux Standard Base 3.1 init scrip
ii netbase 4.24ubuntu3 Basic TCP/IP networking system
ii portmap 5-16ubuntu2 The RPC portmapper
ii ucf 2.004 Update Configuration File: preserv
nfs-common recommends no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.0.12-2
We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:
nfs-common_1.0.12-2_i386.deb
to pool/main/n/nfs-utils/nfs-common_1.0.12-2_i386.deb
nfs-kernel-server_1.0.12-2_i386.deb
to pool/main/n/nfs-utils/nfs-kernel-server_1.0.12-2_i386.deb
nfs-utils_1.0.12-2.diff.gz
to pool/main/n/nfs-utils/nfs-utils_1.0.12-2.diff.gz
nfs-utils_1.0.12-2.dsc
to pool/main/n/nfs-utils/nfs-utils_1.0.12-2.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Steinar H. Gunderson <[EMAIL PROTECTED]> (supplier of updated nfs-utils package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 2 Mar 2007 19:54:06 +0100
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.0.12-2
Distribution: unstable
Urgency: medium
Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Changed-By: Steinar H. Gunderson <[EMAIL PROTECTED]>
Description:
nfs-common - NFS support files common to client and server
nfs-kernel-server - support for NFS kernel server
Closes: 407264 413057
Changes:
nfs-utils (1:1.0.12-2) unstable; urgency=medium
.
* Drop 11-root-on-krb5-mounts.patch, as it causes problems with backward
compatibility. (Closes: #407264, but also probably reopens it at the same
time...).
* Add an explicit versioned dependency on libblkid1, since the version in
sarge lacks the blkid_probe_all_new symbol and the shlibs does not add
the versioned dependency by itself. (Closes: #413057)
Files:
1f68bf2ffa5ad3341e665fd4edfdf7f8 985 net standard nfs-utils_1.0.12-2.dsc
5012ead68335537080b43fa08e2f0db6 26686 net standard nfs-utils_1.0.12-2.diff.gz
864ad9751c1ef6aa3d6b057ee47fb276 142828 net optional
nfs-kernel-server_1.0.12-2_i386.deb
6e324883a65448c87b895cfdf1026e2d 131392 net standard
nfs-common_1.0.12-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQCVAwUBReh1lH7hqgLJpbVOAQIVsAP/Y8pEIFZEto/eF1lP/bBXvF8DkdaDhqLD
lDkPj8rFY5J6U/1czR6ljFcgm9UEiBxGNUKwdop5bd425Y9RKNFx0N60ms31QMTw
ItbrVbFCH7w6mFe6nXB87Wc4lILR+YLZhfM+T6eVs/WY7noNZLN5D4N/V36MSAkO
v/8y1OFaQkQ=
=p1do
-----END PGP SIGNATURE-----
--- End Message ---