Your message dated Fri, 02 Mar 2007 19:17:17 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#407264: fixed in nfs-utils 1:1.0.12-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: nfs-common
Version: 1:1.0.10-5tkk1
Severity: normal
Tags: patch


Currently root UID on krb5-mounts is mapped as nobody, and upstream
knows about this:

http://linux-nfs.org/pipermail/nfsv4/2006-December/005454.html

Linked is a patch, described by the author:

"Use root/[EMAIL PROTECTED] principal instead of nfs/[EMAIL PROTECTED] for 
machine
credentials until Linux NFSv4 guys get their act [#1] sorted
out.. AFAIK this behaviour is identical to Solaris 10 client. This
patch is pretty much necessary if you're not using a Linux based NFSv4
server and idmapd with umich_ldap method to handle principal
mapping. Tested against NetApp's file server, the root access works
fine after applying the patch."

http://users.tkk.fi/~aet/nfs-utils-1.0.9.patch.aet

We've been running this patch for over a month now on several clients,
and it works. AFAIK, it doesn't affect nfs-server at all, since
rpc.svcgssd doesn't use gssd/krb5_util.*, but we might be wrong since
we don't use nfs-server on linux.


ps. yes, we use Ubuntu, but this needs to get in Debian first :)


-- System Information:
Debian Release: testing/unstable
  APT prefers dapper-updates
  APT policy: (500, 'dapper-updates'), (500, 'dapper-security'), (500, 
'dapper-backports'), (500, 'dapper')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.15-27-686
Locale: LANG=C, LC_CTYPE=fi_FI.ISO8859-1 (charmap=ISO-8859-1)

Versions of packages nfs-common depends on:
ii  adduser                  3.80ubuntu2     Add and remove users and groups
ii  libc6                    2.3.6-0ubuntu20 GNU C Library: Shared libraries an
ii  libcomerr2               1.38-2ubuntu2   common error description library
ii  libevent1                1.1a-1          An asynchronous event notification
ii  libgssapi2               0.10-4          A mechanism-switch gssapi library
ii  libkrb53                 1.4.4-4tkk1     MIT Kerberos runtime libraries
ii  libnfsidmap2             0.18-0          An nfs idmapping library
ii  librpcsecgss3            0.14-2          allows secure rpc communication us
ii  lsb-base                 3.1-5ubuntu2    Linux Standard Base 3.1 init scrip
ii  netbase                  4.24ubuntu3     Basic TCP/IP networking system
ii  portmap                  5-16ubuntu2     The RPC portmapper
ii  ucf                      2.004           Update Configuration File: preserv

nfs-common recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.0.12-2

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:

nfs-common_1.0.12-2_i386.deb
  to pool/main/n/nfs-utils/nfs-common_1.0.12-2_i386.deb
nfs-kernel-server_1.0.12-2_i386.deb
  to pool/main/n/nfs-utils/nfs-kernel-server_1.0.12-2_i386.deb
nfs-utils_1.0.12-2.diff.gz
  to pool/main/n/nfs-utils/nfs-utils_1.0.12-2.diff.gz
nfs-utils_1.0.12-2.dsc
  to pool/main/n/nfs-utils/nfs-utils_1.0.12-2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steinar H. Gunderson <[EMAIL PROTECTED]> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri,  2 Mar 2007 19:54:06 +0100
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.0.12-2
Distribution: unstable
Urgency: medium
Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Changed-By: Steinar H. Gunderson <[EMAIL PROTECTED]>
Description: 
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 407264 413057
Changes: 
 nfs-utils (1:1.0.12-2) unstable; urgency=medium
 .
   * Drop 11-root-on-krb5-mounts.patch, as it causes problems with backward
     compatibility. (Closes: #407264, but also probably reopens it at the same
     time...).
   * Add an explicit versioned dependency on libblkid1, since the version in
     sarge lacks the blkid_probe_all_new symbol and the shlibs does not add
     the versioned dependency by itself. (Closes: #413057)
Files: 
 1f68bf2ffa5ad3341e665fd4edfdf7f8 985 net standard nfs-utils_1.0.12-2.dsc
 5012ead68335537080b43fa08e2f0db6 26686 net standard nfs-utils_1.0.12-2.diff.gz
 864ad9751c1ef6aa3d6b057ee47fb276 142828 net optional 
nfs-kernel-server_1.0.12-2_i386.deb
 6e324883a65448c87b895cfdf1026e2d 131392 net standard 
nfs-common_1.0.12-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQCVAwUBReh1lH7hqgLJpbVOAQIVsAP/Y8pEIFZEto/eF1lP/bBXvF8DkdaDhqLD
lDkPj8rFY5J6U/1czR6ljFcgm9UEiBxGNUKwdop5bd425Y9RKNFx0N60ms31QMTw
ItbrVbFCH7w6mFe6nXB87Wc4lILR+YLZhfM+T6eVs/WY7noNZLN5D4N/V36MSAkO
v/8y1OFaQkQ=
=p1do
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to