Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-18 Thread Gilbert E. Detillieux
This thread has now degenerated into political diatribe & irrelevant 
asides, and has ceased to come even close to providing any useful 
technical response to the original request.  Furthermore, the original 
poster has already posted his workaround solution.


So, can we PLEASE put this thread to rest?!

Thanks,
Gilbert

On 2021-08-18 10:57 a.m., Yasha Karant wrote:
These are NOT my demands -- these are standard ergonomic engineering 
approaches.  This is why the operation of a road vehicle is the same in 
all modern vehicles -- save for upon which side of the road one drives 
("right" vs "left" hand).  As a counter example, one of my colleagues 
has been using MS Office XP for a long time.  She was forced to convert 
to a later MS Office, and the controls have changed -- as she stated 
"why did they hide the open dialog, and the word count is moved to a 
completely different ... ".  Thus, I use MATE and sometimes an actual 
terminal (not a GUI) CLI interface, neither the current Gnome nor KDE 
(originally, an interface "clone" of Unix CDE).  For CIFS, it appears 
that there is no equivalent of MATE for "traditional unix/bsd/linux 
commands".  There are well understood reasons for a significant change 
in a control interface -- motor vehicles need a different interface than 
a "beast of burden" drawn vehicle, the invention of saddle and stirrups 
made major improvements to horse riding (but there a still persons who 
use the older technology).


Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-18 Thread Yasha Karant
These are NOT my demands -- these are standard ergonomic engineering 
approaches.  This is why the operation of a road vehicle is the same in 
all modern vehicles -- save for upon which side of the road one drives 
("right" vs "left" hand).  As a counter example, one of my colleagues 
has been using MS Office XP for a long time.  She was forced to convert 
to a later MS Office, and the controls have changed -- as she stated 
"why did they hide the open dialog, and the word count is moved to a 
completely different ... ".  Thus, I use MATE and sometimes an actual 
terminal (not a GUI) CLI interface, neither the current Gnome nor KDE 
(originally, an interface "clone" of Unix CDE).  For CIFS, it appears 
that there is no equivalent of MATE for "traditional unix/bsd/linux 
commands".  There are well understood reasons for a significant change 
in a control interface -- motor vehicles need a different interface than 
a "beast of burden" drawn vehicle, the invention of saddle and stirrups 
made major improvements to horse riding (but there a still persons who 
use the older technology).


On 8/18/21 03:36, Nico Kadel-Garcia wrote:

On Wed, Aug 18, 2021 at 2:10 AM Yasha Karant  wrote:


Although I was not involved with the specification of CIFS, nor with the
design or implementation of CIFS on open systems, I respectfully
disagree with at least some of your conclusions.  In a top-down entity


Then your demands should not carry much weight. I've been porting
Samba and related tools to UNIX systems since roughly 1993, and I can
tell you that mapping the permissions of the underlying filesystems
which SMB and later CIFS were designed to emulate into the Linux world
is and will remain awkward. The UNIX and Linux authors who wrote
Samba, the ancestor toolkit to cifs-utils, to did not design CIFS or
its ancestor SMB. Microsoft did. Mapping UID and GID to idmaps, and
handling the hierarchy of permissions, is a pain in the keister and
the complexities often ignored as unwelcome or undesirable in a UNIX
environment.

If you don't like an architectural selection by the authors of
cifs-utils, or Red Hat's or SuSE's architecteral implementaitons, hop
over to the Samba mailing lists where the subtleties of CIFS are a
better subject. SL is just a rebuild of RHEL: you might take it up
with Red Hat. It's not fair to kvetch at Scientific Linux supporters
about it.


(totalitarian dictatorship, clandestine or military service,
corporation, authoritarian theocracy, etc), the designated decision
maker/s decides as to what is allowed or not, including not permitting
backward compatibility.  Would ignoring a protection mode enhance


Input saying "you shoulda aughta done it this way" bears very little
weight compared to that of actually picking up the tools, reviewing
the issue, and seeing if it works. cifs-utils used to be part of
Samba, and got factored out for good reasons, but has in general been
very well behaved. It's working well in literally millions of devices
around the world. If you or someone else with CIFS issues has a
problem, I'll recommend the Samba mailing lists.


security by imposing a different access and security model? Perhaps, or
even definitely yes.  However, the fact stated by the posting person
that SuSE did emulate a perhaps-obsolete security model under a
subsequent security model does seem to indicate that SuSE had a more
universal implementation of backward compatibility than what was
observed with EL.  If the posting was in error and SuSE does not permit
such backward compatibility (perhaps with a warning message), then SuSE
as well as EL is not backward compatible.


SuSE... has made some strange architectural decisions at various
times. Rather than holding forth on the moral and intellectual
failures of people you've not met or tried to collaborate with,
perhaps you could grab a VM and actually try it. Contribute to the
understanding, rather than decry someone else's work.

Me? I've got samba backporting for RHEL 7 and RHEL 8 public repos to
update. I'm hoping they've gotten the MIT Kerberos integration
straightened out enough to use for RHEL effectively. I've not been
backporting it to SL because there's not going to be an SL 8.



Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-18 Thread Nico Kadel-Garcia
On Wed, Aug 18, 2021 at 2:10 AM Yasha Karant  wrote:
>
> Although I was not involved with the specification of CIFS, nor with the
> design or implementation of CIFS on open systems, I respectfully
> disagree with at least some of your conclusions.  In a top-down entity

Then your demands should not carry much weight. I've been porting
Samba and related tools to UNIX systems since roughly 1993, and I can
tell you that mapping the permissions of the underlying filesystems
which SMB and later CIFS were designed to emulate into the Linux world
is and will remain awkward. The UNIX and Linux authors who wrote
Samba, the ancestor toolkit to cifs-utils, to did not design CIFS or
its ancestor SMB. Microsoft did. Mapping UID and GID to idmaps, and
handling the hierarchy of permissions, is a pain in the keister and
the complexities often ignored as unwelcome or undesirable in a UNIX
environment.

If you don't like an architectural selection by the authors of
cifs-utils, or Red Hat's or SuSE's architecteral implementaitons, hop
over to the Samba mailing lists where the subtleties of CIFS are a
better subject. SL is just a rebuild of RHEL: you might take it up
with Red Hat. It's not fair to kvetch at Scientific Linux supporters
about it.

> (totalitarian dictatorship, clandestine or military service,
> corporation, authoritarian theocracy, etc), the designated decision
> maker/s decides as to what is allowed or not, including not permitting
> backward compatibility.  Would ignoring a protection mode enhance

Input saying "you shoulda aughta done it this way" bears very little
weight compared to that of actually picking up the tools, reviewing
the issue, and seeing if it works. cifs-utils used to be part of
Samba, and got factored out for good reasons, but has in general been
very well behaved. It's working well in literally millions of devices
around the world. If you or someone else with CIFS issues has a
problem, I'll recommend the Samba mailing lists.

> security by imposing a different access and security model? Perhaps, or
> even definitely yes.  However, the fact stated by the posting person
> that SuSE did emulate a perhaps-obsolete security model under a
> subsequent security model does seem to indicate that SuSE had a more
> universal implementation of backward compatibility than what was
> observed with EL.  If the posting was in error and SuSE does not permit
> such backward compatibility (perhaps with a warning message), then SuSE
> as well as EL is not backward compatible.

SuSE... has made some strange architectural decisions at various
times. Rather than holding forth on the moral and intellectual
failures of people you've not met or tried to collaborate with,
perhaps you could grab a VM and actually try it. Contribute to the
understanding, rather than decry someone else's work.

Me? I've got samba backporting for RHEL 7 and RHEL 8 public repos to
update. I'm hoping they've gotten the MIT Kerberos integration
straightened out enough to use for RHEL effectively. I've not been
backporting it to SL because there's not going to be an SL 8.


Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-18 Thread Ekkard Gerlach

Thank you to all here!

Solved:

1. folder DCIM  copy to SL filesytem.

2 a ssh -command to linux client with SD-card purges "DCIM" folder.

:)

Am 18.08.21 um 05:56 schrieb Nico Kadel-Garcia:

On Tue, Aug 17, 2021 at 11:21 AM Yasha Karant  wrote:

This is a poor design decision on the part of the Linux systems
implementers, as it breaks backward compatibility.  There is no reason
that an "auto-translator" from CIFS to what has been used in
unix/BSD/linux for a very long time should not have been implemented.


Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-18 Thread Yasha Karant
Although I was not involved with the specification of CIFS, nor with the 
design or implementation of CIFS on open systems, I respectfully 
disagree with at least some of your conclusions.  In a top-down entity 
(totalitarian dictatorship, clandestine or military service, 
corporation, authoritarian theocracy, etc), the designated decision 
maker/s decides as to what is allowed or not, including not permitting 
backward compatibility.  Would ignoring a protection mode enhance 
security by imposing a different access and security model? Perhaps, or 
even definitely yes.  However, the fact stated by the posting person 
that SuSE did emulate a perhaps-obsolete security model under a 
subsequent security model does seem to indicate that SuSE had a more 
universal implementation of backward compatibility than what was 
observed with EL.  If the posting was in error and SuSE does not permit 
such backward compatibility (perhaps with a warning message), then SuSE 
as well as EL is not backward compatible.


On 8/17/21 8:56 PM, Nico Kadel-Garcia wrote:

On Tue, Aug 17, 2021 at 11:21 AM Yasha Karant  wrote:


This is a poor design decision on the part of the Linux systems
implementers, as it breaks backward compatibility.  There is no reason
that an "auto-translator" from CIFS to what has been used in
unix/BSD/linux for a very long time should not have been implemented.


Please do not say why work should have been done that you haven't
tried to do yourself. CIFS, for example, supports multiple layers of
both username and group based permissions, with more complex
inheritance, ordered layers of "permit" and "deny" for each user or
group, and considerable awkwardness resolving them that costs
development, time, resources, and can cost a lot of tearing out of
hair when trying to transform it to POSIX style permissions.

CIFS was not designed for UNIX. It was designed for Windows
file-sharing, which has quite a few different distinctions due to the
previous VFAT or more modern NTFS filesystems which underly windows
filesystems and their capabilities.

NFSv4 ACL's come close to these permissions, but managing those in the
Linux world is a serious pain in the ass. Samba does a pretty good of
transforming underlying POSIX filesystems into CIFS compatible access,


Although this practice is not uncommon in the profiteer sector as
planned obsolescence for cash flow and other fiscal measures dominate,
and for which the customers have very little control (the typical EULA
is similar to the Godfather's offer you cannot refuse), it should be
different in the open systems source code sector.  Has anyone written a
script that converts "old" into CIFS?


CIFS is not the server. CIFS is the protocol. If the setups of the
server has changed, that's the server or the server configuration.
You'll need to negotiate that with the server admins.



Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-17 Thread Nico Kadel-Garcia
On Tue, Aug 17, 2021 at 11:21 AM Yasha Karant  wrote:
>
> This is a poor design decision on the part of the Linux systems
> implementers, as it breaks backward compatibility.  There is no reason
> that an "auto-translator" from CIFS to what has been used in
> unix/BSD/linux for a very long time should not have been implemented.

Please do not say why work should have been done that you haven't
tried to do yourself. CIFS, for example, supports multiple layers of
both username and group based permissions, with more complex
inheritance, ordered layers of "permit" and "deny" for each user or
group, and considerable awkwardness resolving them that costs
development, time, resources, and can cost a lot of tearing out of
hair when trying to transform it to POSIX style permissions.

CIFS was not designed for UNIX. It was designed for Windows
file-sharing, which has quite a few different distinctions due to the
previous VFAT or more modern NTFS filesystems which underly windows
filesystems and their capabilities.

NFSv4 ACL's come close to these permissions, but managing those in the
Linux world is a serious pain in the ass. Samba does a pretty good of
transforming underlying POSIX filesystems into CIFS compatible access,

> Although this practice is not uncommon in the profiteer sector as
> planned obsolescence for cash flow and other fiscal measures dominate,
> and for which the customers have very little control (the typical EULA
> is similar to the Godfather's offer you cannot refuse), it should be
> different in the open systems source code sector.  Has anyone written a
> script that converts "old" into CIFS?

CIFS is not the server. CIFS is the protocol. If the setups of the
server has changed, that's the server or the server configuration.
You'll need to negotiate that with the server admins.


AW: Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-17 Thread R.Laatsch
Why not adapt the original permits to
0777 ? Seems more consistent and may be
the real cause.
Regards, Rainer

Headline on the library: "Attention,
Reading endangers ignorance" .
Let me add: Pictograms are safe




Gesendet mit der Telekom Mail App
<https://urldefense.proofpoint.com/v2/url?u=https-3A__kommunikationsdienste.t-2Donline.de_redirects_email-5Fapp-5Fandroid-5Fsendmail-5Ffooter=DwICaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=CL6Z3TldMlxZEouaT48S05EEInB1kPxQQefe-1gyVEg=n96POQnp8Sf2I9JqPTkdrWoubDP7XJmjq7eITkQJLZc=
 >


--- Original-Nachricht ---
Von: R.Laatsch
Betreff: AW: Re: mount -t cifs ... -o username=... file_mode=0777 ignored
Datum: 18. August 2021, 2:06
An: Ekkard Gerlach
Cc: scientific-linux-users@fnal.gov


Try sshfs, please. My best advice.
Regards, Rainer



Gesendet mit der Telekom Mail App
<https://urldefense.proofpoint.com/v2/url?u=https-3A__kommunikationsdienste.t-2Donline.de_redirects_email-5Fapp-5Fandroid-5Fsendmail-5Ffooter=DwMFaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=0b7Db4zzTl3eWwkldIgV1C1qxgRnkaF4JJLRM_XYzDM=GdbupBNbCvT0jov11EZoS3qxv56nLyGFG9rUOdJm8d8=>



--- Original-Nachricht ---
Von: Ekkard Gerlach
Betreff: Re: mount -t cifs ... -o username=... file_mode=0777 ignored
Datum: 17. August 2021, 20:19
An: SCIENTIFIC-LINUX-USERS@fnal.gov




Am 17.08.21 um 15:14 schrieb Mark Stodola:
> On 8/17/21 7:38 AM, Ekkard Gerlach wrote:
>> Hi,
>>
>> options gid=users,file_mode=0777,dir_mode=0777 are ignored in SL 6.10:
>>
>> root@arthur <mailto:root@arthur> :/home/pc41# /bin/mount -t cifs  //
10.0.0.41/public
<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.0.0.41_public=DwMFaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=0b7Db4zzTl3eWwkldIgV1C1qxgRnkaF4JJLRM_XYzDM=yx06dGejaE7TzgATsVyK5TznC9tBpogGUZg46s51-Qs=>
>> /home/pc41/usb-stick -o
>> username=xxx,password=xxx,gid=users,file_mode=0777,dir_mode=0777
>> root@arthur <mailto:root@arthur> :/home/pc41# ls usb-stick/ -l
>> insgesamt 0
>> drwxr-xr-x 3 root users 0 17. Aug 13:39 DCIM
>>
>> You see: "root users" and users can't write, mode 777 is ignored.
>> With old Suse-server worked for 5 years.
>>
>> tia
>>
>> Ekkard
>
> gid, file_mode, dir_mode are all "fallback" values if they are not
> provided by the CIFS server.  So if your server has the CIFS unix
> extensions, those permissions are honored and the *_mode options are
> not applied.

CIFS-Server makes same permissions:

[public]
path = /media/usb0
public = yes
writable = yes
comment = smb share
printable = no
#force user = root
guest ok = yes
read only = no
#guest only = yes
create mask = 0666
directory mask = 0777

with or without force user=root,  =pc41, ... always the same.

The medium is a vfat microSD card of a DCIM camera.

>
> If you haven't, I would read the man page mount.cifs(8
<https://urldefense.proofpoint.com/v2/url?u=http-3A__mount.cifs-288=DwMFaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=0b7Db4zzTl3eWwkldIgV1C1qxgRnkaF4JJLRM_XYzDM=QMe0WZF-9NsUBNFOD7YXjuz5VLWBUEFXsO-YZ-L6oiA=>
 
) and the
> section "File and directory ownership and permissions."
>
before I read cryptic manpages and try to understand I change to windows
completely. Maybe SL software is even buggy, then I've lost much time.

tia

Ekkard

>
--


AW: Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-17 Thread R.Laatsch
Try sshfs, please. My best advice.
Regards, Rainer



Gesendet mit der Telekom Mail App
<https://urldefense.proofpoint.com/v2/url?u=https-3A__kommunikationsdienste.t-2Donline.de_redirects_email-5Fapp-5Fandroid-5Fsendmail-5Ffooter=DwIFaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=0b7Db4zzTl3eWwkldIgV1C1qxgRnkaF4JJLRM_XYzDM=GdbupBNbCvT0jov11EZoS3qxv56nLyGFG9rUOdJm8d8=
 >



--- Original-Nachricht ---
Von: Ekkard Gerlach
Betreff: Re: mount -t cifs ... -o username=... file_mode=0777 ignored
Datum: 17. August 2021, 20:19
An: SCIENTIFIC-LINUX-USERS@fnal.gov




Am 17.08.21 um 15:14 schrieb Mark Stodola:
> On 8/17/21 7:38 AM, Ekkard Gerlach wrote:
>> Hi,
>>
>> options gid=users,file_mode=0777,dir_mode=0777 are ignored in SL 6.10:
>>
>> root@arthur <mailto:root@arthur> :/home/pc41# /bin/mount -t cifs  //
<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.0.0.41_public=DwIFaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=0b7Db4zzTl3eWwkldIgV1C1qxgRnkaF4JJLRM_XYzDM=yx06dGejaE7TzgATsVyK5TznC9tBpogGUZg46s51-Qs=
 >
>> /home/pc41/usb-stick -o
>> username=xxx,password=xxx,gid=users,file_mode=0777,dir_mode=0777
>> root@arthur <mailto:root@arthur> :/home/pc41# ls usb-stick/ -l
>> insgesamt 0
>> drwxr-xr-x 3 root users 0 17. Aug 13:39 DCIM
>>
>> You see: "root users" and users can't write, mode 777 is ignored.
>> With old Suse-server worked for 5 years.
>>
>> tia
>>
>> Ekkard
>
> gid, file_mode, dir_mode are all "fallback" values if they are not
> provided by the CIFS server.  So if your server has the CIFS unix
> extensions, those permissions are honored and the *_mode options are
> not applied.

CIFS-Server makes same permissions:

[public]
path = /media/usb0
public = yes
writable = yes
comment = smb share
printable = no
#force user = root
guest ok = yes
read only = no
#guest only = yes
create mask = 0666
directory mask = 0777

with or without force user=root,  =pc41, ... always the same.

The medium is a vfat microSD card of a DCIM camera.

>
> If you haven't, I would read the man 
> page<https://urldefense.proofpoint.com/v2/url?u=http-3A__mount.cifs-288=DwIFaQ=gRgGjJ3BkIsb5y6s49QqsA=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A=0b7Db4zzTl3eWwkldIgV1C1qxgRnkaF4JJLRM_XYzDM=QMe0WZF-9NsUBNFOD7YXjuz5VLWBUEFXsO-YZ-L6oiA=
>  > ) and the
> section "File and directory ownership and permissions."
>
before I read cryptic manpages and try to understand I change to windows
completely. Maybe SL software is even buggy, then I've lost much time.

tia

Ekkard

>
--


Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-17 Thread Ekkard Gerlach

Am 17.08.21 um 15:14 schrieb Mark Stodola:

On 8/17/21 7:38 AM, Ekkard Gerlach wrote:

Hi,

options gid=users,file_mode=0777,dir_mode=0777 are ignored in SL 6.10:

root@arthur:/home/pc41# /bin/mount -t cifs  //10.0.0.41/public 
/home/pc41/usb-stick -o 
username=xxx,password=xxx,gid=users,file_mode=0777,dir_mode=0777

root@arthur:/home/pc41# ls usb-stick/ -l
insgesamt 0
drwxr-xr-x 3 root users 0 17. Aug 13:39 DCIM

You see: "root users" and users can't write, mode 777 is ignored. 
With old Suse-server worked for 5 years.


tia

Ekkard


gid, file_mode, dir_mode are all "fallback" values if they are not 
provided by the CIFS server.  So if your server has the CIFS unix 
extensions, those permissions are honored and the *_mode options are 
not applied.


CIFS-Server makes same permissions:

[public]
path = /media/usb0
public = yes
writable = yes
comment = smb share
printable = no
#force user = root
guest ok = yes
read only = no
#guest only = yes
create mask = 0666
directory mask = 0777

with or without force user=root,  =pc41, ... always the same.

The medium is a vfat microSD card of a DCIM camera.



If you haven't, I would read the man page mount.cifs(8) and the 
section "File and directory ownership and permissions."


before I read cryptic manpages and try to understand I change to windows 
completely. Maybe SL software is even buggy, then I've lost much time.


tia

Ekkard




--


Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-17 Thread Yasha Karant
This is a poor design decision on the part of the Linux systems 
implementers, as it breaks backward compatibility.  There is no reason 
that an "auto-translator" from CIFS to what has been used in 
unix/BSD/linux for a very long time should not have been implemented. 
Although this practice is not uncommon in the profiteer sector as 
planned obsolescence for cash flow and other fiscal measures dominate, 
and for which the customers have very little control (the typical EULA 
is similar to the Godfather's offer you cannot refuse), it should be 
different in the open systems source code sector.  Has anyone written a 
script that converts "old" into CIFS?


Yasha Karant

On 8/17/21 6:14 AM, Mark Stodola wrote:

On 8/17/21 7:38 AM, Ekkard Gerlach wrote:

Hi,

options gid=users,file_mode=0777,dir_mode=0777 are ignored in SL 6.10:

root@arthur:/home/pc41# /bin/mount -t cifs  //10.0.0.41/public 
/home/pc41/usb-stick -o 
username=xxx,password=xxx,gid=users,file_mode=0777,dir_mode=0777

root@arthur:/home/pc41# ls usb-stick/ -l
insgesamt 0
drwxr-xr-x 3 root users 0 17. Aug 13:39 DCIM

You see: "root users" and users can't write, mode 777 is ignored. With 
old Suse-server worked for 5 years.


tia

Ekkard


gid, file_mode, dir_mode are all "fallback" values if they are not 
provided by the CIFS server.  So if your server has the CIFS unix 
extensions, those permissions are honored and the *_mode options are not 
applied.


If you haven't, I would read the man page mount.cifs(8) and the section 
"File and directory ownership and permissions."


I hope that helps.

-Mark


Re: mount -t cifs ... -o username=... file_mode=0777 ignored

2021-08-17 Thread Mark Stodola

On 8/17/21 7:38 AM, Ekkard Gerlach wrote:

Hi,

options gid=users,file_mode=0777,dir_mode=0777 are ignored in SL 6.10:

root@arthur:/home/pc41# /bin/mount -t cifs  //10.0.0.41/public 
/home/pc41/usb-stick -o 
username=xxx,password=xxx,gid=users,file_mode=0777,dir_mode=0777

root@arthur:/home/pc41# ls usb-stick/ -l
insgesamt 0
drwxr-xr-x 3 root users 0 17. Aug 13:39 DCIM

You see: "root users" and users can't write, mode 777 is ignored. With 
old Suse-server worked for 5 years.


tia

Ekkard


gid, file_mode, dir_mode are all "fallback" values if they are not 
provided by the CIFS server.  So if your server has the CIFS unix 
extensions, those permissions are honored and the *_mode options are not 
applied.


If you haven't, I would read the man page mount.cifs(8) and the section 
"File and directory ownership and permissions."


I hope that helps.

-Mark