<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access NTFS qtree via NFS and usermapping problem in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49970#M4570</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's exactly what I mean. In my opinion, it is a security hole, no matter whether UIDs or names are used. It can be exploited easily, so why bother about UIDs? It does not add any extra security or am I missing something? Of course I will restrict access to the exported qtree to hosts I know. As long as users on these hosts have no root access to their host, its fairly safe. UIDs lookup would not make any difference, right? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Jul 2014 17:27:31 GMT</pubDate>
    <dc:creator>USER_2000</dc:creator>
    <dc:date>2014-07-22T17:27:31Z</dc:date>
    <item>
      <title>Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49896#M4552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I want to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a FAS2240 with NetApp Release 8.1.3 7-Mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a CIFS qtree and I want to access it with NFS. So I started NFS on the NetApp and created /etc/exportfs like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/vol/vol1/qtree_vol1&amp;nbsp;&amp;nbsp;&amp;nbsp; -sec=sys,rw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can mount the filesystem from my Solaris box with NFSv4 without problems. I have set the NFSv4 domain on the NetApp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mount -o vers=4 netapp:/vol/vol1/qtree_vol1 /mnt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; But when I try to access the share from Solaris, I get a permission denied as root as well as with a non-root user. The user has full rights on the exported folder in NTFS. On the Solaris box all users have the same username as they have in Active Directory. I thought, this would suffice to not have to use /etc/usermap.cfg and /etc/passwd on the Netapp. But obviously, the Solaris user does not get mapped to the Active Directory user. Can this be done? How?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 05:32:09 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49896#M4552</guid>
      <dc:creator>USER_2000</dc:creator>
      <dc:date>2025-06-05T05:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49900#M4553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NetApp must be able to a) map Unix user &lt;STRONG&gt;name&lt;/STRONG&gt; to Unix user &lt;STRONG&gt;UID&lt;/STRONG&gt; and b) map &lt;STRONG&gt;Unix&lt;/STRONG&gt; user name to &lt;STRONG&gt;Windows&lt;/STRONG&gt; user name. You said nothing about configuring user mapping, so I assume nothing is configured ☺&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In practice that means that NetApp and Unix must use the same user database backend, most likely LDAP. And to ensure that Unix user means the same as Windows user, this LDAP backend usually must be AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see tr3490 for details on multiprotocol access and tr3458 for example of using AD as common backend.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 10:57:13 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49900#M4553</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T10:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49909#M4555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are probably right, but I wonder whether it is really necessary to use a common backend, which I do not have. (You gave me a lot to read and I admit I have not read everything yet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In tr3580 it says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"NFSv4 does not use UID/GID as the initial method of interaction between the client and the server by default. Instead there is string-based authentication between the client and the server."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And since the qtree is NTFS Style, it should not need any UID/GID from Unix, since they are not used anyway?&lt;/P&gt;&lt;P&gt;With the user name string from NFS the NetApp should be able to look up the user in AD directly?&lt;/P&gt;&lt;P&gt;Do you know why step a) is necessary and how step b) is done?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 12:02:45 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49909#M4555</guid>
      <dc:creator>USER_2000</dc:creator>
      <dc:date>2014-07-22T12:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49913#M4556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;UIDs/GIDs are still required at RPC level, which does not change with NFS v4. It could be that using NFS v4 with Kerberos bypasses this, but I do not have practical experience. IIRC your example explicitly used auth=sys which &lt;STRONG&gt;does&lt;/STRONG&gt; need to know numerical IDs. Also NFS v4+ still allows pure numerical IDs as fallback, so storage still must be prepared to resolve them. Also for security style unix Data ONTAP stores numerical IDs internally and again must be able to resolve them. I doubt it has two different code paths.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User mapping rules are configured in /etc/usermap.cfg; you mentioned this file yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is possible to do without common backend; it is just that for any practical purposes it becomes unmanageable very fast unless you need to grant access to fixed number of users that change infrequently.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 12:31:25 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49913#M4556</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T12:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49918#M4557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most of my users are Windows users. That´s why I decided to use NTFS style on the qtrees. I have about 10 Unix hosts with less than 20 users. I have added my credentials to the passwd file on the NetApp and I can access the exported filesystem now. I think, for this small number of users it should be possible to use this approach. I don´t need a usermap.cfg file, since the NetApp automatically checks AD for my Unix user name, which is the same user name in AD. Thank you for pointing me to tr3490, which explains the mapping very detailed. Things are much clearer now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be nice, if there would be an option to turn of usage of UID/GID, since its really not necessary in my environment and makes things just more complicated. May be one day it will be added? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 12:47:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49918#M4557</guid>
      <dc:creator>USER_2000</dc:creator>
      <dc:date>2014-07-22T12:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49921#M4558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I take it you are trying to map a UNIX user to Windows user but you get access denied message.&lt;/P&gt;&lt;P&gt;have you pasted full passd line in to \\filer\etc\passwd ?&lt;/P&gt;&lt;P&gt;I was once caughtup by passd line , I missed semi colon from passd line!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are still having issues please paste output of&amp;nbsp; wcc -u username&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then try &lt;/P&gt;&lt;P&gt;options&amp;nbsp; cifs.trace_dc_connection&amp;nbsp;&amp;nbsp; on&lt;/P&gt;&lt;P&gt;options&amp;nbsp; cifs.trace_login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After enabling above options, from the solaris client try accessing the nfs export in question as non-root user (su - user2000),&amp;nbsp; on the filer check for any authentication or mapping errors in /etc/messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt; you could also enable cifs auditing &lt;/P&gt;&lt;P&gt;cifs.audit.enable&lt;/P&gt;&lt;P&gt;cifs.audit.nfs.enable&lt;/P&gt;&lt;P&gt;cifs.audit.nfs.filter.filename&lt;/P&gt;&lt;P&gt;cifs.audit.saveas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 13:50:22 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49921#M4558</guid>
      <dc:creator>VENKATA04</dc:creator>
      <dc:date>2014-07-22T13:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49930#M4559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NFSv4 uses string based by default for security purposes, such as username@nfsv4.domain. This can be bypassed from the storage via the nfs.v4.id.allow_numerics option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That said, aborzenkov is correct - you need to be able to map UNIX users to Windows users when using NTFS style volumes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason is this - NTFS style volumes will use NTFS style ACLs. The storage must be able to discern the user identity to properly grant or deny access to the requesting user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to access using "root" then &lt;STRONG&gt;one &lt;/STRONG&gt;of four things must happen:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) A user mapping rule must map root to a valid Windows user (ie DOMAIN\user &amp;lt;= root)&lt;/P&gt;&lt;P&gt;2) A user named "root" must exist in the AD domain to allow implicit 1:1 mapping&lt;/P&gt;&lt;P&gt;3) The option wafl.nt_admin_priv_map_to_root must be set&lt;/P&gt;&lt;P&gt;4) The option wafl.default_nt_user must be set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most secure of the above would be #1 or 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like you worked around the issue by adding users to the passwd file, so that's good. But there is, and will not be, a way to bypass UID/GID. It's a security hole. You don't want to allow anyone access to your data without needing a valid user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 14:11:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49930#M4559</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-22T14:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49939#M4560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;&lt;P&gt;But there is, and will not be, a way to bypass UID/GID. It's a security hole. You don't want to allow anyone access to your data without needing a valid user.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;I think what confuses OP here is that we both speak about UIDs. OP is right in that strictly speaking UID are not needed in described scenario. What really happens here is user validation on server side. NetApp gets &lt;STRONG&gt;client&lt;/STRONG&gt; user name in NFSv4 request and it must verify that user with this name actually exists from &lt;STRONG&gt;server&lt;/STRONG&gt; point of view. So it must perform &lt;STRONG&gt;Unix&lt;/STRONG&gt; user name lookup first. That this lookup returns UID as side effect is irrelevant in this context. This validation likely happens even before NetApp tries to access file (and knows its security style).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 14:59:28 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49939#M4560</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T14:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49944#M4561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;It would be prudent to mark question as answered then (or at least answers as helpful &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 15:00:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49944#M4561</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T15:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49949#M4562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If we're talking NFSv4 and bypassing the user string, then the aforementioned nfs.v4.id.allow_numerics set to "on" would achieve more NFSv3-like behavior.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 15:03:14 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49949#M4562</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-22T15:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49954#M4564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;&lt;P&gt;If we're talking NFSv4 and bypassing the user string,&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;No, we are talking about using user string in NFSv4 but bypassing Unix user lookup on NetApp side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 15:09:30 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49954#M4564</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T15:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49958#M4566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;User lookup will happen for all NFS versions, regardless of options if the volume is NTFS security style. There is not any way to get around that, as there needs to be a way to discern the NTFS ACL for the user requesting access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the volume is UNIX security style, then there would be no need to look up a user name for NFSv4 (or map it to a Windows user) as long as the nfs.v4.id.allow_numerics is enabled. Instead, the UID/GID would be passed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows access will always map to a UNIX user, however, no matter what security style is being used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 15:14:47 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49958#M4566</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-22T15:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49964#M4568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;&lt;P&gt;User lookup will happen for all NFS versions, regardless of options if the volume is NTFS security style. There is not any way to get around that, as there needs to be a way to discern the NTFS ACL for the user requesting access.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Now I became curious myself &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; To discern NTFS ACL you need to know Windows user name (OK, you need Windows SID, but let's keep it simple); to get Windows user name you need to know Unix user name and with NFSv4 you get user Unix name from client already. So what is technical reason to perform user lookup at this point?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 16:21:16 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49964#M4568</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T16:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49970#M4570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's exactly what I mean. In my opinion, it is a security hole, no matter whether UIDs or names are used. It can be exploited easily, so why bother about UIDs? It does not add any extra security or am I missing something? Of course I will restrict access to the exported qtree to hosts I know. As long as users on these hosts have no root access to their host, its fairly safe. UIDs lookup would not make any difference, right? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 17:27:31 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49970#M4570</guid>
      <dc:creator>USER_2000</dc:creator>
      <dc:date>2014-07-22T17:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49975#M4572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wasn't aware of the logging options. I will certainly have a look into that. Thank you.&lt;/P&gt;&lt;P&gt;Yes, as stated before I have added the users to /etc/passwd and access is fine now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 17:32:35 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49975#M4572</guid>
      <dc:creator>USER_2000</dc:creator>
      <dc:date>2014-07-22T17:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49980#M4573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The client may know the user name, but the storage does not. It needs&amp;nbsp; to look up the Windows user name based on the UNIX name/UID it receives&amp;nbsp; from the client when the volume is NTFS security style. This is true&amp;nbsp; for NFSv3 and NFSv4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a NFSv4 request comes in&amp;nbsp; to storage, the client knows the user as username@nfsv4id.domain. The&amp;nbsp; storage must also recognize that username@nfsv4id.domain, else the user&amp;nbsp; will get squashed to "nobody" (or the equivalent set in idmapd.conf).&amp;nbsp; Everything, including case, much match EXACTLY or the storage will not&amp;nbsp; consider the string valid. However, the client will not send the string;&amp;nbsp; it will send the numeric. Then the storage must figure the rest out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; v4id.domain is set via the storage option nfs.v4.id.domain in 7-mode&amp;nbsp; and -v4-id-domain in cDOT. On the client, the domain is set via the&amp;nbsp; idmapd.conf file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a NFSv3 ACCESS request&amp;nbsp; occurs, the client will send the following information to the storage:&amp;nbsp; UID, GID, client and auxiliary GIDs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; storage must then figure out who UID 10001 is in Windows to allow&amp;nbsp; access, due to NTFS permissions. To do that, it has to translate UID&amp;nbsp; 10001 from a name service. In my case, I use LDAP. I'll use cDOT to&amp;nbsp; illustrate this, but the same logic applies to 7-mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;parisi-cdot::*&amp;gt; diag secd authentication translate -node parisi-cdot-02 -vserver SVM -uid 10001&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;test&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once&amp;nbsp; the storage knows that UID 10001 is UNIX user "test," then the name&amp;nbsp; mapping occurs. Name mapping only occurs by name, not numeric.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;parisi-cdot::*&amp;gt; diag secd name-mapping show -node parisi-cdot-02 -vserver SVM -direction unix-win -name test&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;test maps to DOMAIN\test&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And creds are fetched (the above name mapping/translation are done all as a part of the credential fetching):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;parisi-cdot::*&amp;gt;&amp;nbsp; diag secd authentication show-creds -node parisi-cdot-02 -vserver SVM&amp;nbsp; -uid 10001 -list-id true -list-name true&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; UNIX UID: 10001 (test) &amp;lt;&amp;gt; Windows User: S-1-5-21-3413584004-3312044262-250399859-1114 (DOMAIN\test (Domain User))&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; GID: 513 (Domain Users)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; Supplementary GIDs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; 10011&amp;nbsp; (ldifde-group)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; Windows Membership:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; S-1-5-21-3413584004-3312044262-250399859-1118&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOMAIN\testgroup (Domain group)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; S-1-5-21-3413584004-3312044262-250399859-513&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOMAIN\Domain Users (Domain group)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; S-1-5-32-545&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BUILTIN\Users (Alias)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; User is also a member of Everyone, Authenticated Users, and Network Users&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; Privileges (0x80):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In&amp;nbsp; the above, we see that the user "test" belongs to testgroup, Domain&amp;nbsp; Users and Users, as well as the normal Everyone, Authenticated Users,&amp;nbsp; and Network Users groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The volume is named "ntfs" and has the following ACLs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;parisi-cdot::*&amp;gt; vserver security file-directory show -vserver SVM -path /ntfs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vserver: SVM&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; File Path: /ntfs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Style: ntfs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Effective Style: ntfs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS Attributes: 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; DOS Attributes in Text: ----D---&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Expanded Dos Attributes: -&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unix User Id: 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unix Group Id: 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unix Mode Bits: 777&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; Unix Mode Bits in Text: rwxrwxrwx&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACLs: NTFS Security Descriptor&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Control:0x9504&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Owner:BUILTIN\Administrators&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group:BUILTIN\Administrators&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DACL - ACEs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ALLOW-DOMAIN\testgroup-0x1f01ff-OI|CI&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ALLOW-DOMAIN\Administrator-0x1f01ff-OI|CI&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ALLOW-Everyone-0x1200a9-OI|CI&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we know that user has access based on the ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I mount the same volume via NFSv4, I see the &lt;STRONG&gt;same UID and GID information from the client&lt;/STRONG&gt; - not the user name:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, the storage doesn't use UID/GID for access; it uses it to discern what the user is from NTFS perspective. The difference in NFSv4 is in the ACCESS reply. The reply returns owner, group, etc as the string:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 4004px; width: 1px; height: 1px; overflow: hidden;"&gt;Everyone, Authenticated Users, and Network UsersEveryone, Authenticated Users, and Network UsersHowecver&lt;/DIV&gt;&lt;P&gt;If&amp;nbsp; I try to use a UNIX user that does not have a Windows user counterpart,&amp;nbsp; I won't even be able to cd to the mount via any version of NFS, as&amp;nbsp; initial authentication on the storage fails:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[root@centos64 /]# su nfs4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ cd /unix&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh: cd: /unix: Permission denied&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;parisi-cdot::*&amp;gt; event log show&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Node&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Severity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Event&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;------------------- ---------------- ------------- ---------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;7/22/2014&amp;nbsp; 13:20:16&amp;nbsp; parisi-cdot-02&amp;nbsp;&amp;nbsp; DEBUG&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; secd.nfsAuth.noUnixCreds:&amp;nbsp; vserver (SVM) Cannot determine UNIX identity. Error: Get user&amp;nbsp; credentials procedure failed&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; [&amp;nbsp; 5 ms] Using a cached connection to 10.228.225.120&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp; [&amp;nbsp;&amp;nbsp;&amp;nbsp; 12] ID 9999 not found in UNIX authorization source LDAP&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp; [&amp;nbsp;&amp;nbsp;&amp;nbsp; 12] ID 9999 not found in UNIX authorization source LOCAL&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; [&amp;nbsp;&amp;nbsp;&amp;nbsp; 12] Could not get credentials for ID 9999 using any NS-SWITCH authorization source&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;**[&amp;nbsp;&amp;nbsp;&amp;nbsp; 12] FAILURE: Unable to retrieve credentials for UNIX user with UID 9999&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I use that same 9999 UID to access a UNIX style&amp;nbsp; volume, I will gain access based on the mode bits set on the volume(&amp;nbsp; i.e. 777):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[root@centos64 /]# mount sn1krb:/unix /unix&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[root@centos64 /]# su nfs4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ cd /unix&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ ls -la / | grep unix&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;drwxrwxrwx.&amp;nbsp; 10 root root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4096 Jul 17 11:47 unix&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I write a file via NFSv4, the user will be "nobody" since the storage doesn't know who nfs4/UID 9999 is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[root@centos64 /]# su nfs4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ cd /unix&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ touch nfs4_newfile&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ ls -la | grep nfs4_newfile&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG style="font-family: courier new,courier;"&gt;-rw-r--r--.&amp;nbsp; 1 nobody&amp;nbsp;&amp;nbsp;&amp;nbsp; root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 Jul 22 13:29 nfs4_newfile&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I change the v4-numeric-ids option to "enabled" to allow for NFSv3-like functionality, the user shows up properly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;parisi-cdot::*&amp;gt; nfs server modify -vserver SVM -v4-numeric-ids enabled&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[root@centos64 /]# su nfs4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ cd /unix&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ touch nfs4_newfile_numerics&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;sh-4.1$ ls -la | grep numerics&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG style="font-family: courier new,courier;"&gt;-rw-r--r--.&amp;nbsp; 1 nfs4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 Jul 22 13:31 nfs4_newfile_numerics&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In NFSv4, the user string matters on writes or when trying to translate the name/group on the file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I write as the 9999 user, the OPEN request comes from the client as UID 9999:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reply from the storage is that the user is "nobody":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I use a valid NFSv4 user, that string shows up properly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sense?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 17:51:51 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49980#M4573</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-22T17:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49984#M4574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sigh. None of the attached traces made it to the post. Grr.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If needed, I can save them as images and upload.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 17:58:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49984#M4574</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-22T17:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49989#M4575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;USER_2000 wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's exactly what I mean. In my opinion, it is a security hole, no matter whether UIDs or names are used. It can be exploited easily, so why bother about UIDs? It does not add any extra security or am I missing something? Of course I will restrict access to the exported qtree to hosts I know. As long as users on these hosts have no root access to their host, its fairly safe. UIDs lookup would not make any difference, right? &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;It cannot be exploited as easily in NFSv4 if the user string cannot resolve and gets squashed to nobody on the storage. If the mode bits or NFSv4 ACLs are set up properly, then access won't be allowed to users named "nobody." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If using NTFS security style, if the user cannot map to a valid Windows user, then access won't be allowed at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 18:01:06 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49989#M4575</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-22T18:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49992#M4576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;In my opinion, it is a security hole, no matter whether UIDs or names are used.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Well ... traditional NFS authentication model is weak, there is nothing new. Use Kerberos if you need something more trustworthy.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;It can be exploited easily, so why bother about UIDs?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Forget about UID. I apologize for causing this confusion. It is not about UID, it is about verifying that user name supplied by client actually exists.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;It does not add any extra security or am I missing something?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;In your specific case it prevents client from supplying user name Administrator (or any user name for that matter) and getting some more access than intended. By verifying user name NetApp can restrict access only to authorized users.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;&lt;P&gt;As long as users on these hosts have no root access to their host, its fairly safe.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Nothing precludes user space NFS client implementation ... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 18:37:19 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49992#M4576</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-07-22T18:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: Access NTFS qtree via NFS and usermapping problem</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49996#M4577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agreed. I overlooked that. Good point.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2014 19:03:25 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Access-NTFS-qtree-via-NFS-and-usermapping-problem/m-p/49996#M4577</guid>
      <dc:creator>USER_2000</dc:creator>
      <dc:date>2014-07-22T19:03:25Z</dc:date>
    </item>
  </channel>
</rss>

