<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CIFS and Kerberos in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7591#M725</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone successfully worked with Kerberos authentication and CIFS shares on non-Windows clients - particularly OSX and Linux?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ONTAP 7.3.3. CIFS works perfectly fine from Windows clients and non-Windows clients using NTLM authentication but does not work with Kerberos. I've trolled every web article posting I can find but none of them seem to offer any solution. OSX falls back to asking for a password and using NTLM and smbclient on Linux always gives "SPNEGO login failed: NT_STATUS_MORE_PROCESSING_REQUIRED". I switched on the option cifs.trace_login but it does not log anything on the Netapp side for those clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas would be appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jun 2025 07:11:42 GMT</pubDate>
    <dc:creator>rmharwood</dc:creator>
    <dc:date>2025-06-05T07:11:42Z</dc:date>
    <item>
      <title>CIFS and Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7591#M725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone successfully worked with Kerberos authentication and CIFS shares on non-Windows clients - particularly OSX and Linux?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ONTAP 7.3.3. CIFS works perfectly fine from Windows clients and non-Windows clients using NTLM authentication but does not work with Kerberos. I've trolled every web article posting I can find but none of them seem to offer any solution. OSX falls back to asking for a password and using NTLM and smbclient on Linux always gives "SPNEGO login failed: NT_STATUS_MORE_PROCESSING_REQUIRED". I switched on the option cifs.trace_login but it does not log anything on the Netapp side for those clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas would be appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 07:11:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7591#M725</guid>
      <dc:creator>rmharwood</dc:creator>
      <dc:date>2025-06-05T07:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS and Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7596#M726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have the same problem. Is there any more information about this problem ? I am going to open a support call about this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greetings ... Richard Smits&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 10:58:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7596#M726</guid>
      <dc:creator>rsmits1074</dc:creator>
      <dc:date>2011-10-19T10:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS and Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7599#M727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was a while back, so I may be mistaken here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think there were two factors involved: one was to make sure that the DNS name of the filer was identical to the Kerberos principal name. We had to check the filer's entry in Active Directory for that. If it doesn't match then you have to change the DNS domain of the filer, remove the AD entry and reconfigure cifs by doing "cifs setup".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second issue was that there is a version of OSX (although I can't remember which one) that did not successfully connect if share browsing was disabled. As long as it could successfully browse one share, it was ok. So, what we ended up doing was enabling share browsing at a filer level and then disabling share browsing on each of the shares.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if these are applicable to you and how it works out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 11:21:58 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7599#M727</guid>
      <dc:creator>rmharwood</dc:creator>
      <dc:date>2011-10-19T11:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS and Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7604#M728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can say that CIFS and Kerberos are working just fine for us. We are running 7.3.3 and all of our user home folders and profiles live on CIFS shares from our NetApp. We are running mostly 10.6 with a little bit of 10.5 and 10.7 mixed in on the MacOSX client side. All of the clients are bound to Active Directory and Open Directory in the normal golden triangle setup. We have no issues with the Mac clients falling back to password prompts when accessing a CIFS share. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 17:15:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7604#M728</guid>
      <dc:creator>ben_fenstermaker</dc:creator>
      <dc:date>2011-10-19T17:15:01Z</dc:date>
    </item>
    <item>
      <title>CIFS and Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7609#M729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;No, our Linux clients are having trouble accessing CIFS shares on our 8.01 filer. NTLM works good, krb5 nfs works also good, but krb5 to a cifs share does not work.&lt;/P&gt;&lt;P&gt;I am trying to get a good wireshark trace to see the raw reply from the filer. I was told it has to do with 'extended security negotiation' support' ?&lt;/P&gt;&lt;P&gt;I am trying to get more information from support about this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Oct 2011 12:44:52 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7609#M729</guid>
      <dc:creator>rsmits1074</dc:creator>
      <dc:date>2011-10-24T12:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS and Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7612#M730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is something I've been struggling with recently. I'm glad to find I'm not the only one with this issue. I manage the cifs client in question, not the filer, but here is what I have found out thus far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client: CentOS 6 with cifs-utils-4.8.1-2 installed (due to &lt;A href="https://bugzilla.redhat.com/show_bug.cgi?id=667382" target="_blank"&gt;https://bugzilla.redhat.com/show_bug.cgi?id=667382&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;Server A: Solaris 10 u8 x86 with kernel patch 144501-19 and samba patch 119758-20 installed.&lt;/P&gt;&lt;P&gt;Server B: A NetApp device (details unknown).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the client I added printk.time=1 to add timestamps to the dmesg output. Then I loaded the cifs module, set Kerberos to be the only allowed authentication mechanism (using the SecurityFlags defined here: &lt;A href="http://www.kernel.org/doc/readme/fs-cifs-README" target="_blank"&gt;http://www.kernel.org/doc/readme/fs-cifs-README&lt;/A&gt; )and increased the cifs module debug level&lt;/P&gt;&lt;P&gt;# modprobe cifs&lt;/P&gt;&lt;P&gt;# echo 0x08008 &amp;gt; /proc/fs/cifs/SecurityFlags&lt;/P&gt;&lt;P&gt;# echo 3 &amp;gt; /proc/fs/cifs/cifsFYI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also prepared /etc/request-key.conf as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;create cifs.spnetgo * * /usr/sbin/cifs.upcall -l %k %d&lt;/P&gt;&lt;P&gt;create dns_resolver * * /usr/sbin/cifs.upcall -l %k %d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then used a logon script to run the mount using the cached kerberos credentials of whoever just logged on:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/usr/bin/sudo /sbin/mount.cifs //serverA/share1 ~/mountpoint -o user=$(/usr/bin/who -m | awk '{print $1}'),uid=$(/usr/bin/id -u),gid=1406,dir_mod=0770,file_mod=0660,dynperms,domain=DOMAIN1,sec=krb5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/etc/sudoers&lt;/P&gt;&lt;P&gt;%DOMAIN1_group1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ALL = NOPASSWD: /sbin/mount.cifs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a user logs on, dmesg shows the following (abridged and hand-typed, as I cannot copy/paste it easily at the moment):&lt;/P&gt;&lt;P&gt;fs/cifs/cifssmb.c: secFlags 0x8&lt;/P&gt;&lt;P&gt;fs/cifs/cifssmb.c: Kerberos only mechanism, enable extended security&lt;/P&gt;&lt;P&gt;[output omitted]&lt;/P&gt;&lt;P&gt;fs/cifs/connect.c: Security Mode: 0x3 Capabilities: 0x8080f3fd TimeAdjust: 14400&lt;/P&gt;&lt;P&gt;fs/cifs/sess.c: sess setup type 4&lt;/P&gt;&lt;P&gt;fs/cifs/cifs_spnego.c: key description =&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it goes on to succeed from there. The cifs code shows session setup type 4 is Kerberos (&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifsglob.h" target="_blank"&gt;http://lxr.free-electrons.com/source/fs/cifs/cifsglob.h&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cifsglob.h&lt;/P&gt;&lt;P&gt; 98 enum securityEnum {&lt;/P&gt;&lt;P&gt; 99&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LANMAN = 0,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* Legacy LANMAN auth */&lt;/P&gt;&lt;P&gt;100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NTLM,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* Legacy NTLM012 auth with NTLM hash */&lt;/P&gt;&lt;P&gt;101&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NTLMv2,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* Legacy NTLM auth with NTLMv2 hash */&lt;/P&gt;&lt;P&gt;102&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RawNTLMSSP,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* NTLMSSP without SPNEGO, NTLMv2 hash */&lt;/P&gt;&lt;P&gt;103 /*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NTLMSSP, */ /* can use rawNTLMSSP instead of NTLMSSP via SPNEGO */&lt;/P&gt;&lt;P&gt;104&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kerberos,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* Kerberos via SPNEGO */&lt;/P&gt;&lt;P&gt;105 };&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I connect to the NetApp filer, which I don't manage so I know nothing about, I get this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fs/cifs/cifssmb.c: secFlags 0x8&lt;/P&gt;&lt;P&gt;fs/cifs/cifssmb.c: Kerberos only mechanism, enable extended security&lt;/P&gt;&lt;P&gt;[output omitted]&lt;/P&gt;&lt;P&gt;fs/cifs/connect.c: Security Mode: 0x3 Capabilities: 0x8000e3fd TimeAdjust: 14400&lt;/P&gt;&lt;P&gt;fs/cifs/sess.c: sess setup type 3&lt;/P&gt;&lt;P&gt;fs/cifs/sess.c: ntlmssp session setup phase 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...and it goes on to say NT_STATUS_MORE_PROCESSING_REQUIRED and eventually returns permission denied because it's using RawNTMLSSP (type 3, again from the above enum) without ever requesting a password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only significant difference that I can detect is in the server capabilities flag: 0x8080f3fd&amp;nbsp; (working) vs 0x8000e3fd (not working). Most of these are defined here: &lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h" target="_blank"&gt;http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L569" name="L569" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;569&lt;/A&gt; &lt;STRONG&gt;&lt;EM&gt;/* Negotiate response Capabilities */&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L570" name="L570" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;570&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_RAW_MODE" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_RAW_MODE&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000001&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L571" name="L571" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;571&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_MPX_MODE" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_MPX_MODE&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000002&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L572" name="L572" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;572&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_UNICODE" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_UNICODE&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000004&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L573" name="L573" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;573&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_LARGE_FILES" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_LARGE_FILES&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000008&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L574" name="L574" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;574&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_NT_SMBS" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_NT_SMBS&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000010&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&lt;EM&gt;/* implies CAP_NT_FIND */&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L575" name="L575" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;575&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_RPC_REMOTE_APIS" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_RPC_REMOTE_APIS&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000020&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L576" name="L576" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;576&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_STATUS32" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_STATUS32&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000040&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L577" name="L577" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;577&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_LEVEL_II_OPLOCKS" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_LEVEL_II_OPLOCKS&lt;/A&gt;&amp;nbsp;&amp;nbsp; 0x00000080&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L578" name="L578" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;578&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_LOCK_AND_READ" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_LOCK_AND_READ&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000100&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L579" name="L579" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;579&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_NT_FIND" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_NT_FIND&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000200&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L580" name="L580" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;580&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_DFS" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_DFS&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00001000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L581" name="L581" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;581&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_INFOLEVEL_PASSTHRU" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_INFOLEVEL_PASSTHRU&lt;/A&gt; 0x00002000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L582" name="L582" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;582&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_LARGE_READ_X" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_LARGE_READ_X&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00004000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L583" name="L583" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;583&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_LARGE_WRITE_X" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_LARGE_WRITE_X&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00008000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L584" name="L584" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;584&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_LWIO" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_LWIO&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00010000 &lt;STRONG&gt;&lt;EM&gt;/* support fctl_srv_req_resume_key */&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L585" name="L585" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;585&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_UNIX" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_UNIX&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00800000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L586" name="L586" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;586&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_COMPRESSED_DATA" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_COMPRESSED_DATA&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x02000000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L587" name="L587" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;587&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_DYNAMIC_REAUTH" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_DYNAMIC_REAUTH&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x20000000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L588" name="L588" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;588&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_PERSISTENT_HANDLES" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_PERSISTENT_HANDLES&lt;/A&gt; 0x40000000&lt;/P&gt;&lt;P&gt;&lt;A href="http://lxr.free-electrons.com/source/fs/cifs/cifspdu.h#L589" name="L589" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;589&lt;/A&gt; #define &lt;A href="http://lxr.free-electrons.com/ident?i=CAP_EXTENDED_SECURITY" style="border-bottom-width: 1px; border-bottom-style: dotted; border-bottom-color: #999999; color: black; background-color: white;" target="_blank"&gt;CAP_EXTENDED_SECURITY&lt;/A&gt;&amp;nbsp; 0x80000000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From this, I can see that both servers have extended security capabilities, but that the NetApp device doesn't have Unix capabilities enabled (0x00800000). However, this should not be a requirement, since I am using dynperms to let the server handle all of the permissions. The other difference is 0x0000f000 (working) vs 0x0000e000 (non working). I have not been able to find out what capability (or set of capabilities) this flag represents. Hopefully someone else can make use of this info. Ideally, the NetApp filer can be configured with CAP_UNIX or whatever 0x0000f000 is in order to resolve this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2011 20:22:08 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-and-Kerberos/m-p/7612#M730</guid>
      <dc:creator>BWAGNER_SEEDS</dc:creator>
      <dc:date>2011-10-31T20:22:08Z</dc:date>
    </item>
  </channel>
</rss>

