Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 May 2007 02:39:17 +0900
From:      Hiroharu Tamaru <tamaru@myn.rcast.u-tokyo.ac.jp>
To:        "Zane C.B." <v.velox@vvelox.net>
Cc:        freebsd-fs@freebsd.org
Subject:   Re: mount_smbfs and non-interactively passing a password to it
Message-ID:  <sa6d50vied6.wl%tamaru@myn.rcast.u-tokyo.ac.jp>
In-Reply-To: <20070520131042.2ce78ae0@vixen42>
References:  <20070519222527.680ba5c2@vixen42> <sa6hcq7ii1d.wl%tamaru@myn.rcast.u-tokyo.ac.jp> <20070520123607.4aba7f35@vixen42> <sa6ejlbig8d.wl%tamaru@myn.rcast.u-tokyo.ac.jp> <20070520131042.2ce78ae0@vixen42>

next in thread | previous in thread | raw e-mail | index | archive | help
At Sun, 20 May 2007 13:10:42 -0400, Zane C.B. wrote:
> 
> On Mon, 21 May 2007 01:58:58 +0900
> Hiroharu Tamaru <tamaru@myn.rcast.u-tokyo.ac.jp> wrote:
> 
> > At Sun, 20 May 2007 12:36:07 -0400, Zane C.B. wrote:
> > > 
> > > On Mon, 21 May 2007 01:19:58 +0900
> > > Hiroharu Tamaru <tamaru@myn.rcast.u-tokyo.ac.jp> wrote:
> > > 
> > > > 
> > > > At Sat, 19 May 2007 22:25:27 -0400, Zane C.B. wrote:
> > > > > Is passing a password to mount_smbfs non-interactively
> > > > > possible? I know it can't accept it on STDIN by piping it
> > > > > into it.
> > > > 
> > > > mount_smbfs(8) :
> > > >      -N      Do not ask for a password.  At run time,
> > > > mount_smbfs reads the ~/.nsmbrc file for additional
> > > > configuration parameters and a password.  If no password is
> > > > found, mount_smbfs prompts for it.
> > > > 
> > > > /usr/share/examples/smbfs/dot.nsmbrc :
> > > > [FSERVER:JOE]
> > > > # use persistent password cache for user 'joe'
> > > > password=$$1767877DF
> > > > 
> > > > I'm using -N for shares w/o passwords; I've never tried .nsmbrc
> > > > password myself
> > > 
> > > This is not useful if ~/ is not mounted and you are planning of
> > > mounting it using mount_smbfs.
> > 
> > You never said that.
> > Who's mounting ~user in that case? root?
> 
> Yeah, looking at doing it through PAM.

OK. finally, I see your picture and why you said ENV;

For a hack:
With the root creds in effect, /root/.nsmbrc is consulted
and /etc/nsmb.conf is always consulted (as written in that file).
Write the password in either of it, mount, and wipe it out.

Other than that, I've no idea.
You'd need to wipe out the environment vars if you use it too.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?sa6d50vied6.wl%tamaru>