Received: by 2002:a05:7208:9594:b0:7e:5202:c8b4 with SMTP id gs20csp1148803rbb; Sun, 25 Feb 2024 23:22:35 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXYT7p/Wx6JxgC2zWA1YdckFYmMyBzeIKAF95VVNp49R1NeAqibbdW/d2EZR1ae22DwW4cO3h3y96+8k1MgwCkOHfouY7yDYg+Ng2J7EA== X-Google-Smtp-Source: AGHT+IGl20YXLVuvMFD3eiNh29PkBxlmtlAw7P7fDHTvyMJhtuQVTCyqjLScQwWDSW9EvbS2Y9/K X-Received: by 2002:a17:906:394c:b0:a3e:5cba:e005 with SMTP id g12-20020a170906394c00b00a3e5cbae005mr3347018eje.64.1708932154868; Sun, 25 Feb 2024 23:22:34 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708932154; cv=pass; d=google.com; s=arc-20160816; b=RL3N6miB4Ean9vbwLBs6LHVTs5hbPoiau8AaY3n2VeP9ByZc0ZbQ/TbxrxKO51g0iA wL0t+q4HSQ8ROVz1ouCR+rEtQhX2sIJomZDeGhTI4ngBtduv65WdJirBL5rYHIXSqzwb 31pix8XPmcO7aPkwOvva1OrpKlqYeZNAAibHDnL5zj2HAfuchN8KLAujL5dPRWwzvDvn zqRbjg27RcOXv0gqC3DAE28n0S0pFIcrw0QCeU5BgUyNCGTlHggms/27OWoYIvf181el 8xodye1ViBSV3TRmGRcD5FxzAB6Wx8z1xh+3DqYO3Sn5maETSL6n2Hb+OxOLoKy1AmJD A9gQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=dkzSR/Jxd4Jk3yxx6aFQQQyhpNIDT5EhYhLmaEIh+mk=; fh=A3pMOUK00huGibGCZBFsLekFLVbB5hHGKjUNNKwO+5E=; b=lP+gQYMgYbohvvJ14DD9V6b7t+z34TIP7chaCgFB5xcPPd8gHrdSqDFiN+t4OkqGMk 6CDltH9sWptiG6ULsqqa6g/x6ZQh6NwwWHdf08KRRd8g2eTQqpk6s3dIl9JLSJyaQCNr AVp6xCCh828d4GGnlSFXTTLU/UB3zx7RTqo7q3gW/wuRuEvbd7PEkHf2avBfvtHpIFrp 89CxxoA3muL571vQ0cfO+RTDmt1UEmQKq13+2kJveOCkZpa1cLcyRSEwqPIXSZI8G58r mIEMeiACiKAYrIQoZ9wZzFCEtEQwDK2Q1hctgnRim15duOgeQm1DuwgIPJv7yW8cPa4j d/Sw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="foNPt6/w"; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-nfs+bounces-2084-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2084-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id j23-20020a170906279700b00a3e6e2b09cesi1850654ejc.927.2024.02.25.23.22.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 25 Feb 2024 23:22:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs+bounces-2084-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="foNPt6/w"; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-nfs+bounces-2084-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2084-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 669591F2302D for ; Mon, 26 Feb 2024 07:22:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 06C501BC4A; Mon, 26 Feb 2024 07:22:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="foNPt6/w" X-Original-To: linux-nfs@vger.kernel.org Received: from mail-oo1-f44.google.com (mail-oo1-f44.google.com [209.85.161.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1294FEEDA for ; Mon, 26 Feb 2024 07:22:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.161.44 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708932151; cv=none; b=NIsjYswn3fpR0OpacaqsS4tjtp0T/W238LIGda76PIEIEE0Y/qYvlUsKq9TuUe+eGb83QViA3IhQqd6m1ypt9xCerEXbeCW9j7MJu3j5xTi7MOICyOIeBPBAzJvlWhAlkenuKQAZjSX7IbqCAw1NXXPaMzr0KlHZvFi9uLmrBuI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708932151; c=relaxed/simple; bh=wlKyzEsgLC5FhPEmlBt7+9+HieUHL8hpxcq1yUSqIwE=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Content-Type; b=bxm+D17EIqxNB5Otl9xRLIjGhWdkzSPkHaju2sl8/fz4QGd5PTeptWwVACgG4sRtKezHeBm00yirq4wTzp5PdkA0sicmpIZxcP0Yhag5j6Sm7Vj2tHbGUvQjndUOkXI7CBC7kWS6Qorkwikh7yxhfqATqmC9U0oUdhhJWHZ/qYk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=foNPt6/w; arc=none smtp.client-ip=209.85.161.44 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-oo1-f44.google.com with SMTP id 006d021491bc7-5a095dc53e7so133941eaf.3 for ; Sun, 25 Feb 2024 23:22:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1708932149; x=1709536949; darn=vger.kernel.org; h=content-transfer-encoding:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=dkzSR/Jxd4Jk3yxx6aFQQQyhpNIDT5EhYhLmaEIh+mk=; b=foNPt6/w76ikNlVsZZOACwn53T8AOrglZxNqGe/npJT5n2KUoSUbvJL/nhMrko/ZBf VG9XlyAg2QLVOhTV02pnjCsq6MkUdm5oiZeKqfM5+ZwZvo6VtfWZd5z4B0KiH0z5pASI 600SisrDQ3aTavPc+XNeuJsjJhVH8EBv0tKlgZF7VNafQ5RC2wQjeMzl5mULFwePtWpM c1bzCrWzTCEeLY5Y9WIq6jopn/lt2E7FpWHgBf91h0tF0fytXvhdtAOLhTrPd7TwL+O0 5Yl8DvAAbU9Ez8ncV6xhem2mZsgJ+S1en25OTnLPXsZKASkVa+HcVW5wcUtGEtDVCZQv oe6Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708932149; x=1709536949; h=content-transfer-encoding:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=dkzSR/Jxd4Jk3yxx6aFQQQyhpNIDT5EhYhLmaEIh+mk=; b=bOaP7akxExMt1m3KRvPvU/srZf1dthGpVmiJ76G3immSpJ+gB/U2uuPc5sdQVH1Mc+ JEOjDHwoFYyROXVPyjqrLVlc6AuXKPqVXS5/JbwWOUMbM7p9JNUeLbSsvC9QdcLEcGd9 v8Bcs9QvV6yXWZhgBpep7NMoPCqBAdsd22rBLULuk+iSH0LYSo71gnW0tzX5KSQinOel M4pWEPgkQfxXJrCWW2p50iVZxy65NktZaFRX3OBZyvrn2IIWsKWMLiojegiHIgDWntrp CZTq2CJplfk73fLWdED57OKW6huuxp6YAPYlQBO+6N02Pkd6EGCNzUE7IvS03F+49/uG bBlw== X-Gm-Message-State: AOJu0YwJJAv/ZDBAxsXW0x2RZ/wOX3lhMJ05xqrwIiaoEtvW0xJKY+tU hxQFW56ZExoekV+jO9mW285co6TDR210zni95ei89VmcTisQP6Qn/pBmw3fTIQw88ExokfAjMaH 5uQFg27lPsLBOCcpT9HFH7zuNbgKHnereOJ8= X-Received: by 2002:a05:6870:b493:b0:21e:7ed1:736d with SMTP id y19-20020a056870b49300b0021e7ed1736dmr5922291oap.58.1708932148821; Sun, 25 Feb 2024 23:22:28 -0800 (PST) Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: In-Reply-To: From: Martin Wege Date: Mon, 26 Feb 2024 08:21:00 +0100 Message-ID: Subject: Fwd: [Ms-nfs41-client-devel] ANN: NFSv4.1 filesystem client Windows driver binaries for Windows 10/11 for testing, 2024-02-24 ... To: Linux NFS Mailing List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hello, Please test the binaries. The client is for Windows 10/11, but compatibility feedback for Linux 6.6 stable and 6.8 branches would be great. Thanks, Martin ---------- Forwarded message --------- From: Roland Mainz Date: Sat, Feb 24, 2024 at 3:19=E2=80=AFPM Subject: [Ms-nfs41-client-devel] ANN: NFSv4.1 filesystem client Windows driver binaries for Windows 10/11 for testing, 2024-02-24 ... To: Hi! ---- I've created a set of test binaries for the NFSv4.1 filesystem client driver for Windows 10/11, based on https://github.com/kofemann/ms-nfs41-client (commit id #5e7d973b97c4ec831b22e468e66289f555318d45, git bundle in tarball), for testing and feedback (download URL in "Download" section below). Please send comments, bugs, test reports, complaints etc. to the MailMan mailing list at https://sourceforge.net/projects/ms-nfs41-client/lists/ms-nfs41-client-deve= l # 1. What is this ? NFSv4.1 client and filesystem driver for Windows 10/11 # 2. Features: - Full NFSv4.1 protocol support - idmapper (mapping usernames and uid/gid values between server and client) - Support for custom ports (NFSv4 defaults to TCP port 2049, this client can use different ports per mount) - Support for nfs://-URL * Why ? nfs://-URLs are cross platform, portable and Character-Encoding independent descriptions of NFSv4 server resources (exports). - including custom ports and raw IPv6 addresses - nfs://-URL conversion utility (/usr/bin/nfsurlconv) to convert URLs, including non-ASCII/Unicode characters in mount path - Support ssh forwarding, e.g. mounting NFSv4 filesystems via ssh tunnel - Support for long paths (up to 4096 bytes), no Windows MAXPATH limit - Unicode support - UNC paths - IPv6 support in UNC paths - IPv6 support - IPv6 address within '[', ']' (will be converted to *.ipv6-literal.net) - Windows ACLs - SFU/Cygwin support, including: - uid/gid - Cygwin symlinks - Software compatibility: - Any NFSv4.1 server (Linux, Solaris, Illumos, FreeBSD, nfs4j, ...) - All tools from Cygwin/MinGW - Visual Studio - VMware Workstation (can use VMs hosted on NFSv4.1 filesystem) # 3. Requirements: - Windows 10 or Windows 11 - Cygwin 3.5.0 - Packages: cygwin cygwin-devel cygrunsrv cygutils cygutils-extra bash bzip2 coreutils getent gdb grep hostname less libiconv libiconv2 pax pbzip2 procps-ng sed tar time util-linux wget # 4. Download: $ mkdir -p ~/download $ cd ~/download $ wget 'http://www.nrubsig.org/people/gisburn/work/msnfs41client/releases/t= esting/msnfs41client_cygwin_binaries_20240224_11h39m_git5e7d973.tar.bz2' $ openssl sha256 msnfs41client_cygwin_binaries_20240224_11h39m_git5e7d973.tar.bz2 SHA2-256(msnfs41client_cygwin_binaries_20240224_11h39m_git5e7d973.tar.bz2)= =3D b854115d86f2aad0c305c9690d9361d3c160edb05304def510363a6be85fbeca # 5. Installation (as "Administrator"): $ (cd / && tar -xf ~/download/msnfs41client_cygwin_binaries_20240224_11h39m_git5e7d973.tar.bz2 ) $ /sbin/msnfs41client install # 6. Deinstallation: $ (set -x ; cd / && tar -tf ~/download/msnfs41client_cygwin_binaries_20240224_11h39m_git5e7d973.tar.bz2 | while read i ; do [[ -f "$i" ]] && rm "$i" ; done) # 7. Usage: # Run the NFSv4 client daemon: # - run this preferably as "Administrator", but this is not a requirement # - requires separate terminal $ /sbin/msnfs41client run_daemon # Mount a filesystem and use it # - requires that NFSv4 server accepts connections from a TCP port # number > 1024, which can be archived on Linux with the "insecure" # export option in /etc/exports, or "resvport" on Solaris/Illumos # (see nfs(5)) $ /sbin/nfs_mount -o rw N 10.49.20.110:/net_tmpfs2 Successfully mounted '10.49.20.110@2049' to drive 'N:' $ cd /cygdrive/n/ $ ls -la total 4 drwxrwxrwt 5 Unix_User+0 Unix_Group+0 100 Dec 7 14:17 . dr-xr-xr-x 1 roland_mainz Kein 0 Dec 14 13:48 .. drwxr-xr-x 3 Unix_User+197608 Unix_Group+197121 80 Dec 12 16:24 10492030 drwxr-xr-x 3 Unix_User+197608 Unix_Group+197121 60 Dec 13 17:58 directory_= t drwxr-xr-x 3 Unix_User+197608 Unix_Group+197121 60 Dec 7 11:01 test2 # Unmount filesystem: $ cd ~ && /sbin/nfs_mount -d N: # OR $ cd ~ $ net use N: /delete # List mounted NFSv4.1 filesystems: $ /sbin/nfs_mount # 8. Notes: - Idmapping (including uid/gid mapping) between NFSv4 client and NFSv4 server works via /lib/msnfs41client/cygwin_idmapper.ksh, which either uses builtin static data, or /usr/bin/getent passwd and /usr/bin/getent group. As getent uses the configured name services it should work with LDAP too. This is still work-in-progress, with the goal that both NFSv4 client and server can use different uid/gid numeric values for client and server side. - UNC paths are supported, after successful mounting /sbin/nfs_mount will list the paths in Cygwin UNC format. - SIDs work, users with valid Windows accounts (see Cygwin idmapping above get their SIDs, unknown users with valid uid/gid values get Unix_User+id/Unix_Group+id SIDs, and all others are mapped to nobody/nogroup SIDs. - Workflow for nfs://-URLs: - Create nfs://-URLs with nfsurlconv, read $ nfsurlconv --man # for usage - pass URL to nfs_mount.exe like this: $ nfs_mount -o sec=3Dsys,rw 'L' nfs://derfwnb4966_ipv4//bigdisk # - Cygwin symlinks are supported, but might require $ fsutil behavior set SymlinkEvaluation L2L:1 R2R:1 L2R:1 R2L:1 #. This includes symlinks to UNC paths, e.g. as Admin $ cmd /c 'mklink /d c:\home\rmainz \\derfwpc5131_ipv6@2049\nfs4\export\home2\rmainz' # and then $ cd /cygdrive/c/home/rmainz/ # should work - performance: All binaries are build without any optimisation, so the filesystem is much slower than it could be. - bad performance due to Windows Defender AntiVirus: Option 1: # disable Windows defender realtime monitoring # (requires Admin shell) powershell -Command 'Set-MpPreference -DisableRealtimeMonitoring 1' Option 2: Add "nfsd.exe", "nfsd_debug.exe", "ksh93.exe", "bash.exe", "git.exe" and other offending commands to the process name whitelist. - performance: Use vmxnet3 in VMware to improve performance - ACLs are supported via the normal Windows ACL tools, but on Linux require the nfs4_getfacl/nfs4_setfacl utilities to see the data. Example (assuming that Windows, Linux NFSv4 client and NFSv4 server have a user "siegfried_wulsch"): - On Windows on a NFSv4 filesystem, : $ icacls myhorribledata.txt /grant "siegfried_wulsch:WD" # - On Linux NFSv4 clients you will then see this: ---- snip ---- $ nfs4_getfacl myhorribledata.txt A::OWNER@:rwatTcCy A::siegfried_wulsch@global.loc:rwatcy A::GROUP@:rtcy A::EVERYONE@:rtcy ---- snip ---- - nfs_mount only works when the NFSv4 server allows connections from ports >=3D 1024, as Windows does not allow the Windows NFSv4 client to use a "privileged port" (i.e. TCP port number < 1024)). By default the NFSv4 server on Solaris, Illumos, Linux etc. only accepts connections if the NFSv4 client uses a "privileged (TCP) port", i.e. a port number < 1024. This can be worked around by using the "insecure" export option in Linux /etc/exports, which allows connections from ports >=3D 1024, and for Solaris/Illumos see nfs(5), option "resvport". # 9. Known issues: - The kernel driver ("nfs41_driver.sys") does not yet have a cryptographic signature for SecureBoot - which means it will only work if SecureBoot is turned off (otherwise $ /sbin/msnfs41client install # will FAIL!) - If nfsd_debug.exe crashes or gets killed, the only safe way to run it again requires a reboot - LDAP support does not work yet - Attribute caching is too aggressive - Caching in the kernel does not always work. For example $ tail -f ... # does not not see new data. Workaround: Use GNU tail'S $ tail --follow=3Dname ... # Working theory is that this is related to FCB caching, see |FCB_STATE_FILESIZECACHEING_ENABLED|, as the nfs41_driver.sys kernel module does not see the |stat()| syscalls. But $ tail -f ... # always works for a momemnt if something else opens the same file. - Unmounting and then mounting the same filesystem causes issues as the name cache in nfsd*.exe is not flushed on umount, including leftover delegations. - krb5p security with AES keys do not work against the linux server, as it does not support gss krb5 v2 tokens with rotated data. - When recovering opens and locks outside of the server's grace period, client does not check whether the file has been modified by another client. - If nfsd.exe is restarted while a drive is mapped, that drive needs to be remounted before further use. - Does not allow renaming a file on top of an existing open file. Connectathon's special test op_ren has been commented out. - Extended attributes are supported with some limitations: a) the server must support NFS Named Attributes, b) the order of listings cannot be guaranteed by NFS, and c) the EaSize field cannot be reported for directory queries of FileBothDirInformation, FileFullDirInfo, or FileIdFullDirInfo. # 10. Notes for troubleshooting && finding bugs/debugging: - nfsd_debug.exe has the -d option to set a level for debug output. Edit /sbin/msnfs41client to set the "-d" option. - The "msnfs41client" script has the option "watch_kernel_debuglog" to get the debug output of the kernel module. Run as Admin: $ /sbin/msnfs41client watch_kernel_debuglog # Currently requires DebugView (https://learn.microsoft.com/en-gb/sysinternals/downloads/debugview) to be installed. - Watching network traffic: WireShark has a command line tool called "tshark", which can be used to see NFSv4 traffic. As NFSv4 uses RPC you have to filter for RPC, and the RPC filter automatically identifies NFSv4 traffic on it's RPC id. Example for Windows: (for NFSv4 default TCP port "2049", replace "2049" with the desired port if you use a custom port ; use "ipconfig" to find the correct interface name, in this case "Ethernet0"): ---- snip ---- $ nfsv4port=3D2049 ; /cygdrive/c/Program\ Files/Wireshark/tshark \ -f "port $nfsv4port" -d "tcp.port=3D=3D${nfsv4port},rpc" -i Ethernet0 ---- snip ---- If you are running inside a VMware VM on a Linux host it might require $ chmod a+rw /dev/vmnet0 # on VMware host, so that the VM can use "Promiscuous Mode". ---- Bye, Roland -- __ . . __ (o.\ \/ /.o) roland.mainz@nrubsig.org \__\/\/__/ MPEG specialist, C&&JAVA&&Sun&&Unix programmer /O /=3D=3D\ O\ TEL +49 641 3992797 (;O/ \/ \O;) _______________________________________________ Ms-nfs41-client-devel mailing list Ms-nfs41-client-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ms-nfs41-client-devel