| Summary: | Dolphin seems not to respect default ACLs on directories | ||
|---|---|---|---|
| Product: | [Frameworks and Libraries] frameworks-kio | Reporter: | Richard PALO <richard.palo> |
| Component: | general | Assignee: | KIO Bugs <kio-bugs-null> |
| Status: | REPORTED --- | ||
| Severity: | major | CC: | dashonwwIII, jojo, kdelibs-bugs-null, max, witchhunterpro |
| Priority: | NOR | ||
| Version First Reported In: | 6.2.0 | ||
| Target Milestone: | --- | ||
| Platform: | Arch Linux | ||
| OS: | Linux | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
|
Description
Richard PALO
2023-10-02 19:57:05 UTC
ping? Also here in current Plasma 6.x.x This Bug is very critica for us! This bug sabotages in critical way the work in a company, team using NFS Shares, it forces us to give root-passwords or sudo rights to standard users, that the amployees can do their jobs and rises big securtiy holes/risks. Same behaviour as described for me. In Terminal (TTY and Konsole) I can access NFS shares with ACLs as expected, while other KDE apps (i.e. dolphin, digikam) refuse write access. KDE is running on current ARCH (Kernel 6.7.12-x64v2-xanmod1-1, plasma-desktop 6.0.3-1). NFS server is running on FreeBSD. NFS is kerberized in an Samba Active Directory environment with nfsv4_acl (not posix). Write access even missing when both group permissions and acl should allow it. Possibly related: https://bugs.kde.org/show_bug.cgi?id=418716 https://bugs.kde.org/show_bug.cgi?id=267209 [administrator@SERVER ~]$ ls -al /export/Common/SHAREX/ total 2435 drwxrwx---+ 4 administrator SHAREX-GROUP 10 6 Apr. 01:52 . drwxrwxr-x+ 5 administrator domain_users 8 30 Dez. 17:04 .. -rwxrw----+ 1 USERB SHAREX-GROUP 42 21 März 2021 .stignore -rwxrw-r--+ 1 root SHAREX-GROUP 1111 30 Dez. 17:04 .stignore.global -rwxrw-r--+ 1 administrator SHAREX-GROUP 1091 25 Okt. 2021 .stignore.global.orig drwxrwxr-x+ 7 administrator SHAREX-GROUP 7 30 März 17:18 Dokumente drwxrwxr-x+ 14 USERA SHAREX-GROUP 14 6 Apr. 09:23 Fotos [administrator@SERVER ~]$ getfacl /export/Common/SHAREX/ # file: /export/Common/SHAREX/ # owner: administrator # group: SHAREX-GROUP user:USERB:rwxpDdaARWcCos:fd-----:allow user:USERA:rwxpDdaARWcCos:fd-----:allow user:administrator:rwxpDdaARWcCos:fd----I:allow owner@:rwxp--aARWcCos:-------:allow group@:rwxp--a-R-c--s:-------:allow everyone@:------a-R-c--s:-------:allow [USERA@CLIENT ~]$ ls -al /misc/DOMAIN/Common/SHAREX/ insgesamt 2435 drwxrwx---+ 4 administrator SHAREX-GROUP 10 6. Apr 01:52 . drwxrwxr-x+ 5 administrator domain_users 8 30. Dez 17:04 .. drwxrwxr-x+ 7 administrator SHAREX-GROUP 7 30. Mär 17:18 Dokumente drwxrwxr-x+ 14 USERA SHAREX-GROUP 14 6. Apr 09:23 Fotos -rwxrw----+ 1 USERB SHAREX-GROUP 42 21. Mär 2021 .stignore -rwxrw-r--+ 1 root SHAREX-GROUP 1111 30. Dez 17:04 .stignore.global -rwxrw-r--+ 1 administrator SHAREX-GROUP 1091 25. Okt 2021 .stignore.global.orig [USERA@CLIENT ~]$ getfacl /misc/DOMAIN/Common/SHAREX/ getfacl: Entferne führende '/' von absoluten Pfadnamen # file: misc/DOMAIN/Common/SHAREX/ # owner: administrator # group: SHAREX-GROUP user::rwx group::rwx other::--- [USERA@CLIENT ~]$ id USERA uid=10010(USERA) gid=10000(domain_users) Gruppen=10000(domain_users),11001(SHAREX-GROUP),2000001(BUILTIN\users) [USERA@CLIENT ~]$ mount | grep Common SERVER.DOMAIN.TLD:/Common on /misc/DOMAIN/Common type nfs4 (rw,relatime,vers=4.2,rsize=131072,wsize=131072,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=krb5p,clientaddr=X.X.X.X,local_lock=none,addr=X.X.X.X) ping? ping? |