<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Im aware of this, the sudo solution is still ugly, but at least i get a certain amount<div>of control over who is allowed to use mount.cifs and who is not.</div><div><br></div><div>Luckily in my particular case there are only a handful of users involved.</div><div><br></div><div><div><div>Am 27.07.2010 um 15:53 schrieb <a href="mailto:chris@ccburton.com">chris@ccburton.com</a>:</div><br class="Apple-interchange-newline"><blockquote type="cite"><span class="Apple-style-span" style="border-collapse: separate; font-family: Helvetica; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><tt><font size="2">sudo still runs the broken mount.cifs as root which still doesn't</font></tt><span class="Apple-converted-space"> </span><br><tt><font size="2"> check the users rights to a mount point properly or</font></tt><span class="Apple-converted-space"> </span><br><tt><font size="2"> ask for the password before checking or</font></tt><span class="Apple-converted-space"> </span><br><tt><font size="2"> check just before mounting the share as root</font></tt><span class="Apple-converted-space"> </span><br><tt><font size="2">so all the user-accounts in your visudo group who can run mount.cifs</font></tt><span class="Apple-converted-space"> </span><br><tt><font size="2">as root can map their shares over any directory.</font></tt><span class="Apple-converted-space"> </span></span></blockquote></div><br></div></body></html>