From: Trond Myklebust <Trond.Myklebust@netapp.com>
To: Kevin Coffman <kwc@citi.umich.edu>
Cc: Steve Dickson <SteveD@redhat.com>, linux-nfs@vger.kernel.org
Subject: Re: [PATCH 10/22] gss_krb5: Add upcall info indicating supported kerberos enctypes
Date: Thu, 15 Apr 2010 09:31:11 -0400 [thread overview]
Message-ID: <1271338271.5792.10.camel@localhost.localdomain> (raw)
In-Reply-To: <1271337734.5792.9.camel@localhost.localdomain>
On Thu, 2010-04-15 at 09:22 -0400, Trond Myklebust wrote:
> On Thu, 2010-04-15 at 09:17 -0400, Kevin Coffman wrote:
> > On Thu, Apr 15, 2010 at 7:34 AM, Steve Dickson <SteveD@redhat.com> wrote:
> > > On 04/14/2010 02:30 PM, Kevin Coffman wrote:
> > >>> diff --git a/net/sunrpc/auth_gss/gss_krb5_mech.c b/net/sunrpc/auth_gss/gss_krb5_mech.c
> > >>> index 8b612e7..d96d824 100644
> > >>> --- a/net/sunrpc/auth_gss/gss_krb5_mech.c
> > >>> +++ b/net/sunrpc/auth_gss/gss_krb5_mech.c
> > >>> @@ -552,6 +552,7 @@ static struct gss_api_mech gss_kerberos_mech = {
> > >>> .gm_ops = &gss_kerberos_ops,
> > >>> .gm_pf_num = ARRAY_SIZE(gss_kerberos_pfs),
> > >>> .gm_pfs = gss_kerberos_pfs,
> > >>> + .gm_upcall_enctypes = "enctypes=1,2,3 ",
> > >>> };
> > >>
> > >> Hi Trond,
> > >> This list should be in preference order. It doesn't matter much with
> > >> this one, but the preferred order for DES is usually "3,1,2".
> > >>
> > >> When adding 3DES, the list should be "16,3,1,2"
> > >> When adding AES, it should be "18,17,16,3,1,2"
> > >> When adding RC4, it should be "18,17,16,23,3,1,2"
> > > Ok... I went back and took a second look at this... The first
> > > thing I did was put the gm_upcall_enctypes list back in
> > > preference order. I had no idea there was actually a theory
> > > behind the order...
> > >
> > > Side Note: It appears the ordering really does not matter
> > > because the KDC is the one that decides (via the TGS-REP) which
> > > enctype will be used and (I've been told) the KDC will always
> > > pick the highest enctype possible.
> > >
> > > Now the reason root was not getting its context was
> > > basically because of the following error (which I missed)
> > > ERROR: prepare_krb5_rfc_cfx_buffer: not implemented
> > >
> > > Which was introduced by the third nfs-utils patch
> > > (Add support for non-DES encryption types)
> > > I'm currently investigating what that means...
> > >
> > > So, Trond its up to you if you want to put that
> > > list back in preference order, it will not matter
> > > to the user space code...
> > >
> > > steved.
> > >
> > >
> >
> > I still contend that the order we send matters. This is from MIT
> > 1.6.3 KDC code:
> >
> > /*
> > * This function returns the keytype which should be selected for the
> > * session key. It is based on the ordered list which the user
> > * requested, and what the KDC and the application server can support.
> > */
> > krb5_enctype
> > select_session_keytype(krb5_context context, krb5_db_entry *server,
> > int nktypes, krb5_enctype *ktype)
>
> OK. I will revert the ordering changes.
Done and pushed out
next prev parent reply other threads:[~2010-04-15 13:31 UTC|newest]
Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-04-14 17:36 [PATCH 00/22] Add support for more RPCSEC_GSS/krb5 enctypes Trond Myklebust
2010-04-14 17:36 ` [PATCH 01/22] gss_krb5: Introduce encryption type framework Trond Myklebust
2010-04-14 17:36 ` [PATCH 02/22] gss_krb5: Added and improved code comments Trond Myklebust
2010-04-14 17:36 ` [PATCH 03/22] gss_krb5: Don't expect blocksize to always be 8 when calculating padding Trond Myklebust
2010-04-14 17:36 ` [PATCH 04/22] gss_krb5: split up functions in preparation of adding new enctypes Trond Myklebust
2010-04-14 17:36 ` [PATCH 05/22] gss_krb5: prepare for new context format Trond Myklebust
2010-04-14 17:36 ` [PATCH 06/22] gss_krb5: introduce encryption type framework Trond Myklebust
2010-04-14 17:36 ` [PATCH 07/22] gss_krb5: add ability to have a keyed checksum (hmac) Trond Myklebust
2010-04-14 17:36 ` [PATCH 08/22] gss_krb5: import functionality to derive keys into the kernel Trond Myklebust
2010-04-14 17:36 ` [PATCH 09/22] gss_krb5: handle new context format from gssd Trond Myklebust
2010-04-14 17:36 ` [PATCH 10/22] gss_krb5: Add upcall info indicating supported kerberos enctypes Trond Myklebust
2010-04-14 17:36 ` [PATCH 11/22] gss_krb5: add support for triple-des encryption Trond Myklebust
2010-04-14 17:36 ` [PATCH 12/22] gss_krb5: Advertise triple-des enctype support in the rpcsec_gss/krb5 upcall Trond Myklebust
2010-04-14 17:36 ` [PATCH 13/22] xdr: Add an export for the helper function write_bytes_to_xdr_buf() Trond Myklebust
2010-04-14 17:36 ` [PATCH 14/22] gss_krb5: add support for new token formats in rfc4121 Trond Myklebust
2010-04-14 17:36 ` [PATCH 15/22] gss_krb5: add remaining pieces to enable AES encryption support Trond Myklebust
2010-04-14 17:36 ` [PATCH 16/22] gss_krb5: Advertise AES enctype support in the rpcsec_gss/krb5 upcall Trond Myklebust
2010-04-14 17:36 ` [PATCH 17/22] gssd_krb5: arcfour-hmac support Trond Myklebust
2010-04-14 17:36 ` [PATCH 18/22] gss_krb5: Save the raw session key in the context Trond Myklebust
2010-04-14 17:36 ` [PATCH 19/22] gssd_krb5: More arcfour-hmac support Trond Myklebust
2010-04-14 17:36 ` [PATCH 20/22] gss_krb5: Use confounder length in wrap code Trond Myklebust
2010-04-14 17:36 ` [PATCH 21/22] gss_krb5: Add support for rc4-hmac encryption Trond Myklebust
2010-04-14 17:36 ` [PATCH 22/22] gss_krb5: Advertise rc4-hmac enctype support in the rpcsec_gss/krb5 upcall Trond Myklebust
2010-04-14 18:30 ` [PATCH 10/22] gss_krb5: Add upcall info indicating supported kerberos enctypes Kevin Coffman
2010-04-14 18:37 ` Trond Myklebust
2010-04-14 18:51 ` Kevin Coffman
2010-04-14 19:32 ` Steve Dickson
2010-04-14 19:50 ` Kevin Coffman
2010-04-14 19:54 ` Steve Dickson
2010-04-15 11:34 ` Steve Dickson
2010-04-15 13:17 ` Kevin Coffman
2010-04-15 13:22 ` Trond Myklebust
2010-04-15 13:31 ` Trond Myklebust [this message]
2010-04-14 17:47 ` [PATCH 00/22] Add support for more RPCSEC_GSS/krb5 enctypes J. Bruce Fields
2010-04-14 17:54 ` Trond Myklebust
2010-04-14 19:36 ` Steve Dickson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1271338271.5792.10.camel@localhost.localdomain \
--to=trond.myklebust@netapp.com \
--cc=SteveD@redhat.com \
--cc=kwc@citi.umich.edu \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox