public inbox for linux-nfs@vger.kernel.org
 help / color / mirror / Atom feed
From: Thomas Wunder <thomas.wunder@swt-bamberg.de>
To: Kevin Coffman <kwc@citi.umich.edu>, linux-nfs@vger.kernel.org
Subject: Re: NFS-Mount with MIT-Kerberos5 doesn't use user tickets...
Date: Fri, 9 Apr 2010 11:15:27 +0200	[thread overview]
Message-ID: <201004091115.27725.thomas.wunder@swt-bamberg.de> (raw)
In-Reply-To: <q2z4d569c331004081158v447450e7sc962c1e3e84de0d@mail.gmail.com>

On Thursday 08 April 2010 20:58:49 you wrote:
> Sorry, I missed that, or forgot.  And you still get "mount : only root
> can mount ..." if you do "mount /mnt/net" as tomkrb ??  If so, that
> seems like a bug.

No, with that entry each user is able to invoke mount. The problem is that 
mount is carried out with uid=0 then.

> Yes, because under sudo, you are running as root.
obviously...

I'm wondering if there's a chance to run mount with a non-root uid at all. On 
the other hand is that really needed? I mean I just want it to pass the 
calling user's uid to the rpc.gssd...

By the way the rpcsec_gss_krb5 is loaded.

>  You said you had this working for the case where root did the mount
> using a keytab though, correct?  It can also be caused by a mismatch
> of sec flavors.  (i.e., is the server exporting with krb5p?)
Yes, it worked fine when i used a keytab-file with the key for the client-
machine-principal in it. When i issued mount everything worked fine. The 
problem with this kind of setup is just that this would simply be some kind of 
host-based authentication and I can't trust the people which will use the 
clients as much to use a keytab file. They could simply boot from a LiveCD, 
memstick etc. and steal that keytab file...
I've double checked that krb5p is specified in the server's /etc/exports as 
well as in the client's /etc/fstab (i've also tried it with "krb5" on both 
sides but that didn't make any difference) .

Does it matter whether those two flags match before the security context is 
completely established at all?


  reply	other threads:[~2010-04-09  9:15 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-04-07 14:37 NFS-Mount with MIT-Kerberos5 doesn't use user tickets Tom
2010-04-07 15:29 ` Kevin Coffman
2010-04-07 23:11   ` thomas.wunder
2010-04-08 14:18     ` Kevin Coffman
2010-04-08 15:39       ` Thomas Wunder
2010-04-08 18:58         ` Kevin Coffman
2010-04-09  9:15           ` Thomas Wunder [this message]
2010-04-09 14:50             ` Kevin Coffman
     [not found]               ` <y2o4d569c331004090750zeb56bf58udb7bbfb3277832c-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2010-04-09 15:00                 ` William A. (Andy) Adamson
2010-04-09 16:37                 ` Chuck Lever
2010-04-10 16:13                   ` Thomas Wunder
2010-04-07 15:32 ` Andy Adamson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=201004091115.27725.thomas.wunder@swt-bamberg.de \
    --to=thomas.wunder@swt-bamberg.de \
    --cc=kwc@citi.umich.edu \
    --cc=linux-nfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox