linux-nfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "J. Bruce Fields" <bfields@fieldses.org>
To: "Myklebust, Trond" <Trond.Myklebust@netapp.com>
Cc: Neil Brown <neilb@suse.de>,
	Charles Edward Lever <chuck.lever@oracle.com>,
	Steve Dickson <SteveD@redhat.com>,
	Linux NFS Mailing List <linux-nfs@vger.kernel.org>
Subject: Re: [PATCH] Adding the nfs4_secure_mounts bool
Date: Tue, 12 Nov 2013 11:16:34 -0500	[thread overview]
Message-ID: <20131112161634.GC15060@fieldses.org> (raw)
In-Reply-To: <F58540AB-00BE-4AC5-B823-7260F30F8D58@netapp.com>

On Tue, Nov 12, 2013 at 05:29:46AM +0000, Myklebust, Trond wrote:
> 
> On Nov 12, 2013, at 0:11, NeilBrown <neilb@suse.de> wrote:
> 
> > On Mon, 11 Nov 2013 15:33:14 -0500 Chuck Lever <chuck.lever@oracle.com> wrote:
> > 
> >> 
> >> On Nov 11, 2013, at 1:59 PM, Steve Dickson <SteveD@redhat.com> wrote:
> >> 
> >>> On 11/11/13 13:30, Chuck Lever wrote:
> >>>> 
> >>>> On Nov 11, 2013, at 1:06 PM, Steve Dickson <SteveD@redhat.com> wrote:
> >>>> 
> >>>>> 
> >>>>> 
> >>>>> On 09/11/13 18:12, Myklebust, Trond wrote:
> >>>>>> One alternative to the above scheme, which I believe that I’ve 
> >>>>>> suggested before, is to have a permanent entry in rpc_pipefs 
> >>>>>> that rpc.gssd can open and that the kernel can use to detect 
> >>>>>> that it is running. If we make it /var/lib/nfs/rpc_pipefs/gssd/clnt00/gssd, 
> >>>>>> then AFAICS we don’t need to change nfs-utils at all, since all newer 
> >>>>>> versions of rpc.gssd will try to open for read anything of the form 
> >>>>>> /var/lib/nfs/rpc_pipefs/*/clntXX/gssd...
> >>>>> 
> >>>>> After further review I am going going have to disagree with you on this.
> >>>>> Since all the context is cached on the initial mount the kernel
> >>>>> should be using the call_usermodehelper() to call up to rpc.gssd 
> >>>>> to get the context, which means we could put this upcall noise 
> >>>>> to bed... forever! :-)
> >>>> 
> >>>> Ask Al Viro for his comments on whether the kernel should start 
> >>>> gssd (either a daemon or a script).  Hint: wear your kevlar underpants.
> >>> I was thinking gssd would become a the gssd-cmd command... Al does not
> >>> like the call_usermodehelper() interface?
> >> 
> >> He doesn't have a problem with call_usermodehelper() in general.  However, the kernel cannot guarantee security if it has to run a fixed command line.  Go ask him to explain.
> >> 
> >> 
> >>> 
> >>>> 
> >>>> Have you tried Trond's approach yet?
> >>> Looking into it... But nothing is trivial in that code... 
> >>> 
> >>>> 
> >>>>> I realize this is not going happen overnight, so I would still
> >>>>> like to propose my  nfs4_secure_mounts bool patch as bridge
> >>>>> to the new call_usermodehelper()  since its the cleanest 
> >>>>> solution so far... 
> >>>>> 
> >>>>> Thoughts?
> >>>> 
> >>>> We have workarounds already that work on every kernel since 3.8.
> >>>> 
> >>> The one that logs 5 to 20 lines (depending on thins are setup or not)
> >>> per mount? That does work in some environments but no all. ;-)
> >> 
> >> When does running rpc.gssd not work?
> > 
> > Oohh ooh.. Pick me.  Pick me!! I can answer that one.
> > 
> > Running rpc.gssd does not work if you are mounting a filesystem using the IP
> > address of the server and that IP address doesn't have a matching hostname
> > anywhere that can be found:
> > 
> > In a newly creating minimal kvm install without rpc.gssd running,
> >   mount 10.0.2.2:/home /mnt
> > 
> > sleeps for 15 seconds then succeeds.
> > If I start rpc.gssd, then the same command takes forever.
> > 
> > strace of rpc.gssd shows that it complains about not being able to resolve
> > the host name and "ERROR: failed to read service info".  Then it keeps the
> > pipes open but never sends any message on them, so the kernel just keeps on
> > waiting.
> > 
> > If I change "fail_keep_client" to "fail_destroy_client", then it closes the
> > pipe and we get the 15 second timeout back.
> > If I change  NI_NAMEREQD to 0, then the mount completes instantly.  (of course
> > that make serious compromise security so it was just for testing).
> > (Adding an entry to /etc/hosts also gives instant success).
> > 
> > I'm hoping that someone who understands this code will suggest something
> > clever so I don't have to dig through all of it ;-)
> 
> rpc.gssd is supposed to do a downcall with a zero-length window and an error message in any situation where it cannot establish a GSS context. Normally, I’d expect an EACCES for the above scenario.
> 
> IOW: that’s a blatant rpc.gssd bug. One that will also affect you when you're doing NFSv3 and add ‘sec=krb5’ to the mount options.

Also why is gssd trying to do a DNS lookup in this case?  This sounds
similar to what f9f5450f8f94 "Avoid DNS reverse resolution for server
names (take 3)" was trying to fix?

--b.

  reply	other threads:[~2013-11-12 16:16 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-11-09 22:47 [PATCH] Adding the nfs4_secure_mounts bool Steve Dickson
2013-11-09 23:12 ` Myklebust, Trond
2013-11-10 22:31   ` Steve Dickson
2013-11-10 22:45     ` Myklebust, Trond
2013-11-11 13:00       ` Steve Dickson
2013-11-11 18:06   ` Steve Dickson
2013-11-11 18:25     ` Myklebust, Trond
2013-11-11 18:43       ` Steve Dickson
2013-11-11 18:53         ` Myklebust, Trond
2013-11-11 19:05           ` Steve Dickson
2013-11-11 19:21             ` Myklebust, Trond
2013-11-11 18:30     ` Chuck Lever
2013-11-11 18:59       ` Steve Dickson
2013-11-11 20:33         ` Chuck Lever
2013-11-11 21:13           ` Steve Dickson
2013-11-11 21:47             ` Chuck Lever
2013-11-11 23:00               ` Steve Dickson
2013-11-12 16:09                 ` Chuck Lever
2013-11-12 16:24                   ` Steve Dickson
2013-11-12 16:46                     ` Chuck Lever
2013-11-12 16:52                       ` Steve Dickson
2013-11-12 16:10                 ` J. Bruce Fields
2013-11-12  5:11           ` NeilBrown
2013-11-12  5:29             ` Myklebust, Trond
2013-11-12 16:16               ` J. Bruce Fields [this message]
2013-11-13  0:23                 ` NeilBrown
2013-11-13  0:30                   ` Myklebust, Trond
2013-11-13  1:13                     ` NeilBrown
2013-11-13  1:26                       ` Myklebust, Trond
2013-11-14  1:05                         ` NeilBrown
2013-11-14  1:07                         ` [PATCH - nfs-utils] gssd: always reply to rpc-pipe requests from kernel NeilBrown
2013-11-14 13:34                           ` Jeff Layton
2013-11-20 21:21                           ` Steve Dickson
2013-11-13  3:46                   ` [PATCH] Adding the nfs4_secure_mounts bool J. Bruce Fields
2013-11-13  4:15                     ` Myklebust, Trond
2013-11-14  1:10                       ` NeilBrown

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20131112161634.GC15060@fieldses.org \
    --to=bfields@fieldses.org \
    --cc=SteveD@redhat.com \
    --cc=Trond.Myklebust@netapp.com \
    --cc=chuck.lever@oracle.com \
    --cc=linux-nfs@vger.kernel.org \
    --cc=neilb@suse.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).