From: Language Lawyer <language.lawyer@gmail.com>
To: Benjamin Coddington <bcodding@redhat.com>
Cc: linux-nfs@vger.kernel.org
Subject: Re: Kernel NFS client and Kerberos delegation
Date: Tue, 9 Oct 2018 16:44:40 +0300 [thread overview]
Message-ID: <54608c44-a30b-8e16-9a22-e7e1183a0feb@gmail.com> (raw)
In-Reply-To: <A418C8F8-0189-4959-9E29-862095728028@redhat.com>
On 09/10/18 16:11, Benjamin Coddington wrote:
> On 8 Oct 2018, at 15:46, Language Lawyer wrote:
>
>> Hi,
>>
>> AFAIU kernel NFS client keeps ID -> Name mapping in the "id_resolver"
>> keyring. Do I understand it correctly that with this hard mapping it is
>> not possible for a service to access a kerberized NFS storage on behalf of
>> some user using user's delegated (for example, with S4U2Self+S4U2Proxy)
>> credentials?
>
> The id_resolver keyring exists to translate kerberos principles to UID and
> the reverse, but it doesn't really play in the mechanisms that you're
> interested in.
>
> I assume you want a particular process, like httpd, to have the kernel chose
> which kerberos principle and thus which GSS context to use when sending RPC
> to the NFS server.
>
> The NFS client will choose the appropriate GSS context based on the fsuid of
> the calling process, and then as long as the gssd daemon can find an
> appropriate kerberos cache and establish a context everything will work
> fine. So, as long as your service changes its fsuid (like smbd does),
> everything generally works.
Yes, currently one has to grant CAP_SETUID capability to a service and
setup a way to obtain appropriate ticket, for example, by giving gssproxy
permission to impersonate users, instead of just granting a service
permission to impersonate users.
> If you want a process that doesn't change its fsuid to use a different GSS
> context, you have to find a way to communicate which context, or credential
> you want the kernel to choose.
Are there plans to support this in the kernel NFS client?
next prev parent reply other threads:[~2018-10-09 13:44 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-10-08 19:46 Kernel NFS client and Kerberos delegation Language Lawyer
2018-10-09 13:11 ` Benjamin Coddington
2018-10-09 13:44 ` Language Lawyer [this message]
2018-10-09 14:34 ` Benjamin Coddington
2018-10-10 10:45 ` Language Lawyer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=54608c44-a30b-8e16-9a22-e7e1183a0feb@gmail.com \
--to=language.lawyer@gmail.com \
--cc=bcodding@redhat.com \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).