From: Steve Dickson <SteveD@redhat.com>
To: Scott Mayhew <smayhew@redhat.com>
Cc: linux-nfs@vger.kernel.org
Subject: Re: [nfs-utils PATCH] mountd: Enable all auth flavors on pseudofs exports
Date: Thu, 02 Apr 2015 13:21:40 -0400 [thread overview]
Message-ID: <551D7AA4.6090301@RedHat.com> (raw)
In-Reply-To: <1427834919-46591-1-git-send-email-smayhew@redhat.com>
Hello
There is a typo below...
On 03/31/2015 04:48 PM, Scott Mayhew wrote:
> With the current mountd code it's possible to craft exports in such a
> manner that clients will be unable to mount exports that they *should*
> be able to mount.
>
> Consider the following example:
>
> /foo *(rw,insecure,no_root_squash,sec=krb5p)
> /bar client.example.com(rw,insecure,no_root_squash)
>
> Initially, client.example.com will be able to mount the /foo export
> using sec=krb5p, but attempts to mount /bar using sec=sys will return
> EPERM. Once the nfsd.export cache entry expires, client.example.com
> will then be able to mount /bar using sec=sys but attempts to mount /foo
> using sec=krb5p will return EPERM.
>
> The reason this happens is because the initial nfsd.export cache entry
> is actually pre-populated by nfsd_fh(), which is the handler for the
> nfsd.fh cache, while later cache requests (once the initial entry
> expires) are handled by nfsd_export(). These functions have slightly
> different logic in how they select a v4root export from the cache --
> nfsd_fh() takes last matching v4root export it finds, while
> nfsd_export() (actually lookup_export()) takes the first. Either way
> it's wrong because the client should be able to mount both exports.
>
> Both rfc3503bis and rfc5661 say:
>
> A common and convenient practice, unless strong security requirements
> dictate otherwise, is to make the entire pseudo file system
> accessible by all of the valid security mechanisms.
>
> ...so lets do that.
>
> Signed-off-by: Scott Mayhew <smayhew@redhat.com>
> ---
> utils/mountd/v4root.c | 19 ++++++++++---------
> 1 file changed, 10 insertions(+), 9 deletions(-)
>
> diff --git a/utils/mountd/v4root.c b/utils/mountd/v4root.c
> index 34d098a..0f60efc 100644
> --- a/utils/mountd/v4root.c
> +++ b/utils/mountd/v4root.c
> @@ -26,6 +26,7 @@
> #include "nfslib.h"
> #include "misc.h"
> #include "v4root.h"
> +#include "pseudoflavors.h"
>
> int v4root_needed;
>
> @@ -56,22 +57,22 @@ static nfs_export pseudo_root = {
> };
>
> static void
> -set_pseudofs_security(struct exportent *pseudo, struct exportent *source)
> +set_pseudofs_security(struct exportent *pseudo, int flags)
> {
> - struct sec_entry *se;
> + struct flav_info *flav;
> int i;
>
> - if (source->e_flags & NFSEXP_INSECURE_PORT)
> + if (flags & NFSEXP_INSECURE_PORT)
> pseudo->e_flags |= NFSEXP_INSECURE_PORT;
> - if ((source->e_flags & NFSEXP_ROOTSQUASH) == 0)
> + if ((flags & NFSEXP_ROOTSQUASH) == 0)
> pseudo->e_flags &= ~NFSEXP_ROOTSQUASH;
> - for (se = source->e_secinfo; se->flav; se++) {
> + for (flav = flav_map; flav < flav_map + flav_map_size; flav++) {
> struct sec_entry *new;
>
> - i = secinfo_addflavor(se->flav, pseudo);
> + i = secinfo_addflavor(flav, pseudo);
> new = &pseudo->e_secinfo[i];
>
> - if (se->flags & NFSEXP_INSECURE_PORT)
> + if (flags & NFSEXP_INSECURE_PORT)
> new->flags |= NFSEXP_INSECURE_PORT;
> }
> }
> @@ -91,7 +92,7 @@ v4root_create(char *path, nfs_export *export)
> strncpy(eep.e_path, path, sizeof(eep.e_path));
> if (strcmp(path, "/") != 0)
> eep.e_flags &= ~NFSEXP_FSID;
> - set_pseudofs_security(&eep, curexp);
> + set_pseudofs_security(&eep, curexp->e_flags);
> exp = export_create(&eep, 0);
> if (exp == NULL)
> return NULL;
> @@ -139,7 +140,7 @@ pseudofs_update(char *hostname, char *path, nfs_export *source)
> return 0;
> }
> /* Update an existing V4ROOT export: */
> - set_pseudofs_security(&exp->m_export, &source->m_export);
> + set_pseudofs_security(&exp->m_export, &source->m_export.e_flags);
should be source->m_export.e_flags not &source->m_export.e_flags
I fixed then committed the patch...
steved.
> return 0;
> }
>
>
prev parent reply other threads:[~2015-04-02 17:21 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-03-31 20:48 [nfs-utils PATCH] mountd: Enable all auth flavors on pseudofs exports Scott Mayhew
2015-04-01 17:46 ` J. Bruce Fields
2015-04-02 17:21 ` Steve Dickson [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=551D7AA4.6090301@RedHat.com \
--to=steved@redhat.com \
--cc=linux-nfs@vger.kernel.org \
--cc=smayhew@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).