linux-nfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Language Lawyer <language.lawyer@gmail.com>
To: Benjamin Coddington <bcodding@redhat.com>
Cc: linux-nfs@vger.kernel.org
Subject: Re: Kernel NFS client and Kerberos delegation
Date: Wed, 10 Oct 2018 13:45:03 +0300	[thread overview]
Message-ID: <55501f63-bc1f-eea7-21cd-a76a0aea2632@gmail.com> (raw)
In-Reply-To: <6671E6BA-6F31-410A-BECC-012DC3E8110E@redhat.com>

On 09/10/18 17:34, Benjamin Coddington wrote:
> On 9 Oct 2018, at 9:44, Language Lawyer wrote: 
>> On 09/10/18 16:11, Benjamin Coddington wrote:
>>> On 8 Oct 2018, at 15:46, Language Lawyer wrote:
>>>
>>>> Hi,
>>>>
>>>> AFAIU kernel NFS client keeps ID -> Name mapping in the "id_resolver"
>>>> keyring.  Do I understand it correctly that with this hard mapping it is
>>>> not possible for a service to access a kerberized NFS storage on behalf of
>>>> some user using user's delegated (for example, with S4U2Self+S4U2Proxy)
>>>> credentials?
>>>
>>> The id_resolver keyring exists to translate kerberos principles to UID and
>>> the reverse, but it doesn't really play in the mechanisms that you're
>>> interested in.
>>>
>>> I assume you want a particular process, like httpd, to have the kernel chose
>>> which kerberos principle and thus which GSS context to use when sending RPC
>>> to the NFS server.
>>>
>>> The NFS client will choose the appropriate GSS context based on the fsuid of
>>> the calling process, and then as long as the gssd daemon can find an
>>> appropriate kerberos cache and establish a context everything will work
>>> fine.  So, as long as your service changes its fsuid (like smbd does),
>>> everything generally works.
>>
>> Yes, currently one has to grant CAP_SETUID capability to a service and
>> setup a way to obtain appropriate ticket, for example, by giving gssproxy
>> permission to impersonate users, instead of just granting a service
>> permission to impersonate users.
>>
>>> If you want a process that doesn't change its fsuid to use a different GSS
>>> context, you have to find a way to communicate which context, or credential
>>> you want the kernel to choose.
>> Are there plans to support this in the kernel NFS client?
> 
> No plans that I know of.  I have been involved in projects doing this in the
> past, but the implementation details were so specific to the use case that
> they didn't make sense to mainline.
> 
> The linux keyrings are very useful here because the userspace process can
> "tack on" extra information to communicate to the kernel which context to
> use, or even provide the context itself

That's why I've mentioned "id_resolver" keyring.
My naïve idea was to provide ID -> Name mapping in the session keyring,
which is replaceable by keyctl_join_session_keyring, to override "id_resolver"
mapping.
Of course, such a naïve implementation would be very unsecure.

      reply	other threads:[~2018-10-10 10:45 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-10-08 19:46 Kernel NFS client and Kerberos delegation Language Lawyer
2018-10-09 13:11 ` Benjamin Coddington
2018-10-09 13:44   ` Language Lawyer
2018-10-09 14:34     ` Benjamin Coddington
2018-10-10 10:45       ` Language Lawyer [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55501f63-bc1f-eea7-21cd-a76a0aea2632@gmail.com \
    --to=language.lawyer@gmail.com \
    --cc=bcodding@redhat.com \
    --cc=linux-nfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).