From: "Chuck Lever" <cel@kernel.org>
To: "Scott Mayhew" <smayhew@redhat.com>
Cc: "Sagi Grimberg" <sagi@grimberg.me>,
"Chuck Lever" <chuck.lever@oracle.com>,
"Linux NFS Mailing List" <linux-nfs@vger.kernel.org>,
kernel-tls-handshake@lists.linux.dev
Subject: Re: Breakage in ktls-utils with nfs keyring?
Date: Fri, 01 May 2026 23:08:15 -0400 [thread overview]
Message-ID: <7c6516be-adb9-4d0d-ba7c-fa107fd4a865@app.fastmail.com> (raw)
In-Reply-To: <afUKzeUYPhb97DX4@aion>
On Fri, May 1, 2026, at 4:19 PM, Scott Mayhew wrote:
> On Thu, 30 Apr 2026, Chuck Lever wrote:
>
>> Cc'ing the ktls-utils development list.
>>
>> On Thu, Apr 30, 2026, at 9:32 AM, Sagi Grimberg wrote:
>> > Hey Chuck,
>> >
>> > Upstream ktls-utils fails passing client certificate and private key
>> > using the .nfs keyring.
>> > Bisecting leads commit facd084e43fc ("tlshd: Client-side dual
>> > certificate support").
>> >
>> > I manually apply this (probably wrong) change and keyring works:
>> > --
>> > diff --git a/src/tlshd/client.c b/src/tlshd/client.c
>> > index 2664ffb..a946797 100644
>> > --- a/src/tlshd/client.c
>> > +++ b/src/tlshd/client.c
>> > @@ -327,7 +327,7 @@ tlshd_x509_retrieve_key_cb(gnutls_session_t session,
>> > } else {
>> > tlshd_log_debug("%s: Selecting x509.certificate from
>> > conf file", __func__);
>> > *pcert_length = tlshd_certs_len;
>> > - *pcert = tlshd_certs + tlshd_pq_certs_len;
>> > + *pcert = tlshd_certs;
>> > *privkey = tlshd_privkey;
>> > }
>> > return 0;
>> > --
>> >
>> > But, I have a feeling its not the correct change...
>>
>>
>> Scott, can you triage this?
>
> So when I added the dual certificate support, I didn't touch any of the
> keyring code. Frankly, I'm not entirely sure what is the right way to
> set it up and the docs are pretty much nonexistent. As far as I can
> tell:
>
> - you need to load nfs.ko first so that the .nfs keyring gets created
> via nfs_init_keyring()
> - you need to restart tlshd so that it links the .nfs keyring into its
> session keyring (I tried loading nfs.ko at boot via modules-load.d,
> but tlshd still reported an error saying it couldn't find the .nfs
> keyring)
> - you need to convert the cert and key to DER format
> - you need to add the cert and key to the .nfs keyring, e.g.
>
> keyctl padd user "nfs_cert" %:.nfs < smayhew-rawhide.crt.der
> keyctl padd user "nfs_key" %:.nfs < smayhew-rawhide.key.der
>
> - then you mount w/ '-o xprtsec=mtls,cert_serial=...,privkey_serial=...'
>
> Is that somewhat accurate? Is there a better way to do it? It seems
> like a lot more work than just using the config file.
It is more work because keyring support for the NFS consumers is still
aspirational/experimental.
I've pushed your patch to a "fixes" branch for folks to try out. I'm not
sure yet whether we want a 1.4.1 release with this fix, since keyring
support for NFS is "not finished".
> At any rate, I was able to reproduce the reported bug and the patch I
> just sent fixes it, but I think we probably want to make dual
> certificate support work with keyrings too.
Yes, and clearly there are some questions to be answered.
--
Chuck Lever
next prev parent reply other threads:[~2026-05-02 3:08 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-30 13:32 Breakage in ktls-utils with nfs keyring? Sagi Grimberg
2026-04-30 13:38 ` Chuck Lever
2026-05-01 19:58 ` [PATCH] tlshd: fix keyring cert retrieval Scott Mayhew
2026-05-03 7:30 ` Sagi Grimberg
2026-05-01 20:19 ` Breakage in ktls-utils with nfs keyring? Scott Mayhew
2026-05-02 3:08 ` Chuck Lever [this message]
2026-05-03 7:48 ` Sagi Grimberg
2026-05-03 19:11 ` Chuck Lever
2026-05-03 20:37 ` Sagi Grimberg
2026-05-04 6:44 ` Chuck Lever
2026-05-04 8:02 ` Sagi Grimberg
2026-05-04 8:21 ` Hannes Reinecke
2026-05-05 8:15 ` Chuck Lever
2026-05-05 8:32 ` Sagi Grimberg
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7c6516be-adb9-4d0d-ba7c-fa107fd4a865@app.fastmail.com \
--to=cel@kernel.org \
--cc=chuck.lever@oracle.com \
--cc=kernel-tls-handshake@lists.linux.dev \
--cc=linux-nfs@vger.kernel.org \
--cc=sagi@grimberg.me \
--cc=smayhew@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox