From: Steve Dickson <steved@redhat.com>
To: Olga Kornievskaia <okorniev@redhat.com>
Cc: linux-nfs@vger.kernel.org
Subject: Re: [PATCH 2/2] nfs-utils: gssd: do not use krb5_cc_initialize
Date: Mon, 24 Mar 2025 16:26:53 -0400 [thread overview]
Message-ID: <f1ecba40-049e-47a0-8ebc-4b73bb48e172@redhat.com> (raw)
In-Reply-To: <20250225214607.20449-3-okorniev@redhat.com>
On 2/25/25 4:46 PM, Olga Kornievskaia wrote:
> When gssd refreshes machine credentials, it uses the
> krb5_get_init_creds_keytab() and then to save the received credentials
> in a ticket cache, it proceeds to initialize the credential cache via
> a krb5_cc_initialize() before storing the received credentials into it.
>
> krb5_cc_initialize() is not concurrency safe. two gssd upcalls by
> uid=0, one for krb5i auth flavor and another for krb5p, would enter
> into krb5_cc_initialize() and one of them would fail, leading to
> an upcall failure and NFS operation error.
>
> Instead it was proposed that gssd changes its design to do what
> kinit does and forgo the use of krb5_cc_initialize and instead setup
> the output cache via krb5_get_init_creds_opt_set_out_cache() prior
> to calling krb5_get_init_creds_keytab() which would then store
> credentials automatically.
>
> https://mailman.mit.edu/pipermail/krbdev/2025-February/013708.html
>
> Signed-off-by: Olga Kornievskaia <okorniev@redhat.com>
Committed... (tag: nfs-utils-2-8-3-rc8)
steved.
> ---
> utils/gssd/krb5_util.c | 103 ++++++++++++++++++++---------------------
> 1 file changed, 50 insertions(+), 53 deletions(-)
>
> diff --git a/utils/gssd/krb5_util.c b/utils/gssd/krb5_util.c
> index 201585ed..560e8be1 100644
> --- a/utils/gssd/krb5_util.c
> +++ b/utils/gssd/krb5_util.c
> @@ -168,7 +168,8 @@ static int select_krb5_ccache(const struct dirent *d);
> static int gssd_find_existing_krb5_ccache(uid_t uid, char *dirname,
> const char **cctype, struct dirent **d);
> static int gssd_get_single_krb5_cred(krb5_context context,
> - krb5_keytab kt, struct gssd_k5_kt_princ *ple, int force_renew);
> + krb5_keytab kt, struct gssd_k5_kt_princ *ple, int force_renew,
> + krb5_ccache ccache);
> static int query_krb5_ccache(const char* cred_cache, char **ret_princname,
> char **ret_realm);
>
> @@ -395,16 +396,14 @@ static int
> gssd_get_single_krb5_cred(krb5_context context,
> krb5_keytab kt,
> struct gssd_k5_kt_princ *ple,
> - int force_renew)
> + int force_renew,
> + krb5_ccache ccache)
> {
> krb5_get_init_creds_opt *opts = NULL;
> krb5_creds my_creds;
> - krb5_ccache ccache = NULL;
> char kt_name[BUFSIZ];
> - char cc_name[BUFSIZ];
> int code;
> time_t now = time(0);
> - char *cache_type;
> char *pname = NULL;
> char *k5err = NULL;
> int nocache = 0;
> @@ -457,6 +456,14 @@ gssd_get_single_krb5_cred(krb5_context context,
> krb5_get_init_creds_opt_set_tkt_life(opts, 5*60);
> #endif
>
> + if ((code = krb5_get_init_creds_opt_set_out_ccache(context, opts,
> + ccache))) {
> + k5err = gssd_k5_err_msg(context, code);
> + printerr(1, "WARNING: %s while initializing ccache for "
> + "principal '%s' using keytab '%s'\n", k5err,
> + pname ? pname : "<unparsable>", kt_name);
> + goto out;
> + }
> if ((code = krb5_get_init_creds_keytab(context, &my_creds, ple->princ,
> kt, 0, NULL, opts))) {
> k5err = gssd_k5_err_msg(context, code);
> @@ -466,61 +473,18 @@ gssd_get_single_krb5_cred(krb5_context context,
> goto out;
> }
>
> - /*
> - * Initialize cache file which we're going to be using
> - */
> -
> pthread_mutex_lock(&ple_lock);
> - if (use_memcache)
> - cache_type = "MEMORY";
> - else
> - cache_type = "FILE";
> - snprintf(cc_name, sizeof(cc_name), "%s:%s/%s%s_%s",
> - cache_type,
> - ccachesearch[0], GSSD_DEFAULT_CRED_PREFIX,
> - GSSD_DEFAULT_MACHINE_CRED_SUFFIX, ple->realm);
> ple->endtime = my_creds.times.endtime;
> - if (ple->ccname == NULL || strcmp(ple->ccname, cc_name) != 0) {
> - free(ple->ccname);
> - ple->ccname = strdup(cc_name);
> - if (ple->ccname == NULL) {
> - printerr(0, "ERROR: no storage to duplicate credentials "
> - "cache name '%s'\n", cc_name);
> - code = ENOMEM;
> - pthread_mutex_unlock(&ple_lock);
> - goto out;
> - }
> - }
> pthread_mutex_unlock(&ple_lock);
> - if ((code = krb5_cc_resolve(context, cc_name, &ccache))) {
> - k5err = gssd_k5_err_msg(context, code);
> - printerr(0, "ERROR: %s while opening credential cache '%s'\n",
> - k5err, cc_name);
> - goto out;
> - }
> - if ((code = krb5_cc_initialize(context, ccache, ple->princ))) {
> - k5err = gssd_k5_err_msg(context, code);
> - printerr(0, "ERROR: %s while initializing credential "
> - "cache '%s'\n", k5err, cc_name);
> - goto out;
> - }
> - if ((code = krb5_cc_store_cred(context, ccache, &my_creds))) {
> - k5err = gssd_k5_err_msg(context, code);
> - printerr(0, "ERROR: %s while storing credentials in '%s'\n",
> - k5err, cc_name);
> - goto out;
> - }
>
> code = 0;
> - printerr(2, "%s(0x%lx): principal '%s' ccache:'%s'\n",
> - __func__, tid, pname, cc_name);
> + printerr(2, "%s(0x%lx): principal '%s' ccache:'%s'\n",
> + __func__, tid, pname, ple->ccname);
> out:
> if (opts)
> krb5_get_init_creds_opt_free(context, opts);
> if (pname)
> k5_free_unparsed_name(context, pname);
> - if (ccache)
> - krb5_cc_close(context, ccache);
> krb5_free_cred_contents(context, &my_creds);
> free(k5err);
> return (code);
> @@ -1147,10 +1111,12 @@ gssd_refresh_krb5_machine_credential_internal(char *hostname,
> {
> krb5_error_code code = 0;
> krb5_context context;
> - krb5_keytab kt = NULL;;
> + krb5_keytab kt = NULL;
> + krb5_ccache ccache = NULL;
> int retval = 0;
> - char *k5err = NULL;
> + char *k5err = NULL, *cache_type;
> const char *svcnames[] = { "$", "root", "nfs", "host", NULL };
> + char cc_name[BUFSIZ];
>
> /*
> * If a specific service name was specified, use it.
> @@ -1209,7 +1175,38 @@ gssd_refresh_krb5_machine_credential_internal(char *hostname,
> goto out_free_kt;
> }
> }
> - retval = gssd_get_single_krb5_cred(context, kt, ple, force_renew);
> +
> + if (use_memcache)
> + cache_type = "MEMORY";
> + else
> + cache_type = "FILE";
> + snprintf(cc_name, sizeof(cc_name), "%s:%s/%s%s_%s",
> + cache_type,
> + ccachesearch[0], GSSD_DEFAULT_CRED_PREFIX,
> + GSSD_DEFAULT_MACHINE_CRED_SUFFIX, ple->realm);
> +
> + pthread_mutex_lock(&ple_lock);
> + if (ple->ccname == NULL || strcmp(ple->ccname, cc_name) != 0) {
> + free(ple->ccname);
> + ple->ccname = strdup(cc_name);
> + if (ple->ccname == NULL) {
> + printerr(0, "ERROR: no storage to duplicate credentials "
> + "cache name '%s'\n", cc_name);
> + code = ENOMEM;
> + pthread_mutex_unlock(&ple_lock);
> + goto out_free_kt;
> + }
> + }
> + pthread_mutex_unlock(&ple_lock);
> + if ((code = krb5_cc_resolve(context, cc_name, &ccache))) {
> + k5err = gssd_k5_err_msg(context, code);
> + printerr(0, "ERROR: %s while opening credential cache '%s'\n",
> + k5err, cc_name);
> + goto out_free_kt;
> + }
> +
> + retval = gssd_get_single_krb5_cred(context, kt, ple, force_renew, ccache);
> + krb5_cc_close(context, ccache);
> out_free_kt:
> krb5_kt_close(context, kt);
> out_free_context:
prev parent reply other threads:[~2025-03-24 20:26 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-02-25 21:46 [PATCH 0/2] nfs-utils: gssd: do not use krb5_initialize Olga Kornievskaia
2025-02-25 21:46 ` [PATCH 1/2] nfs-utils: gssd: unconditionally use krb5_get_init_creds_opt_alloc Olga Kornievskaia
2025-03-24 20:24 ` Steve Dickson
2025-03-24 20:24 ` Steve Dickson
2025-02-25 21:46 ` [PATCH 2/2] nfs-utils: gssd: do not use krb5_cc_initialize Olga Kornievskaia
2025-03-24 20:26 ` Steve Dickson [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f1ecba40-049e-47a0-8ebc-4b73bb48e172@redhat.com \
--to=steved@redhat.com \
--cc=linux-nfs@vger.kernel.org \
--cc=okorniev@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox