Re: [PATCH 0/3] cifs: allow multiuser mounts with authtypes besides krb5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jan 6, 2012 at 7:11 AM, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
> When the multiuser mount code was initially introduced for cifs, I
> limited it to sec=krb5 auth. When a new user walks into a mount, we have
> no way to prompt for a username and password from the kernel, so the
> only auth type we could support was krb5.
>
> This patchset extends the code to allow other auth types to use
> multiuser mounts. The idea here is for users to put their username and
> password for a particular server or domain into the keyring. The kernel

Would users be able to put their username for a particular domain name
and server address as well as server name?
Was not clear from the description whether it was just the server address
or name as well!

> can then look for that key and use those credentials to establish a
> session on the user's behalf.
>
> Because of the quirkiness of keyring permissions, this patchset adds a
> new key type that does not allow the keys to be read from userspace.
> That should prevent compromise of the credentials by someone walking up
> to the user's machine while she is away at lunch.
>
> The userspace tool to stash keys in the keyring is already in
> cifs-utils, but the current form will not work with this version of the
> kernel patchset. A patchset that updates the tool to be suitable for
> this purpose will follow.
>
> Jeff Layton (3):
>  keys: add a "secret" key type
>  cifs: sanitize username handling
>  cifs: fetch credentials out of keyring for non-krb5 auth multiuser
>    mounts
>
>  fs/cifs/cifs_spnego.c        |   10 ++-
>  fs/cifs/cifsencrypt.c        |   11 ++-
>  fs/cifs/connect.c            |  195 ++++++++++++++++++++++++++++++++++++++----
>  include/keys/user-type.h     |    3 +-
>  security/keys/internal.h     |    1 +
>  security/keys/key.c          |    1 +
>  security/keys/user_defined.c |   17 ++++
>  7 files changed, 214 insertions(+), 24 deletions(-)
>
> --
> 1.7.7.4
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux