Re: packet signing and DFS referrals

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 3 Dec 2013 08:29:37 -0500
Jeff Layton <jlayton@xxxxxxxxxx> wrote:

> On Tue, 3 Dec 2013 10:11:00 +0000 (UTC)
> Michael <mk-cifs@xxxxxxxx> wrote:
> 
> > Dear cifs experts,
> > 
> > I tried to find some more information about my issue but was unsuccesful so far.
> > We have a mixed Microsoft/Netapp environment with a number of linux clients
> > were DFS was recently enabled. Kerberos Single-Sign-On is broken here
> > because of what I believe are incosistencies with packet signing
> > requirements. The server responsible for the DFS ROOT is requiring signing:
> > 
> > mount -t cifs //master/share mnt -o cruid=someid,sec=krb5,...
> > 
> > mount error(95): Operation not supported
> > Refer to the mount.cifs(8) manual page (e.g. man mount.cifs)
> > 
> > [21866613.989219] CIFS VFS: Server requires packet signing to be enabled in
> > /proc/fs/cifs/SecurityFlags.
> > [21866613.989401] CIFS VFS: cifs_mount failed w/return code = -95
> > 
> > 
> > So I enabled it with krb5i:
> > 
> > mount -t cifs //master/share mnt -o cruid=someid,sec=krb5i,...
> > 
> > But when accessing a dfs referral the next server has no packet signing
> > enabled (I believe this is the netapp default).
> > 
> > ls mnt/share2
> > [...]
> > dmesg | tail -n 2
> > 
> > [21866657.445227] CIFS VFS: signing required but server lacks support
> > [21866657.445441] CIFS VFS: cifs_mount failed w/return code = -95
> > 
> > Kernel version is 3.2.39-2 and cifs-utils 5.2-1.
> > 
> > My questions are:
> > 
> >  + might this incosistency really be the problem here?
> >  + are deferral-based security flags supported by the protocol?
> >  + how to proceed? (besides fixing the environment)
> > 
> > kind regards,
> >   Michael
> > 
> 
> Yeah, that was broken in older kernels.
> 
> There was an overhaul of the auth selection code in v3.11, so it should
> work correctly with current ones.
> 
> With those, just mount the first server with 'sec=krb5' and ensure that
> 0x1 is set in /proc/fs/cifs/SecurityFlags (it should be by default).
> With the current code, if the server requires signing it should be
> transparently enabled unless the client has explicitly disabled it.
> 

Ahh yeah, there's also commit 0b7bc84000d71f3647ca33ab1bf5bd928535c846
that may fix the problem in a less invasive way on earlier kernels. I
think that went into v3.9, but should be easy to backport to earlier
ones.

-- 
Jeff Layton <jlayton@xxxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux