On Thu, 2017-02-23 at 16:42 -0500, Jeff Layton wrote: > On Thu, 2017-02-23 at 16:30 -0500, Jeff Layton wrote: > > On Thu, 2017-02-23 at 16:10 -0500, Jeff Layton wrote: > > > On Thu, 2017-02-23 at 14:18 -0600, Chad William Seys wrote: > > > > > To be clear...I assume that you have a keytab set up someplace that > > > > > has the smbadmin@ credentials in it, correct? That's the only way > > > > > that cifs.upcall would instantiate a new credcache. > > > > > > > > Right. smbadmin@ credentials are in /etc/krb5.keytab. 'mount' must > > > > check there by default. > > > > > > > > > It sounds like you're walking into the DFS mount in a task that is > > > > > running as root, but that has inherited a KRB5CCNAME environment > > > > > variable from a cwseys@ login session. > > > > > > > > The task that is walking into the DFS mount is running as 'cwseys' . My > > > > guess is that when cwseys tries to cd into DFS mount, cifs.upcall or the > > > > kernel is using the wrong name for root's credential cache. > > > > > > > > > It might be nice to see the debug level output from syslog, so we can > > > > > tell what's actually happening in the upcall. Can you provide that? > > > > > > > > > > > > cwseys: > > > > $ kdestroy > > > > $ cd / > > > > > > > > root: > > > > # umount /smb > > > > # umount /smb # to be sure! > > > > # kdestroy > > > > # ls /tmp/krb5cc_* -al > > > > ls: cannot access '/tmp/krb5cc_*': No such file or directory > > > > > > > > cwseys: > > > > $ kinit > > > > Password for cwseys@xxxxxxxxxxxxxxxx: > > > > $ ls /tmp/krb5cc_* -al > > > > -rw------- 1 cwseys cwseys 939 Feb 23 12:59 /tmp/krb5cc_1494_sM11PG > > > > > > > > $ klist -c /tmp/krb5cc_1494_sM11PG > > > > Ticket cache: FILE:/tmp/krb5cc_1494_sM11PG > > > > Default principal: cwseys@xxxxxxxxxxxxxxxx > > > > > > > > Valid starting Expires Service principal > > > > 02/23/2017 12:59:00 03/05/2017 12:58:57 > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx > > > > > > > > > > > > root: > > > > # mount -t cifs //smb.physics.wisc.edu/smb /smb > > > > -osec=krb5,multiuser,username=smbadmin@xxxxxxxxxxxxxxxx --verbose > > > > mount.cifs kernel mount options: > > > > ip=128.104.160.17,unc=\\smb.physics.wisc.edu\smb,sec=krb5,multiuser,user=smbadmin@xxxxxxxxxxxxxxxx,pass=******** > > > > > > > > # ls /tmp/krb5cc_* -al > > > > -rw------- 1 root root 1046 Feb 23 13:00 /tmp/krb5cc_0 > > > > -rw------- 1 cwseys cwseys 939 Feb 23 12:59 /tmp/krb5cc_1494_sM11PG > > > > > > > > # klist -c /tmp/krb5cc_0 > > > > Ticket cache: FILE:/tmp/krb5cc_0 > > > > Default principal: smbadmin@xxxxxxxxxxxxxxxx > > > > > > > > Valid starting Expires Service principal > > > > 02/23/2017 13:00:01 03/05/2017 13:00:01 > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx > > > > 02/23/2017 13:00:01 03/05/2017 13:00:01 > > > > cifs/smb.physics.wisc.edu@xxxxxxxxxxxxxxxx > > > > > > > > [debug.log after mount] > > > > Feb 23 13:00:01 trog cifs.upcall: key description: > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160 > > > > .17;sec=krb5;uid=0x0;creduid=0x0;user=smbadmin@xxxxxxxxxxxxxxxx;pid=0x6abf > > > > Feb 23 13:00:01 trog cifs.upcall: ver=2 > > > > Feb 23 13:00:01 trog cifs.upcall: host=smb.physics.wisc.edu > > > > Feb 23 13:00:01 trog cifs.upcall: ip=128.104.160.17 > > > > Feb 23 13:00:01 trog cifs.upcall: sec=1 > > > > Feb 23 13:00:01 trog cifs.upcall: uid=0 > > > > Feb 23 13:00:01 trog cifs.upcall: creduid=0 > > > > Feb 23 13:00:01 trog cifs.upcall: user=smbadmin@xxxxxxxxxxxxxxxx > > > > Feb 23 13:00:01 trog cifs.upcall: pid=27327 > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env: > > > > pathname=/proc/27327/environ > > > > Feb 23 13:00:01 trog cifs.upcall: get_existing_cc: default ccache is > > > > FILE:/tmp/krb5cc_0 > > > > Feb 23 13:00:01 trog cifs.upcall: get_tgt_time: unable to get principal > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: getting service > > > > ticket for smb.physics.wisc.edu > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: obtained service ticket > > > > Feb 23 13:00:01 trog cifs.upcall: Exit status 0 > > > > Feb 23 13:00:01 trog cifs.upcall: key description: > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160.17;sec=krb5;uid=0x0;creduid=0x0;user=smbadmin@xxxxxxxxxxxxxxxx;pid=0x6abf > > > > Feb 23 13:00:01 trog cifs.upcall: ver=2 > > > > Feb 23 13:00:01 trog cifs.upcall: host=smb.physics.wisc.edu > > > > Feb 23 13:00:01 trog cifs.upcall: ip=128.104.160.17 > > > > Feb 23 13:00:01 trog cifs.upcall: sec=1 > > > > Feb 23 13:00:01 trog cifs.upcall: uid=0 > > > > Feb 23 13:00:01 trog cifs.upcall: creduid=0 > > > > Feb 23 13:00:01 trog cifs.upcall: user=smbadmin@xxxxxxxxxxxxxxxx > > > > Feb 23 13:00:01 trog cifs.upcall: pid=27327 > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env: > > > > pathname=/proc/27327/environ > > > > Feb 23 13:00:01 trog cifs.upcall: get_existing_cc: default ccache is > > > > FILE:/tmp/krb5cc_0 > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: getting service > > > > ticket for smb.physics.wisc.edu > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: obtained service ticket > > > > Feb 23 13:00:01 trog cifs.upcall: Exit status 0 > > > > Feb 23 13:00:01 trog cifs.upcall: key description: > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160.17;sec=krb5;uid=0x5d6;creduid=0x5d6;pid=0x6725 > > > > Feb 23 13:00:01 trog cifs.upcall: ver=2 > > > > Feb 23 13:00:01 trog cifs.upcall: host=smb.physics.wisc.edu > > > > Feb 23 13:00:01 trog cifs.upcall: ip=128.104.160.17 > > > > Feb 23 13:00:01 trog cifs.upcall: sec=1 > > > > Feb 23 13:00:01 trog cifs.upcall: uid=1494 > > > > Feb 23 13:00:01 trog cifs.upcall: creduid=1494 > > > > Feb 23 13:00:01 trog cifs.upcall: pid=26405 > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env: > > > > pathname=/proc/26405/environ > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env: > > > > cachename = FILE:/tmp/krb5cc_1494_bkfO2z > > > > Feb 23 13:00:01 trog cifs.upcall: get_existing_cc: default ccache is > > > > FILE:/tmp/krb5cc_1494_bkfO2z > > > > Feb 23 13:00:01 trog cifs.upcall: get_tgt_time: unable to get principal > > > > Feb 23 13:00:01 trog cifs.upcall: Exit status 1 > > > > > > > > cwseys: > > > > $ cd /smb > > > > > > > > [debug.log after cd /smb] > > > > Feb 23 13:05:20 trog cifs.upcall: key description: > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160.17;sec=krb5;uid=0x5d6;creduid=0x5d6;pid=0x3397 > > > > Feb 23 13:05:20 trog cifs.upcall: ver=2 > > > > Feb 23 13:05:20 trog cifs.upcall: host=smb.physics.wisc.edu > > > > Feb 23 13:05:20 trog cifs.upcall: ip=128.104.160.17 > > > > Feb 23 13:05:20 trog cifs.upcall: sec=1 > > > > Feb 23 13:05:20 trog cifs.upcall: uid=1494 > > > > Feb 23 13:05:20 trog cifs.upcall: creduid=1494 > > > > Feb 23 13:05:20 trog cifs.upcall: pid=13207 > > > > Feb 23 13:05:20 trog cifs.upcall: get_cachename_from_process_env: > > > > pathname=/proc/13207/environ > > > > Feb 23 13:05:20 trog cifs.upcall: get_cachename_from_process_env: > > > > cachename = FILE:/tmp/krb5cc_1494_sM11PG > > > > Feb 23 13:05:20 trog cifs.upcall: get_existing_cc: default ccache is > > > > FILE:/tmp/krb5cc_1494_sM11PG > > > > Feb 23 13:05:20 trog cifs.upcall: handle_krb5_mech: getting service > > > > ticket for smb.physics.wisc.edu > > > > Feb 23 13:05:20 trog cifs.upcall: handle_krb5_mech: obtained service ticket > > > > Feb 23 13:05:20 trog cifs.upcall: Exit status 0 > > > > > > > > $ kdestroy > > > > $ ls /tmp/krb5cc_* -al > > > > -rw------- 1 root root 1046 Feb 23 13:00 /tmp/krb5cc_0 > > > > > > > > # obs-cos is on a different server - DFS linked. > > > > $ cd obs-cos > > > > $ ls > > > > ls: cannot open directory '.': Permission denied > > > > > > > > # kerberos cache file created with root owner/group ! > > > > # The file has bytes in it, but not matching the size above. Wonder > > > > # what's in it... ? > > > > $ ls /tmp/krb5cc_* -al > > > > -rw------- 1 root root 1046 Feb 23 13:00 /tmp/krb5cc_0 > > > > -rw------- 1 root root 1050 Feb 23 13:05 /tmp/krb5cc_1494_sM11PG > > > > > > > > # now cannot kinit > > > > $ kinit > > > > Password for cwseys@xxxxxxxxxxxxxxxx: > > > > kinit: Failed to store credentials: Internal credentials cache error > > > > (filename: /tmp/krb5cc_1494_sM11PG) while getting initial credentials > > > > > > > > root: > > > > # lets look in the credential cache that was created by root. > > > > # looks like credentials used by root to mount /smb: > > > > # My guess is the kernel was trying to stash the > > > > # cifs/smb02.physics.wisc.edu@xxxxxxxxxxxxxxxx > > > > # kerberos ticket, but put it in krb5cc_1494_sM11PG instead > > > > # of krb5cc_0 > > > > # klist -c /tmp/krb5cc_1494_sM11PG > > > > Ticket cache: FILE:/tmp/krb5cc_1494_sM11PG > > > > Default principal: smbadmin@xxxxxxxxxxxxxxxx > > > > > > > > Valid starting Expires Service principal > > > > 02/23/2017 13:05:59 03/05/2017 13:05:59 > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx > > > > 02/23/2017 13:05:59 03/05/2017 13:05:59 > > > > cifs/smb02.physics.wisc.edu@xxxxxxxxxxxxxxxx > > > > > > > > # klist -c /tmp/krb5cc_0 > > > > Ticket cache: FILE:/tmp/krb5cc_0 > > > > Default principal: smbadmin@xxxxxxxxxxxxxxxx > > > > > > > > Valid starting Expires Service principal > > > > 02/23/2017 13:00:01 03/05/2017 13:00:01 > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx > > > > 02/23/2017 13:00:01 03/05/2017 13:00:01 > > > > cifs/smb.physics.wisc.edu@xxxxxxxxxxxxxxxx > > > > > > > > [debug.log after trying to cd obs-cos] > > > > vvvvvvvvvvvvvvvvvvvvvvvvvvvv > > > > I think the error is here: Notice pid=13207, that belongs > > > > to cwseys but cifs.upcall key description is trying to use uid=0 and > > > > creduid=0 . The credential cache file is correct, but the uid/creduid > > > > are not. > > > > > > > > cwseys 13207 /bin/bash > > > > > > > > Also, in the above the log from 'cd /smb' cifs.upcall used uid=1494 and > > > > creduid=1494 . > > > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > > > > > > > > > Yep, that's clearly the issue. The question is how you're ending up in > > > that situation... > > > > > > Regardless of how it's happening to you, it's probably possible to fool > > > the environment scraping like this, by triggering a krb5 upcall from > > > the context of a setuid program that has inherited the KRB5CCNAME > > > environment variable from an unprivileged process. > > > > > > I'm not sure what we can reasonably do about that. I suppose it might > > > be interesting to dump the Uid: line from /proc/pid/status when we do > > > this upcall, and see what all of the values are set to. Maybe we can > > > reject using the credcache if the uid in the upcall doesn't match one > > > of the values? > > > > > > I'll see if I can cook up a debug patch sometime soon for that. > > > > > > > Just out of curiousity. As that unprivileged user, what do you get back > > if you do this? > > > > $ which cd ; ls -l `which cd` > > > > Thanks, > > Nevermind, I see the problem. From follow_automount in the pathwalking > code: > > old_cred = override_creds(&init_cred); > mnt = path->dentry->d_op->d_automount(path); > revert_creds(old_cred); > > So we end up overriding the process creds in order to do the automount, > which leads to exactly this problem. > > I think the best we can do here is probably to just not do the > environment scraping if the uid is 0. It's pretty hacky, but hey, we're > already in rather nasty hack territory as it is. > > Thoughts? Can't we detect that the process has changed id ? Cutting off root may be a way, but I can see how some peoepl may want root too to be able to mount and walk cifs shares ... Simo. -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html