Re: [linux-cifs-client] [PATCH 00/11] cifs: implement multisession mounts (try #2)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 22 Apr 2010 16:39:48 +0100
Jamie Lokier <jamie@xxxxxxxxxxxxx> wrote:

> Stef Bon wrote:
> > 2010/4/21 Jeff Layton <jlayton@xxxxxxxxxx>:
> > > On Wed, 21 Apr 2010 16:16:26 +0200
> > > Stef Bon <stefbon@xxxxxxxxx> wrote:
> > >
> > >> I'm sorry but what is a multisession mount?
> > >>
> > >> Stef
> > >>
> > >
> > > Sorry, I guess I should have been more clear.
> > 
> > Well you dio not have to apologise!
> > There is nothing wrong with asking.
> > 
> > >I'll try to flesh out the
> > > description a bit more on the next respin of this set:
> > >
> > > Currently, CIFS will only uses a single set of credentials on a
> > > mountpoint, and those credentials are decided at mount time. This is
> > > fine if you only ever have a single user using that mountpoint. In many
> > > cases though, multiple users on a client may access the mount. When
> > > this happens, those users share the mount's credentials. This means
> > > that you can't enforce permissions on a per-user basis on a CIFS mount.
> > >
> > > Now, CIFS tries to do several kludgey things to get around this
> > > limitation. It tries to enforce permissions locally, particularly if
> > > you have unix extensions enabled (which allows the client to fetch
> > > ownership and mode info from the server), but this is an inherently
> > > broken and racy proposition -- you have to be able to map local uid's
> > > to the server's, for instance and you also are faced with the
> > > possibility that permissions can change after you check them.
> > >
> > > There are also problems with inode creation. If you create a file, the
> > > ownership on the server is generally set to whatever the mount creds
> > > map to, and that has no relation to the user actually accessing the
> > > mount. This leads to a very confusing problem that users sometimes hit
> > > where they "touch" a new file on a mount, and get an error back. The
> > > file is created, but the ownership and mode are set in such a way that
> > > utimes() on it fails when the client tries to enforce permissions.
> > >
> > > The idea with this set is to address the root cause and allow the
> > > client to use multiple sets of credentials based on the fsuid of the
> > > task accessing the mount. This is a little more involved than with a
> > > filesystem like NFS -- you have to establish a "session" with the
> > > server for each set of credentials.
> > >
> > > Clear as mud?
> > 
> > Yes very clear, what you want, but to me the whole problem is strange!
> > 
> > Using more than one set of credentials (if using those) looks to me a not logic.
> > NOt only because my construction (mount.md5key) is using seperate
> > mountpoints per user, pure
> > for securiity reasons. Another user is not allowed to access my mounts
> > (not only to smb shares but every mount)
> > 
> > But apart from that, I think all the data (files,permissions,..)
> > depend on the credentials provided. The server "decides"
> > what the client can see. Now you want to make the mounpoint present
> > all the different "views" in one?
> > 
> > I do not know this is possible. The client should maintain different
> > views (or sessions as you call it) and present the view to the user.
> > But what if a user which is not linked to any credentials on the
> > client accesses the mountpiont?
> 
> Fwiw, I originally agreed with Jeff's idea but now prefer Stef's :-)
> 
> In some ways this is an automount type of problem: When a new user
> accesses the mount, creating a new session (and asking for user
> credentials) is not unlike creating a new mount.
> 

I see no reason why we need to limit a superblock to use a single
CIFS session (and hence a single set of credentials). Adding extra
layers of userspace stuff is just working around a limitation of the
filesystem. Why shouldn't CIFS just use a proper set of credentials in
the first place? I think multi-user CIFS should be as easy to deploy as
NFS.

> If automount supported "per-user" style mounts, magically resolving to
> a different mounted fs depending in the accessing user's credentials,
> like the automounters of old could sometimes do :-) Would that solve
> the kernel part of this problem?
> 
> I think it probably would.
> 

Maybe, but that seems like we're just adding userspace layers to work
around a fundamental design limitation of Linux CIFS. There are good
reasons to allow different users to access the same mountpoint. The
main one being that it's simply more intuitive for administrators. We
don't need these extra layers for other network filesystems (such as
NFS). Why should CIFS be any different here?

> fsuid is probably the wrong decision input for this.  For simple
> setups, yes, but if you have the same user logged in but one instance
> has diferent credentials such as using "newgrp", auxiliary groups,
> SElinux and so on... each of those should be able to influence whether
> separate sessions are needed.
> 

I was thinking last night about changing this and trying to do this a
little more cleanly using task credentials. I'm still trying to
understand what I should key the lookup off of however. When a task
tries to get access to the mount, what should we use to determine
whether it uses a given session?

Note that kerberized NFS uses the fsuid too, so there is some precedent
for that.

> As non-kerberos setups need some userspace to support asking for the
> password or whatever, perhaps this is a general purpose way forward
> with it: An autofs-like capability to intercept mountpoint traversals
> and upcall to userspace.
> 

What will you do if there is no user to type in the password? Consider
crontab jobs, for instance. This is something we could certainly
consider for the future but it's really a separate project I think.

In fact, I may be mentoring someone for GSoC to add some infrastructure
to allow storage NTLM creds via keyctl that CIFS could then use to
establish sessions. The limitation of this to kerberos may not be
long-lived.

> Perhaps extending FUSE on the user side, if autofs isn't appropriate.
> FUSE is very programmable, and the kernel side can cache some things.
> If better caching is needed, that would be to everyone's benefit.
> 
> That kind of approach would help other filesystems as much as CIFS.
> 
> Of course all of this still needs the ability to create new CIFS
> sessions when needed :-)  But triggering it from userspace has a lot of
> advantages.
> 

Sounds like it might be useful, but I'm not sure it's a general enough
solution for this problem.

It has some disadvantages. Extra setup and administration overhead
being the big ones. It also means that you can't have a "shared"
directory since you're requiring separate mountpoints for each local
user.

The solution I'm proposing will make a shared CIFS mount as easy to set
up and deal with as it is with NFS. Which is to say, non-trivial but
doable for the average sysadmin with a clue.

-- 
Jeff Layton <jlayton@xxxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux