Re: nfs and kerberos authentification problem.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello François,
First, you should not need to limit the encryption types in
/etc/krb5.conf as you have done.  None of the following lines are
necessary in either the client or server's /etc/krb5.conf file.
(Leaving them in will probably lead to headaches with other Kerberos
applications in the future.)

  default_tkt_enctypes = aes256-cts-hmac-sha1-96 des-cbc-crc
  default_tgs_enctypes = aes256-cts-hmac-sha1-96 des-cbc-crc
  permitted_enctypes = aes256-cts-hmac-sha1-96 rc4-hmac des-cbc-crc
des3-hmac-sha1

You said that you limited the client's keytab to des-cbc-crc.  It
appears you have done the same for the server's keytab since the
ticket and session key the client gets are des-cbc-crc.

> Sep  3 19:36:22 pc-francois krb5kdc[9787]: TGS_REQ (2 etypes {18 1})
> 192.168.1.3: ISSUE: authtime 1220463382, etypes {rep=18 tkt=1 ses=1},
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx for
> nfs/pc-francois.homenetwork.net@xxxxxxxxxxxxxxx

It looks like the client is successfully authenticating as
"nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx".

> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: sname =
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx

However, mapping that gss_auth_name to a local ID is failing, and is
being mapped to uid/gid of "-1 -1"
.

> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: \x01000000 2147483647 -1 -1 0 krb5
> \x000000000000[...]80b98

The "-1" should be interpreted in the kernel as nfsnobody.  What are
the permissions on the exported filesystem?

K.C.

On Wed, Sep 3, 2008 at 2:19 PM, François Valenduc
<francois.valenduc@xxxxxxxxx> wrote:
> Hello everybody,
>
> I am trying to set up kerberos authentification with nfs but it doesn't
> succeed. I have created to principals for the client and the server. I have
> added the client's principal to the keytab file by setting des-encryption
> (with ktadd -e des-cbc-crc:normal nfs/ordi-francois.homenetwork.net). I have
> changed the /etc/krb5.conf on the client file to use des encryption. So,
> it's set like this;
>
> [libdefaults]
>  default_realm = HOMENETWORK.NET
>  default_tkt_enctypes = aes256-cts-hmac-sha1-96 des-cbc-crc
>  default_tgs_enctypes = aes256-cts-hmac-sha1-96 des-cbc-crc
>  permitted_enctypes = aes256-cts-hmac-sha1-96 rc4-hmac des-cbc-crc
> des3-hmac-sha1
>  forwardable = true
>
> [realms]
>  HOMENETWORK.NET = {
>     admin_server = pc-francois.homenetwork.net:749
>     kdc = pc-francois.homenetwork.net:88
>     }
>
> [domain_realm]
>  .homenetwork.net = HOMENETWORK.NET
>  homenetwork.net = HOMENETWORK.NET
>
> But, it doesn't succeed. I can see in the log of the server (pc-francois)
> that the client (ordi-francois) get's a kerberos ticket but each time I
> mount a nfs share, it fails with this error:
> mount.nfs: permission denied.
>
> Does anybody know what's happening ?
> I have put the log of the server in the attached file.
>
> Thanks in advance for your help,
>
> François Valenduc
>
>
>
>
> Sep  3 19:36:22 pc-francois mountd[7747]: authenticated mount request from
> ordi-francois:865 for /home/francois (/home/francois)
> Sep  3 19:36:22 pc-francois krb5kdc[9787]: AS_REQ (2 etypes {18 1})
> 192.168.1.3: ISSUE: authtime 1220463382, etypes {rep=1 tkt=18 ses=18},
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx for
> krbtgt/HOMENETWORK.NET@xxxxxxxxxxxxxxx
> Sep  3 19:36:22 pc-francois krb5kdc[9787]: AS_REQ (2 etypes {18 1})
> 192.168.1.3: ISSUE: authtime 1220463382, etypes {rep=1 tkt=18 ses=18},
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx for
> krbtgt/HOMENETWORK.NET@xxxxxxxxxxxxxxx
> Sep  3 19:36:22 pc-francois krb5kdc[9787]: TGS_REQ (2 etypes {18 1})
> 192.168.1.3: ISSUE: authtime 1220463382, etypes {rep=18 tkt=1 ses=1},
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx for
> nfs/pc-francois.homenetwork.net@xxxxxxxxxxxxxxx
> Sep  3 19:36:22 pc-francois krb5kdc[9787]: TGS_REQ (2 etypes {18 1})
> 192.168.1.3: ISSUE: authtime 1220463382, etypes {rep=18 tkt=1 ses=1},
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx for
> nfs/pc-francois.homenetwork.net@xxxxxxxxxxxxxxx
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: leaving poll
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: handling null request
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: readline: read 1106 chars
> into buffer of size 2048: \x
> \x6082022206092a864886f71201020201006e8202113082020da003020105a10302010ea20703050020000000a3820125618201213082011da003020105a11b825f74da9da214cf8780d29b9e4d2020640fbd2c598eb5e23ec084f9a8...
>
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: in_handle:
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: length 0
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: in_tok:
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: length 550
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0000: 6082 0222 0609 2a86
> 4886 f712 0102 0201  `.."..*.H.......
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0010: 006e 8202 1130 8202
> 0da0 0302 0105 a103  .n...0..........
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0020: 0201 0ea2 0703 0500
> 2000 0000 a382 0125  ........ ......%
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0030: 6182 0121 3082 011d
> a003 0201 05a1 111b  a..!0...........
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0040: 0f48 4f4d 454e 4554
> 574f 524b 2e4e 4554  .HOMENETWORK.NET
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0050: a22d 302b a003 0201
> 03a1 2430 221b 036e  .-0+......$0"..n
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0060: 6673 1b1b 7063 2d66
> 7261 6e63 6f69 732e  fs..pc-francois.
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]:   0070: 686f 6d65 6e65 7477
> 6f72 6b2e 6e65 74a3  homenetwork.net.
>
> ...
>
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: sname =
> nfs/ordi-francois.homenetwork.net@xxxxxxxxxxxxxxx
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: DEBUG: serialize_krb5_ctx:
> lucid version!
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: prepare_krb5_rfc1964_buffer:
> serializing keys with enctype 4 and length 8
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: doing downcall
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: \x01000000 2147483647 -1 -1 0
> krb5
> \x0000000000000000b46525b6ff7f00000000000000000000000000000000000016acbf48c5090c26090000002a864886f7120102020400000008000000a2df25511fa8fb680400000008000000522fd5a1ef580b98
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: sending null reply
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: writing message: \x
> \x6082022206092a864886f71201020201006e8202113082020da003020105a10302010ea20703050020000000a3820125618201213082011da003020105a11
> ...
>
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: finished handling null
> request
> Sep  3 19:36:22 pc-francois rpc.svcgssd[7008]: entering poll
>
>
>
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux