Re: proposed patch to rpcbind to provide finer-grained security controls than offered by the -i option

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Dec 9, 2010, at 3:49 PM, Andrew J. Schorr wrote:

> Hi,
> 
> The current rpcbind -i option seems to relax 3 different security requirements.
> If the user wants to allow any one of the three, he is forced to allow
> all 3.
> 
> The attached patch introduces 3 new options (-c, -r, and -u) to break this
> down to give the user control of which security requirements to relax.
> 
> This patch compiles, but has not been tested yet.  If there is any
> interest in accepting this, I will of course test it. :-)  But it's fairly
> basic, so I thought I'd gauge the interest level first.  Steve
> Dickson from Redhat suggested that I post here to discuss this issue
> regarding https://bugzilla.redhat.com/show_bug.cgi?id=481422

Looking over the bug...

It sounds like your application is trying to use glibc's RPC implementation with rpcbind.  If you build your application with libtirpc instead, it should use an AF_UNIX socket to contact rpcbind instead of loopback.  The AF_UNIX socket carries some authentication information with the registration request.  All users of your application would be allowed to set or unset RPC registrations in that case.

-- 
Chuck Lever
chuck[dot]lever[at]oracle[dot]com




--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux