Re: [PATCH 0/3] Various gssd fixes including machine-credential issue.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 05/06/2013 16:25, Myklebust, Trond wrote:
> On Wed, 2013-06-05 at 16:05 +0200, E.G. Keizer wrote:
>> First I would like to wholeheartedly support Neil Brown's comment. We at the
>> Vrije Universiteit in Amsterdam (NL) also have the situation where the Kerberos
>> administrator does not hand out machine credentials. A lot of Linux users from
>> the Faculty of Sciences depend on the functionality that lets them access
>> the NFS file servers with only their user credentials.
> 
> They should still be able to do that, but in that case, the state
> management will have to default to AUTH_SYS to set up the lease, which
> means that someone else can spoof requests to cancel the lease or change
> the callback channel parameters.
We would probably accept that. But can you enlighten me as to why AUTH_SYS is better
then krb5 (no i, no p)?

> 
>> Secondly I would like to make a remark on basing client id's on the system's kerberos principal's name.
>> That same faculty, in the times it had its own IT department, used an identical keytab for
>> all Linux workstations, using the principal names "[nfs|root|host]/workstation@xxxxxxxxx".
>> I understand this would lead to severe problems when the client id (co_ownerid) is based
>> solely in the systems root principal name.
> 
> How so? The only problem should be that any one of those machines can go
> and cancel or change the lease of any other. That's a compromise that
> you decided upon when you decided to use one keytab for all of them.
Mmm, not at the time we made the decision. But I just mentioned that as an example
of the problems one can meet when deciding on the implementation of client id.
The same problem, but on a smaller scale, occurs when the client id is based
on the system principal and two or more systems use the same user principal as system
principal.
> 
>> It seems to me that the issues about the client id look like a bag of worms. I've seen that the
>> newest standard `requires' integrity protection for client id exchanges. I doubt
>> that that will help when the source code of the NFS client is known and
>> the client id is guessable.
> 
> What is the attack and how would it compromise security on the clients
> that you care about?
I am personally not that worried about this issue on our environment. But others seem to
be in their environment. Otherwise the integrity requirement would not have ended up in
the NFSv4 RFC. As fas as I understand the danger with a man-in-the-middle attack is that the attacker
can see my client id and thus cancel my lease. When the man-in-the-middle can guess my
client id he can still invalidate my lease even when i'am using krb5i.
> 
>>  The wisest thing might be to offer different options
>> and let the administrators pick the one they like best?
> 
> We have two options available to you: auth_sys or RPCSEC_GSS w/krb5i.
I meant different options for choosing the client id.


Regards,

Ed Keizer

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux