----- Original Message ----- > The part of process_krb5_upcall that handles non-machine user creds > first tries to query GSSAPI for credentials. If that fails, it then > falls back to trawling through likely credcache locations to find them > and then points $KRB5CCNAME at it before proceeding. There are a number > of bugs in this code that this patch attempts to address. > > The code that queries GSSAPI for credentials does it as root and that > almost universally fails to do anything useful unless we happen to be > looking for non-machine root creds. Because of this, gssd almost always > falls back to having to search for credcaches "manually" and then set > $KRB5CCNAME if and when they are found. The code that handles credential > switching is in create_auth_rpc_client, so it's too late to be of any > use here. > > Worse yet, the GSSAPI code that handles finding credcaches does it based > on the return from getuid(), so just switching the fsuid or even euid is > insufficient. You must switch the real uid. In what case does it do this ? If it is unconditional this is a bug in GSSAPI and we should fix it there. You shouldn't really change the real uid of gssd because then the user can send a kill to the gssd process, only euid should be changed IMO. Simo. > This code moves the credential switching into process_krb5_upcall and > makes it use setuid() instead of setfsuid(). That's of course > irreversible so we can't switch back to root after doing so. No matter > though since it's probably safer to do all of this as an unprivileged > user anyway. > > Signed-off-by: Jeff Layton <jlayton@xxxxxxxxxx> > --- > utils/gssd/gssd_proc.c | 26 ++++++++++---------------- > 1 file changed, 10 insertions(+), 16 deletions(-) > > diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c > index fd258f7..4856d08 100644 > --- a/utils/gssd/gssd_proc.c > +++ b/utils/gssd/gssd_proc.c > @@ -834,7 +834,6 @@ create_auth_rpc_client(struct clnt_info *clp, > CLIENT *rpc_clnt = NULL; > struct rpc_gss_sec sec; > AUTH *auth = NULL; > - uid_t save_uid = -1; > int retval = -1; > OM_uint32 min_stat; > char rpc_errmsg[1024]; > @@ -843,16 +842,6 @@ create_auth_rpc_client(struct clnt_info *clp, > struct sockaddr *addr = (struct sockaddr *) &clp->addr; > socklen_t salen; > > - /* Create the context as the user (not as root) */ > - save_uid = geteuid(); > - if (setfsuid(uid) != 0) { > - printerr(0, "WARNING: Failed to setfsuid for " > - "user with uid %d\n", uid); > - goto out_fail; > - } > - printerr(2, "creating context using fsuid %d (save_uid %d)\n", > - uid, save_uid); > - > sec.qop = GSS_C_QOP_DEFAULT; > sec.svc = RPCSEC_GSS_SVC_NONE; > sec.cred = cred; > @@ -951,11 +940,6 @@ create_auth_rpc_client(struct clnt_info *clp, > out: > if (sec.cred != GSS_C_NO_CREDENTIAL) > gss_release_cred(&min_stat, &sec.cred); > - /* Restore euid to original value */ > - if (((int)save_uid != -1) && (setfsuid(save_uid) != (int)uid)) { > - printerr(0, "WARNING: Failed to restore fsuid" > - " to uid %d from %d\n", save_uid, uid); > - } > return retval; > > out_fail: > @@ -1033,6 +1017,16 @@ process_krb5_upcall(struct clnt_info *clp, uid_t uid, > int fd, char *tgtname, > service ? service : "<null>"); > if (uid != 0 || (uid == 0 && root_uses_machine_creds == 0 && > service == NULL)) { > + > + /* Create the context as the user (not as root) */ > + if (setuid(uid) != 0) { > + printerr(0, "WARNING: Failed to setuid for " > + "user with uid %d\n", uid); > + goto out_return_error; > + } > + > + printerr(2, "creating context using real uid %d\n", uid); > + > /* Tell krb5 gss which credentials cache to use */ > /* Try first to acquire credentials directly via GSSAPI */ > err = gssd_acquire_user_cred(uid, &gss_cred); > -- > 1.8.3.1 > > -- > To unsubscribe from this list: send the line "unsubscribe linux-nfs" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- Simo Sorce * Red Hat, Inc. * New York -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html