Re: [PATCH] Adding the nfs4_use_min_auth module parameter

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2013-11-07 at 16:25 -0500, Steve Dickson wrote:
+AD4- Hey,
+AD4- 
+AD4- On 07/11/13 14:26, Myklebust, Trond wrote:
+AD4- +AD4- On Thu, 2013-11-07 at 14:09 -0500, Steve Dickson wrote:
+AD4- +AD4APg- This new module parameter makes the v4 client
+AD4- +AD4APg- use the minimal authentication flavor (AUTH+AF8-UNIX)
+AD4- +AD4APg- when establishing NFSV4 state and doing the
+AD4- +AD4APg- pseudoroot lookup
+AD4- +AD4APg-
+AD4- +AD4- 
+AD4- +AD4- That looks very ad-hoc. Quite frankly, you can do the exact same thing
+AD4- +AD4- already by simply blacklisting the rpcsec+AF8-gss+AF8-krb5 and/or auth+AF8-rpcgss
+AD4- +AD4- modules.
+AD4- I tried to keep a very small foot print... I'm not sure why that 
+AD4- looks ad-hoc to you... 
+AD4- 
+AD4- If we blacklist those module(s) then we are disabling secure mounts
+AD4- altogether... 

What's the difference? If you use secure mounts, you really do want the
NFSv4 state to be secure too.

+AD4- +AD4- I think we should rather looks at adding a new mount option for
+AD4- +AD4- specifying the security flavour to use when establishing basic NFSv4.x
+AD4- +AD4- state, and then perhaps specifying the +AF8-default+AF8- for that mount option
+AD4- +AD4- using a module parameter.
+AD4- The problem is everything is hard code in these two areas so having
+AD4- a mount option would not work... 

We can change that code.

+AD4- The fact that -o sec+AD0-sys does not turn off the use of AUTH+AF8-GSS+AF8-KRB5x 
+AD4- is simple wrong... IMHO...

I beg to differ. The problem previously was that it +AF8-did+AF8- set the policy
for the state management, and that meant that if you has 2 mounts on the
same server with different security flavours, then then client behaviour
depended on the order of the mounts. Get the order wrong, and you get
anything from outright errors (CLID+AF8-IN+AF8-USE) to insecure behaviour.

+AD4-  Not having way to override this behavior
+AD4- is not a good thing... again... IMHO... 
+AD4- 
+AD4- Finally, Are there any servers out there today that support this type
+AD4- of behavior? Requiring secure state establishment or secure 
+AD4- pseudoroot lookups. 
+AD4- 
+AD4- Bruce, can we configure the Linux server to require this type security behavior? 
+AD4- Can any server out there require these type of security behavior?  
+AD4- 
+AD4- If the answer is no, then we really need a way to disable this type
+AD4- of behavior....

I don't disagree with the goal, I disagree with the method.

-- 
Trond Myklebust
Linux NFS client maintainer

NetApp
Trond.Myklebust+AEA-netapp.com
www.netapp.com
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux