Hello, On 11/28/2016 01:37 PM, Lukas Hejtmanek wrote: > Hello, > > would it be acceptable to add an option for rpc.gssd to use host keytab if > user's kerberos ticket is not available? I'm not sure how this would work. The kernel would do an upcall to the user's creds but they have expired. Now if this new option is set, rpc.gssd would used the machine's cred? It seems to me that would not be too secure. > > Consider the following scenario: > 1) machine has NFS mounted /home using kerberos authentication > 2) user logs in, sshd creates krb ticket ($HOME/.k5login needs to be world > readable to allow kerberized access, e.g., using kerberos ticket) > 3) user stays logged in and krb ticket expires > 4) kinit to renew ticket produces strange error because $HOME is not > accessible and a new ticket is not created. > > So, I think in this case, I would like to see rpc.gssd uses host keytab while > user's ticket is not available, which maps to nobody/nogroup, but kinit should > succeed. Who is going the kinits in this scenario? > > Or are there any other options if one is using kerberized homes only? > I'm pretty sure sssd will what you are looking for. steved. -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html