Re: Kernel NFS client and Kerberos delegation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 8 Oct 2018, at 15:46, Language Lawyer wrote:

> Hi,
>
> AFAIU kernel NFS client keeps ID -> Name mapping in the "id_resolver"
> keyring.  Do I understand it correctly that with this hard mapping it is
> not possible for a service to access a kerberized NFS storage on behalf of
> some user using user's delegated (for example, with S4U2Self+S4U2Proxy)
> credentials?

The id_resolver keyring exists to translate kerberos principles to UID and
the reverse, but it doesn't really play in the mechanisms that you're
interested in.

I assume you want a particular process, like httpd, to have the kernel chose
which kerberos principle and thus which GSS context to use when sending RPC
to the NFS server.

The NFS client will choose the appropriate GSS context based on the fsuid of
the calling process, and then as long as the gssd daemon can find an
appropriate kerberos cache and establish a context everything will work
fine.  So, as long as your service changes its fsuid (like smbd does),
everything generally works.

If you want a process that doesn't change its fsuid to use a different GSS
context, you have to find a way to communicate which context, or credential
you want the kernel to choose.

Ben



[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux