From owner-freebsd-hackers@freebsd.org Mon Nov 30 16:59:44 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DA78DA3C634 for ; Mon, 30 Nov 2015 16:59:44 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id BEF011370 for ; Mon, 30 Nov 2015 16:59:44 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: by mailman.ysv.freebsd.org (Postfix) id BCBDFA3C62D; Mon, 30 Nov 2015 16:59:44 +0000 (UTC) Delivered-To: hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BC67FA3C62B for ; Mon, 30 Nov 2015 16:59:44 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from zxy.spb.ru (zxy.spb.ru [195.70.199.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 73C6A136F for ; Mon, 30 Nov 2015 16:59:44 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from slw by zxy.spb.ru with local (Exim 4.86 (FreeBSD)) (envelope-from ) id 1a3Rng-0004ey-8s; Mon, 30 Nov 2015 19:59:40 +0300 Date: Mon, 30 Nov 2015 19:59:40 +0300 From: Slawa Olhovchenkov To: Rick Macklem Cc: hackers@freebsd.org Subject: Re: NFSv4 details and documentations Message-ID: <20151130165940.GB31314@zxy.spb.ru> References: <9BC3EFA2-945F-4C86-89F6-778873B58469@cs.huji.ac.il> <20151115152635.GB5854@kib.kiev.ua> <3AEC67FD-2E67-4EF9-9D46-818ABF3D8118@cs.huji.ac.il> <661673285.88370232.1447682409478.JavaMail.zimbra@uoguelph.ca> <20151116141433.GA31314@zxy.spb.ru> <1489367909.88538127.1447688459383.JavaMail.zimbra@uoguelph.ca> <20151116155710.GB31314@zxy.spb.ru> <1312967974.89238067.1447714816355.JavaMail.zimbra@uoguelph.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1312967974.89238067.1447714816355.JavaMail.zimbra@uoguelph.ca> User-Agent: Mutt/1.5.24 (2015-08-30) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: slw@zxy.spb.ru X-SA-Exim-Scanned: No (on zxy.spb.ru); SAEximRunCond expanded to false X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Nov 2015 16:59:45 -0000 On Mon, Nov 16, 2015 at 06:00:16PM -0500, Rick Macklem wrote: > > But this is wrong: not only exported, access control too. > > May be for NFS guru this is trivia, but for ordinary users this is confused. > > > > > > What current status Kerberos support in NFS client/server? I found > > > > many posts and wiki pages about lack some functionality, but also see > > > > many works from you. > > > > > > > The main limitation (which comes from the fact that the RPCSEC_GSS > > > implementation > > > is version 1) is that it expects to use DES, which requires "weak > > > authentication" > > > to be enabled. Although parts about adding patches for initiator > > > credentials no longer > > > applies, this is still fairly useful. > > > > Hmm, I am have setup Kerberized NFS w/o "weak authentication" to be > > enabled, with mounted as > > 'nfsv4,intr,soft,sec=krb5i,allgssname,gssname=root'. What is requred > > DES in RPCSEC_GSS? (for me as user, how I can see what broken? some > > commands don't working or something else?) > > > Well, if the mount is working, you aren't broken. I do recommend against > using "soft" or "intr" on NFSv4 mounts, because the locking stuff > (which includes file opens) breaks if an RPC gets interrupted. > That is on one of the man pages, maybe "man nfsv4". > > Usually you can't create the keytab entries unless you enable weak authentication, > but if you've gotten it working, be happy;-) > (DES is used for krb5p and none of the Kerberized NFS stuff works for > excryption types with larger keys than 8 bytes, from what I know. I > always used des-cbc-crc, because that is what all clients/servers are > supposed to support. Once you move away from that, you are experimenting > and it works or not.) mount is working, but all access (from any accounts) go from mounting credentials (if I mount allgssname,gssname=host -- as root and mapped to nobody, if I mount as user -- all access as user, root also as user). What I am missing or missunderstund?