Blame view

kernel/linux-imx6_3.14.28/Documentation/filesystems/nfs/rpc-server-gss.txt 3.63 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
  
  rpcsec_gss support for kernel RPC servers
  =========================================
  
  This document gives references to the standards and protocols used to
  implement RPCGSS authentication in kernel RPC servers such as the NFS
  server and the NFS client's NFSv4.0 callback server.  (But note that
  NFSv4.1 and higher don't require the client to act as a server for the
  purposes of authentication.)
  
  RPCGSS is specified in a few IETF documents:
   - RFC2203 v1: http://tools.ietf.org/rfc/rfc2203.txt
   - RFC5403 v2: http://tools.ietf.org/rfc/rfc5403.txt
  and there is a 3rd version  being proposed:
   - http://tools.ietf.org/id/draft-williams-rpcsecgssv3.txt
     (At draft n. 02 at the time of writing)
  
  Background
  ----------
  
  The RPCGSS Authentication method describes a way to perform GSSAPI
  Authentication for NFS.  Although GSSAPI is itself completely mechanism
  agnostic, in many cases only the KRB5 mechanism is supported by NFS
  implementations.
  
  The Linux kernel, at the moment, supports only the KRB5 mechanism, and
  depends on GSSAPI extensions that are KRB5 specific.
  
  GSSAPI is a complex library, and implementing it completely in kernel is
  unwarranted. However GSSAPI operations are fundementally separable in 2
  parts:
  - initial context establishment
  - integrity/privacy protection (signing and encrypting of individual
    packets)
  
  The former is more complex and policy-independent, but less
  performance-sensitive.  The latter is simpler and needs to be very fast.
  
  Therefore, we perform per-packet integrity and privacy protection in the
  kernel, but leave the initial context establishment to userspace.  We
  need upcalls to request userspace to perform context establishment.
  
  NFS Server Legacy Upcall Mechanism
  ----------------------------------
  
  The classic upcall mechanism uses a custom text based upcall mechanism
  to talk to a custom daemon called rpc.svcgssd that is provide by the
  nfs-utils package.
  
  This upcall mechanism has 2 limitations:
  
  A) It can handle tokens that are no bigger than 2KiB
  
  In some Kerberos deployment GSSAPI tokens can be quite big, up and
  beyond 64KiB in size due to various authorization extensions attacked to
  the Kerberos tickets, that needs to be sent through the GSS layer in
  order to perform context establishment.
  
  B) It does not properly handle creds where the user is member of more
  than a few housand groups (the current hard limit in the kernel is 65K
  groups) due to limitation on the size of the buffer that can be send
  back to the kernel (4KiB).
  
  NFS Server New RPC Upcall Mechanism
  -----------------------------------
  
  The newer upcall mechanism uses RPC over a unix socket to a daemon
  called gss-proxy, implemented by a userspace program called Gssproxy.
  
  The gss_proxy RPC protocol is currently documented here:
  
  	https://fedorahosted.org/gss-proxy/wiki/ProtocolDocumentation
  
  This upcall mechanism uses the kernel rpc client and connects to the gssproxy
  userspace program over a regular unix socket. The gssproxy protocol does not
  suffer from the size limitations of the legacy protocol.
  
  Negotiating Upcall Mechanisms
  -----------------------------
  
  To provide backward compatibility, the kernel defaults to using the
  legacy mechanism.  To switch to the new mechanism, gss-proxy must bind
  to /var/run/gssproxy.sock and then write "1" to
  /proc/net/rpc/use-gss-proxy.  If gss-proxy dies, it must repeat both
  steps.
  
  Once the upcall mechanism is chosen, it cannot be changed.  To prevent
  locking into the legacy mechanisms, the above steps must be performed
  before starting nfsd.  Whoever starts nfsd can guarantee this by reading
  from /proc/net/rpc/use-gss-proxy and checking that it contains a
  "1"--the read will block until gss-proxy has done its write to the file.