Package: nfs-kernel-server
Version: 1:1.1.1~git-20070929-1
Severity: wishlist
Tags: patch
Normally you can only connect to NFS using Kerberos using the hostname
of the server. If you have a cluster where the NFS service can
failover between machines, using heartbeat for instance, you would
want to connect to a single address. This does not work with
rpc.svcgssd as it will only authenticate machines connecting to it's
hostname, not another address the machine handles. For instance, if
you have servers nfs1.foo and nfs2.foo, you might want to have an
address nfs.foo that passes between each other.
The following two patches (one for 1.1.1~git-2007092 (sid), and one
for 1.0.10 (etch)) add an option to rpc.svcgssd to specify the
hostname (-h) you will be connecting to it by. They also remove
references to options that rpc.svcgssd does not support.
Ideally, in the long run nfs-utils would provide an option similar to
what recent openssh versions use, and authenticate with any key in the
keytab.
Patch for 1.1.1~git-2007092:
diff -rud nfs-utils-1.1.1~git-20070929/utils/gssd/svcgssd.c
nfs-utils-1.1.1~git-20070929-krb/utils/gssd/svcgssd.c
--- nfs-utils-1.1.1~git-20070929/utils/gssd/svcgssd.c 2007-09-29
09:55:13.000000000 -0300
+++ nfs-utils-1.1.1~git-20070929-krb/utils/gssd/svcgssd.c 2007-11-15
10:43:33.000000000 -0400
@@ -155,7 +155,7 @@
static void
usage(char *progname)
{
- fprintf(stderr, "usage: %s [-n] [-f] [-v] [-r] [-i]\n",
+ fprintf(stderr, "usage: %s [-n] [-f] [-v] [-r] [-i] [-h hostname]\n",
progname);
exit(1);
}
@@ -171,8 +171,9 @@
int opt;
extern char *optarg;
char *progname;
+ char *servicename = NULL;
- while ((opt = getopt(argc, argv, "fivrnp:")) != -1) {
+ while ((opt = getopt(argc, argv, "fivrnh:")) != -1) {
switch (opt) {
case 'f':
fg = 1;
@@ -189,6 +190,12 @@
case 'r':
rpc_verbosity++;
break;
+ case 'h':
+ servicename = calloc(strlen(optarg) +
strlen(GSSD_SERVICE_NAME) + 2, sizeof(char));
+
+ /* GSSAPI needs @ instead of / between service
name and hostname */
+ snprintf(servicename, strlen(optarg) +
strlen(GSSD_SERVICE_NAME) + 2, "[EMAIL PROTECTED]", GSSD_SERVICE_NAME, optarg);
+ break;
default:
usage(argv[0]);
break;
@@ -228,7 +235,10 @@
signal(SIGTERM, sig_die);
signal(SIGHUP, sig_hup);
- if (get_creds && !gssd_acquire_cred(GSSD_SERVICE_NAME)) {
+ if (servicename == NULL)
+ servicename = GSSD_SERVICE_NAME;
+
+ if (get_creds && !gssd_acquire_cred(servicename)) {
printerr(0, "unable to obtain root (machine) credentials\n");
printerr(0, "do you have a keytab entry for "
"nfs/<your.host>@<YOUR.REALM> in "
Only in nfs-utils-1.1.1~git-20070929-krb/utils/gssd: svcgssd.c.orig
diff -rud nfs-utils-1.1.1~git-20070929/utils/gssd/svcgssd.man
nfs-utils-1.1.1~git-20070929-krb/utils/gssd/svcgssd.man
--- nfs-utils-1.1.1~git-20070929/utils/gssd/svcgssd.man 2007-09-29
09:55:13.000000000 -0300
+++ nfs-utils-1.1.1~git-20070929-krb/utils/gssd/svcgssd.man 2007-11-15
10:26:01.000000000 -0400
@@ -6,7 +6,7 @@
.SH NAME
rpc.svcgssd \- server-side rpcsec_gss daemon
.SH SYNOPSIS
-.B "rpc.svcgssd [-v] [-r] [-i] [-f] [-p pipefsdir]"
+.B "rpc.svcgssd [-v] [-r] [-i] [-f] [-h hostname]"
.SH DESCRIPTION
The rpcsec_gss protocol gives a means of using the gss-api generic security
api to provide security for protocols using rpc (in particular, nfs). Before
@@ -35,6 +35,10 @@
.B -i
If the nfsidmap library supports setting debug level,
increases the verbosity of the output (can be specified multiple times).
+.TP
+.B -h hostname
+Specify the hostname to use when looking for the service principal in
+the keytab.
.SH SEE ALSO
.BR rpc.gssd(8),
Patch for 1.0.10:
diff -rud nfs-utils-1.0.10/utils/gssd/svcgssd.c
nfs-utils-1.0.10-krb/utils/gssd/svcgssd.c
--- nfs-utils-1.0.10/utils/gssd/svcgssd.c 2006-08-07 03:40:50.000000000
-0300
+++ nfs-utils-1.0.10-krb/utils/gssd/svcgssd.c 2007-11-15 10:41:58.000000000
-0400
@@ -154,7 +154,7 @@
static void
usage(char *progname)
{
- fprintf(stderr, "usage: %s [-n] [-f] [-v] [-r]\n",
+ fprintf(stderr, "usage: %s [-n] [-f] [-v] [-r] [-h hostname]\n",
progname);
exit(1);
}
@@ -169,8 +169,9 @@
int opt;
extern char *optarg;
char *progname;
+ char *servicename = NULL;
- while ((opt = getopt(argc, argv, "fvrnp:")) != -1) {
+ while ((opt = getopt(argc, argv, "fvrnh:")) != -1) {
switch (opt) {
case 'f':
fg = 1;
@@ -184,6 +185,12 @@
case 'r':
rpc_verbosity++;
break;
+ case 'h':
+ servicename = calloc(strlen(optarg) +
strlen(GSSD_SERVICE_NAME) + 2, sizeof(char));
+
+ /* GSSAPI needs @ instead of / between service
name and hostname */
+ snprintf(servicename, strlen(optarg) +
strlen(GSSD_SERVICE_NAME) + 2, "[EMAIL PROTECTED]", GSSD_SERVICE_NAME, optarg);
+ break;
default:
usage(argv[0]);
break;
@@ -216,7 +223,10 @@
signal(SIGTERM, sig_die);
signal(SIGHUP, sig_hup);
- if (get_creds && !gssd_acquire_cred(GSSD_SERVICE_NAME)) {
+ if (servicename == NULL)
+ servicename = GSSD_SERVICE_NAME;
+
+ if (get_creds && !gssd_acquire_cred(servicename)) {
printerr(0, "unable to obtain root (machine) credentials\n");
printerr(0, "do you have a keytab entry for "
"nfs/<your.host>@<YOUR.REALM> in "
diff -rud nfs-utils-1.0.10/utils/gssd/svcgssd.man
nfs-utils-1.0.10-krb/utils/gssd/svcgssd.man
--- nfs-utils-1.0.10/utils/gssd/svcgssd.man 2006-08-07 03:40:50.000000000
-0300
+++ nfs-utils-1.0.10-krb/utils/gssd/svcgssd.man 2007-11-15 10:27:42.000000000
-0400
@@ -6,7 +6,7 @@
.SH NAME
rpc.svcgssd \- server-side rpcsec_gss daemon
.SH SYNOPSIS
-.B "rpc.svcgssd [-v] [-r] [-f] [-p pipefsdir]"
+.B "rpc.svcgssd [-v] [-r] [-f] [-h hostname]"
.SH DESCRIPTION
The rpcsec_gss protocol gives a means of using the gss-api generic security
api to provide security for protocols using rpc (in particular, nfs). Before
@@ -31,6 +31,10 @@
.B -r
If the rpcsec_gss library supports setting debug level,
increases the verbosity of the output (can be specified multiple times).
+.TP
+.B -h hostname
+Specify the hostname to use when looking for the service principal in
+the keytab.
.SH SEE ALSO
.BR rpc.gssd(8),
-- System Information:
Debian Release: lenny/sid
APT prefers testing
APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Kernel: Linux 2.6.22-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages nfs-kernel-server depends on:
ii libblkid1 1.40.2-1 block device id library
ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries
ii libcomerr2 1.40.2-1 common error description library
ii libgssglue1 0.1-1 mechanism-switch gssapi library
ii libkrb53 1.6.dfsg.3~beta1-2 MIT Kerberos runtime libraries
ii libnfsidmap2 0.20-0 An nfs idmapping library
ii librpcsecgss3 0.17-1 allows secure rpc communication us
ii libwrap0 7.6.dbs-14 Wietse Venema's TCP wrappers libra
ii lsb-base 3.1-24 Linux Standard Base 3.1 init scrip
ii nfs-common 1:1.1.1~git-20070929-1 NFS support files common to client
ii ucf 3.003 Update Configuration File: preserv
nfs-kernel-server recommends no packages.
-- no debconf information
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]