Typically you create a key table. Most installations have one for root, 
/etc/krb5.keytab. But you can create one for any user. Depending upon how your 
kerberos is set up, you’d typically use kadmin to create the key table. 

At that point you can do "kinit -k -t KEYTABLE” to get a ticket. But if there’s 
any chance the service is going to run longer than the credential lifetime 
(I.e. you need credentials to be renews), you’d normally run the program under 
k5start. It will get a ticket, run the service, and renew the ticket when 
necessary.

 However assuming your system runs gssproxy, and the service uses gssapi, you 
can have gssproxy get the ticket for you. The configuration file points to the 
key table, so in the end it does the same thing, just more elegantly.

> On Aug 2, 2019, at 6:24 PM, Laura Smith <n5d9xq3ti233xiyif...@protonmail.ch> 
> wrote:
> 
> I have a NFS share which I am mounting on  as follows in the fstab:
> 
> foo.example.com:/srv/share/foo /mnt/foo nfs4 
> defaults,sec=krb5p,noexec,nosuid,_netdev,auto 0 0
> 
> 
> On the server, exports reads as follows:
> /srv/share/backups/foo 
> foo.example.com(rw,sync,sec=krb5p,all_squash,subtree_check,anonuid=473,anongid=474)
> 
> 
> The NFS share mounts perfectly on the client.
> Root can read/write/delete from the share perfectly.
> 
> But a "standard" user can't do anything, e.g.
> 
> 
> /mnt$ ls
> ls: cannot access 'foo': Permission denied
> 
> 
> The purpose of this share is to, for example, allow system services running 
> as lesser users to save files. Therefore non-root access is key.
> 
> So what is the correct way to allow system/daemon service users to get a 
> kerberos ticket to gain access to the NFS share (which I assume is the 
> underlying problem here ?)
> 
> Obviously a daemon cannot be expected to do a normal kerberos login.
> 
> Or are there better ways to mount a NFS share at system level for all users 
> to acccess ?
> 
> I'm guessing more than one person here has come across the problem.
> 
> ________________________________________________
> Kerberos mailing list           Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to