提交 4580a92d 编写于 作者: C Chuck Lever 提交者: Trond Myklebust

NFS: Use server-recommended security flavor by default (NFSv3)

Since commit ec88f28d in 2009, checking if the user-specified flavor
is in the server's flavor list has been the source of a few
noticeable regressions (now fixed), but there is one that is still
vexing.

An NFS server can list AUTH_NULL in its flavor list, which suggests
a client should try to mount the server with the flavor of the
client's choice, but the server will squash all accesses.  In some
cases, our client fails to mount a server because of this check,
when the mount could have proceeded successfully.

Skip this check if the user has specified "sec=" on the mount
command line.  But do consult the server-provided flavor list to
choose a security flavor if no sec= option is specified on the mount
command.

If a server lists Kerberos pseudoflavors before "sys" in its export
options, our client now chooses Kerberos over AUTH_UNIX for mount
points, when no security flavor is specified by the mount command.
This could be surprising to some administrators or users, who would
then need to have Kerberos credentials to access the export.

Or, a client administrator may not have enabled rpc.gssd.  In this
case, auth_rpcgss.ko might still be loadable, which is enough for
the new logic to choose Kerberos over AUTH_UNIX.  But the mount
would fail since no GSS context can be created without rpc.gssd
running.

To retain the use of AUTH_UNIX by default:

  o  The server administrator can ensure that "sys" is listed before
     Kerberos flavors in its export security options (see
     exports(5)),

  o  The client administrator can explicitly specify "sec=sys" on
     its mount command line (see nfs(5)),

  o  The client administrator can use "Sec=sys" in an appropriate
     section of /etc/nfsmount.conf (see nfsmount.conf(5)), or

  o  The client administrator can blacklist auth_rpcgss.ko.
Signed-off-by: NChuck Lever <chuck.lever@oracle.com>
Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
上级 1c74a244
...@@ -252,6 +252,8 @@ struct dentry *nfs4_try_mount(int flags, const char *dev_name, ...@@ -252,6 +252,8 @@ struct dentry *nfs4_try_mount(int flags, const char *dev_name,
dfprintk(MOUNT, "--> nfs4_try_mount()\n"); dfprintk(MOUNT, "--> nfs4_try_mount()\n");
if (data->auth_flavors[0] == RPC_AUTH_MAXFLAVOR)
data->auth_flavors[0] = RPC_AUTH_UNIX;
export_path = data->nfs_server.export_path; export_path = data->nfs_server.export_path;
data->nfs_server.export_path = "/"; data->nfs_server.export_path = "/";
root_mnt = nfs_do_root_mount(&nfs4_remote_fs_type, flags, mount_info, root_mnt = nfs_do_root_mount(&nfs4_remote_fs_type, flags, mount_info,
......
...@@ -917,7 +917,7 @@ static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void) ...@@ -917,7 +917,7 @@ static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
data->mount_server.port = NFS_UNSPEC_PORT; data->mount_server.port = NFS_UNSPEC_PORT;
data->nfs_server.port = NFS_UNSPEC_PORT; data->nfs_server.port = NFS_UNSPEC_PORT;
data->nfs_server.protocol = XPRT_TRANSPORT_TCP; data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
data->auth_flavors[0] = RPC_AUTH_UNIX; data->auth_flavors[0] = RPC_AUTH_MAXFLAVOR;
data->auth_flavor_len = 1; data->auth_flavor_len = 1;
data->minorversion = 0; data->minorversion = 0;
data->need_mount = true; data->need_mount = true;
...@@ -1605,49 +1605,57 @@ static int nfs_parse_mount_options(char *raw, ...@@ -1605,49 +1605,57 @@ static int nfs_parse_mount_options(char *raw,
} }
/* /*
* Match the requested auth flavors with the list returned by * Select a security flavor for this mount. The selected flavor
* the server. Returns zero and sets the mount's authentication * is planted in args->auth_flavors[0].
* flavor on success; returns -EACCES if server does not support
* the requested flavor.
*/ */
static int nfs_walk_authlist(struct nfs_parsed_mount_data *args, static void nfs_select_flavor(struct nfs_parsed_mount_data *args,
struct nfs_mount_request *request) struct nfs_mount_request *request)
{ {
unsigned int i, j, server_authlist_len = *(request->auth_flav_len); unsigned int i, count = *(request->auth_flav_len);
rpc_authflavor_t flavor;
if (args->auth_flavors[0] != RPC_AUTH_MAXFLAVOR)
goto out;
/*
* The NFSv2 MNT operation does not return a flavor list.
*/
if (args->mount_server.version != NFS_MNT3_VERSION)
goto out_default;
/* /*
* Certain releases of Linux's mountd return an empty * Certain releases of Linux's mountd return an empty
* flavor list. To prevent behavioral regression with * flavor list in some cases.
* these servers (ie. rejecting mounts that used to
* succeed), revert to pre-2.6.32 behavior (no checking)
* if the returned flavor list is empty.
*/ */
if (server_authlist_len == 0) if (count == 0)
return 0; goto out_default;
/* /*
* We avoid sophisticated negotiating here, as there are
* plenty of cases where we can get it wrong, providing
* either too little or too much security.
*
* RFC 2623, section 2.7 suggests we SHOULD prefer the * RFC 2623, section 2.7 suggests we SHOULD prefer the
* flavor listed first. However, some servers list * flavor listed first. However, some servers list
* AUTH_NULL first. Our caller plants AUTH_SYS, the * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
* preferred default, in args->auth_flavors[0] if user
* didn't specify sec= mount option.
*/ */
for (i = 0; i < args->auth_flavor_len; i++) for (i = 0; i < count; i++) {
for (j = 0; j < server_authlist_len; j++) struct rpcsec_gss_info info;
if (args->auth_flavors[i] == request->auth_flavs[j]) {
dfprintk(MOUNT, "NFS: using auth flavor %d\n", flavor = request->auth_flavs[i];
request->auth_flavs[j]); switch (flavor) {
args->auth_flavors[0] = request->auth_flavs[j]; case RPC_AUTH_UNIX:
return 0; goto out_set;
case RPC_AUTH_NULL:
continue;
default:
if (rpcauth_get_gssinfo(flavor, &info) == 0)
goto out_set;
}
} }
dfprintk(MOUNT, "NFS: server does not support requested auth flavor\n"); out_default:
nfs_umount(request); flavor = RPC_AUTH_UNIX;
return -EACCES; out_set:
args->auth_flavors[0] = flavor;
out:
dfprintk(MOUNT, "NFS: using auth flavor %d\n", args->auth_flavors[0]);
} }
/* /*
...@@ -1710,12 +1718,8 @@ static int nfs_request_mount(struct nfs_parsed_mount_data *args, ...@@ -1710,12 +1718,8 @@ static int nfs_request_mount(struct nfs_parsed_mount_data *args,
return status; return status;
} }
/* nfs_select_flavor(args, &request);
* MNTv1 (NFSv2) does not support auth flavor negotiation.
*/
if (args->mount_server.version != NFS_MNT3_VERSION)
return 0; return 0;
return nfs_walk_authlist(args, &request);
} }
struct dentry *nfs_try_mount(int flags, const char *dev_name, struct dentry *nfs_try_mount(int flags, const char *dev_name,
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册