[linux-cifs-client] Kerberos5 support in cifs pathset [PATCH:
4/4] userspace utility for creating security blob and getting session
key
simo
idra at samba.org
Fri Oct 26 12:13:27 GMT 2007
On Fri, 2007-10-26 at 14:04 +0400, Q (Igor Mammedov) wrote:
> simo wrote:
> > Have you already thought how to find the right credentials here ?
>
> It takes first TGT from default kerberos cache file. We don't have
> direct means to select what TGT to use for TGS, I could suggest that we
> can use UID of the user calling 'mount' utility, to decide whose krb5
> cache to use (assuming that the most users have only one TGT).
> For hands off cache initialization we could use keytab files.The proper
> place for this could be in mount.cifs. For example we specify sec='krb5'
> and credentials option with keytab file or user/password and mount.cifs
> utility initializes cache with TGT.
I should have explained that we plan to allow a new session setup every
time a new uid walks a mount point. We already have the uid available
the real problem is that the best I could think so far is to try and see
if /tmp/krbcc_<uid> exist and try with that.
> Recently I've played with mounting using krb5 auth as ordinary user and
> have patch to cifs_spnego.c/and mine kernel patch that allows to use
> right cache depending on the calling user.
Good.
> > Do you know if the sesskey is always guaranteed to be a fixed length ?
>
> There is no guaranties that sesskey length be fixed in the future.
> However, preliminary reading on this topic reveals that often used
> ciphers are DES/RC4-HMAC (MS-Preferred)/3DES/AES and maximum key length
> of them is for AES 256bits.
Ok, so maybe we should take a safe approach kernel side and allow for
variable length keys?
Simo.
--
Simo Sorce
Samba Team GPL Compliance Officer <simo at samba.org>
Senior Software Engineer at Red Hat Inc. <ssorce at redhat.com>
More information about the linux-cifs-client
mailing list