Just a reminder I am subscribed to the Debian User list. Please only
respond to the list and not me as well.

On Thu, 2007-03-22 at 18:56 +0200, Juha Jäykkä wrote:
> > I've been reading quite a lot on NFSv(234) and I came across a bug in
> > Debian and other distros that when all needed daemons (lockd, nfsd,
> > idmapd, etc...) You still may have to use "kinit" to refresh your ticket
> > after mounting the nfs share.
> 
> This sounds like The Thing: after being away from the computer
> for a couple of hours, everything works again. The only difference being
> Xscreensaver which refreshed my ticket for me after asking my password to
> unlock the screen when I came back...
> 
> I'll look into it more closely, but I *am* confused: using sec=krb5
> should not require anything from the user (kerberos-wise) and I *DID*
> have a valid ticket all along. Is there some strange stuff happening if
> *my* ticket is older than the host's ticket?
You have to remember, Kerberos works on separate levels with regards to
host and user. An NFS mount for the machine to be able to mount the NFS
export and requiring a ticket, does not give the users access to the
home directories. It allows the machine to properly mount the export
where ever it is being mounted.

What the next thing with user level access, you have to have a proper
ticket to access your data over the NFS mount. So a newer (than the
hosts you are on) ticket would typically be required.

One other thing that absolutely needs to be, time on the machines and
the keyserver(s) have to be in-sync.

> Why would the relative ages of the tickets matter?

Think about "temporary" files being abuse in exploits. With a temp file
reaper, you could be opening up your machine or a user to a carefully
made exploit.

IOW, the user suspends his/her work, the files are in /tmp or /var/tmp
etc... the user doesn't come back for a week or so. He/she decides to
keep going where they left off... meanwhile the file has been cleared
out by a temp file process. Then a user replaces the file name and so on
with a carefully built exploit script/file for the user to open up.
Yeouch.

Yes, kerberos is all about proper tickets with proper ages and expiry
and ticket types. There are SO many things that can go wrong and lock
out a user from his/her data it isn't even funny. But that forces things
to setup proper.

Imagine if the machine had to be rebooted after you got your last
ticket, which had a lifetime longer than the reboot of this machine. You
could be using prior authentication from a completely different ticket
server that might not even be used or known any more. But still hashes
properly. (yeah a stretch, but still).

I had problems when doing Active Directory as the keyserver and man did
it suck.

> Lastly, is this worth a bug in DBTS or were you specifically referring
> to a DBTS bug, the number of which you could not recall?

I cannot seem to find anything related to NFSv4 and kerberos in
bugs.debian.org... of course I am still quite fuzzy right now. I guess I
should pay more attention.

I kind of remember it not being a Debian specific problem, but you might
want to put things in verbose logging mode and try to trigger the
problem. Once you do... grab the log files or results from the screen
and submit it pronto. The Debian kernel team is nearing final "release
kernel" status.

The whole gssapi and krb5p stuff is really finicky, but once the errant
things is dealt with it whistles along quite nicely for extended
periods. 
-- 
greg, [EMAIL PROTECTED]

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup

Reply via email to