On Jul 12, 2013, at 2:43 PM, Ondrej Valousek <ovalou...@vendavo.com> wrote:

> Just back to the Kerberized NFS. Any solution to RH bugzilla #786463 on the 
> horizon yet?
> Expiring tickets will render the whole concept unusable otherwise.
> 
> Anyone?

Ask on linux-...@vger.kernel.org.  I know upstream is working on this problem.

> O.
> 
> 
> Odesláno ze Samsung Mobile
> 
> 
> 
> -------- Původní zpráva --------
> Od: Ondrej Valousek <ovalou...@vendavo.com> 
> Datum: 
> Komu: and...@wasielewski.co.uk,freeipa-users@redhat.com 
> Předmět: RE: [Freeipa-users] Problem with Kerberised NFS mount 
> 
> 
> Hard to say.
> In general, when dealing w/ nfs & kerberos, I would advise to:
> ● Upgrade to the latest fedora
> ● Make sure idmapper is configured and working fine
> ● Limit krb enctypes to 3des-cbc-crc (not sure if your kernel can handle aes 
> keys).
> Ondrej
> 
> 
> Odesláno ze Samsung Mobile
> 
> 
> 
> -------- Původní zpráva --------
> Od: Andrew Wasielewski <and...@wasielewski.co.uk> 
> Datum: 
> Komu: freeipa-users@redhat.com 
> Předmět: [Freeipa-users] Problem with Kerberised NFS mount 
> 
> 
> 
> Hello everyone,
> 
>  
> 
> I am setting up FreeIPA for a small home network. However I have a problem 
> mounting NFS shares with Kerberos enables - see syslog output below.
> 
>  
> 
> My NFS, KDC and FreeIPA servers are all on the same host. I am running the 
> NFS mount directly on the server, which has local firewall disabled - I get 
> the same outcome on a remote client, but this surely eliminates any network 
> issues.
> 
>  
> 
> These are my NFS exports, which are visible both locally and remotely with 
> "showmount -e":-
> 
>  
> 
> [root@server ~]# exportfs -av
> 
> exporting gss/krb5:/home
> 
> exporting gss/krb5i:/home
> 
> exporting gss/krb5p:/home
> 
>  
> 
> The command "mount -t nfs4 -o sec=krb5 server.wasielewski.co.uk:/home 
> /mnt/test_mnt" hangs indefinitely. However without the Kerberos export 
> options the NFS share can be mounted both locally and remotely without 
> problem.
> 
>  
> 
> I read in a post that the "serializing key with enctype 18 and size 32" entry 
> in syslog means I am trying to use an unsupported key with AES256 encryption 
> (I can find very little about enctype numbers though); however I appear to 
> have an AES256 service principal:
> 
>  
> 
> [root@server etc]# ktutil
> 
> ktutil: rkt /etc/krb5.keytab
> 
> ktutil: list -e
> 
> slot KVNO Principal
> 
> ---- ---- 
> ---------------------------------------------------------------------
> 
> 1 2 host/server.wasielewski.co...@wasielewski.co.uk (aes256-cts-hmac-sha1-96) 
> 
> 2 2 host/server.wasielewski.co...@wasielewski.co.uk (aes128-cts-hmac-sha1-96) 
> 
> 3 2 host/server.wasielewski.co...@wasielewski.co.uk (des3-cbc-sha1) 
> 
> 4 2 host/server.wasielewski.co...@wasielewski.co.uk (arcfour-hmac) 
> 
> 5 5 nfs/server.wasielewski.co...@wasielewski.co.uk (aes256-cts-hmac-sha1-96) 
> 
>  
> 
> My versions are:
> 
> Fedora 17 (kernel 3.8.13-100.fc17.x86_64)
> 
> FreeIPA 2.2.2
> 
> krb5 1.10.2
> 
> nfs-utils 1.2.6
> 
> I have read of this issue being fixed by downgrading nfs-utils to 1.2.5; 
> however that is not possible due to conflict with systemd. Everything else 
> appears to work OK e.g. domain login, automap etc. When I try to mount the 
> Kerberised NFS share, *nothing* appears
>  in /var/log/krb5kdc.log
> 
>  
> 
> Here is my syslog output when attempt the mount:
> 
>  
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: dir_notify_handler: sig 37 si 
> 0x7fffe59b94f0 data 0x7fffe59b93c0
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: handling gssd upcall 
> (/var/lib/nfs/rpc_pipefs/nfs/clnt48)
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: handle_gssd_upcall: 'mech=krb5 uid=0 
> enctypes=18,17,16,23,3,1,2 '
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: handling krb5 upcall 
> (/var/lib/nfs/rpc_pipefs/nfs/clnt48)
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: process_krb5_upcall: service is 
> '<null>'
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: Full hostname for 
> 'server.wasielewski.co.uk' is 'server.wasielewski.co.uk'
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: Full hostname for 
> 'server.wasielewski.co.uk' is 'server.wasielewski.co.uk'
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: No key table entry found for 
> SERVER.WASIELEWSKI.CO.UK$@WASIELEWSKI.CO.UK while getting keytab entry for 
> 'SERVER.WASIELEWSKI.CO.UK$@WASIELEWSKI.CO.UK'
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: No key table entry found for 
> root/server.wasielewski.co...@wasielewski.co.uk while getting keytab entry 
> for 'root/server.wasielewski.co...@wasielewski.co.uk'
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: Success getting keytab entry for 
> 'nfs/server.wasielewski.co...@wasielewski.co.uk'
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: INFO: Credentials in CC 
> 'FILE:/tmp/krb5cc_machine_WASIELEWSKI.CO.UK' are good until 1373659035
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: INFO: Credentials in CC 
> 'FILE:/tmp/krb5cc_machine_WASIELEWSKI.CO.UK' are good until 1373659035
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: using 
> FILE:/tmp/krb5cc_machine_WASIELEWSKI.CO.UK as credentials cache for machine 
> creds
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: using environment variable to select 
> krb5 ccache FILE:/tmp/krb5cc_machine_WASIELEWSKI.CO.UK
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: creating context using fsuid 0 
> (save_uid 0)
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: creating tcp client for server 
> server.wasielewski.co.uk
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: DEBUG: port already set to 2049
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: creating context with server 
> n...@server.wasielewski.co.uk
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: leaving poll
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: handling null request
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: svcgssd_limit_krb5_enctypes: 
> Calling gss_set_allowable_enctypes with 7 enctypes from the kernel
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: sname = 
> nfs/server.wasielewski.co...@wasielewski.co.uk
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: DEBUG: serialize_krb5_ctx: lucid 
> version!
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: prepare_krb5_rfc4121_buffer: 
> protocol 1
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: prepare_krb5_rfc4121_buffer: 
> serializing key with enctype 18 and size 32
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: doing downcall
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: mech: krb5, hndl len: 4, ctx len 
> 52, timeout: 1373659035 (71045 from now), clnt: 
> n...@server.wasielewski.co.uk, uid: -1, gid: -1, num aux grps: 0:
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: sending null reply
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: writing message: \x 
> \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
>  1373588050 0 0 \x73000000 
> \x60819906092a864886f71201020202006f8189308186a003020105a10302010fa27a3078a003020112a271046f87a21e99d0907eadcd179fef73a8a4b38cb8180566d1f2cea453e28b7334b0648a543c3f2588a79f516f7d2238e1cca4ca5ec290b2a5d8b9d570ba47fdc20a2d36bc54928c3addba9b68867028c9adb157e487cc0951bc1270f9f1b96e643bb614589411cc923a9fbe5654beb20d85
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: finished handling null request
> 
> Jul 12 01:13:10 server rpc.svcgssd[32135]: entering poll
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: DEBUG: serialize_krb5_ctx: lucid 
> version!
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: prepare_krb5_rfc4121_buffer: protocol 
> 1
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: prepare_krb5_rfc4121_buffer: 
> serializing key with enctype 18 and size 32
> 
> Jul 12 01:13:10 server rpc.gssd[31628]: doing downcall
> 
>  
> 
> Any advice is much appreciated.
> 
>  
> 
> Andrew
> 
>  
> 
>  
> 
>  
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-users@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users

-- 
Chuck Lever
chuck[dot]lever[at]oracle[dot]com




_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to