|rpc.gssd(8)||System Manager's Manual||rpc.gssd(8)|
Before exchanging RPC requests using RPCSEC_GSS, an RPC client must establish a GSS security context. A security context is shared state on each end of a network transport that enables GSS-API security services.
Security contexts are established using security credentials. A credential grants temporary access to a secure network service, much as a railway ticket grants temporary access to use a rail service.
A user typically obtains a credential by providing a password to the kinit(1) command, or via a PAM library at login time. A credential acquired with a user principal is known as a user credential (see kerberos(1) for more on principals).
For certain operations, a credential is required which represents no user, is otherwise unprivileged, and is always available. This is referred to as a machine credential.
Machine credentials are typically established using a service principal, whose encrypted password, called its key, is stored in a file, called a keytab, to avoid requiring a user prompt. A machine credential effectively does not expire because the system can renew it as needed without user intervention.
Once obtained, credentials are typically stored in local temporary files with well-known pathnames.
To interact with an NFS server on behalf of a particular Kerberos-authenticated user, the Linux kernel RPC client requests that rpc.gssd initialize a security context with the credential in that user's credential file.
Typically, credential files are placed in /tmp. However, rpc.gssd can search for credential files in more than one directory. See the description of the -d option for details.
rpc.gssd searches the local system's keytab for a principal and key to use to establish the machine credential. By default, rpc.gssd assumes the file /etc/krb5.keytab contains principals and keys that can be used to obtain machine credentials.
rpc.gssd searches in the following order for a principal to use. The first matching credential is used. For the search, <hostname> and <REALM> are replaced with the local system's hostname and Kerberos realm.
<HOSTNAME>$@<REALM> root/<hostname>@<REALM> nfs/<hostname>@<REALM> host/<hostname>@<REALM> root/<anyname>@<REALM> nfs/<anyname>@<REALM> host/<anyname>@<REALM>
The <anyname> entries match on the service name and realm, but ignore the hostname. These can be used if a principal matching the local host's name is not found.
Note that the first principal in the search order is a user principal that enables Kerberized NFS when the local system is joined to an Active Directory domain using Samba. A password for this principal must be provided in the local system's keytab.
You can specify another keytab by using the -k option if /etc/krb5.keytab does not exist or does not provide one of these principals.
Specify the -n option when starting rpc.gssd if you'd like to force the root user to obtain a user credential rather than use the local system's machine credential.
When -n is specified, the kernel continues to request a GSS context established with a machine credential for NFSv4 operations, such as SETCLIENTID or RENEW, that manage state. If rpc.gssd cannot obtain a machine credential (say, the local system has no keytab), NFSv4 operations that require machine credentials will fail.
These encryption types are stronger than legacy single-DES encryption types. To interoperate in environments where servers support only weak encryption types, you can restrict your client to use only single-DES encryption types by specifying the -l option when starting rpc.gssd.
- The server name passed to GSSAPI for authentication is normally the name
exactly as requested. e.g. for NFS it is the server name in the
"servername:/path" mount request. Only if this servername
appears to be an IP address (IPv4 or IPv6) or an unqualified name (no
dots) will a reverse DNS lookup will be performed to get the canoncial
If -D is present, a reverse DNS lookup will always be used, even if the server name looks like a canonical name. So it is needed if partially qualified, or non canonical names are regularly used.
Using -D can introduce a security vulnerability, so it is recommended that -D not be used, and that canonical names always be used when requesting services.
- Runs rpc.gssd in the foreground and sends output to stderr (as opposed to syslogd)
- When specified, UID 0 is forced to obtain user credentials which are used instead of the local system's machine credentials.
- -k keytab
- Tells rpc.gssd to use the keys found in keytab to obtain machine credentials. The default value is /etc/krb5.keytab.
- When specified, restricts rpc.gssd to sessions to weak encryption types such as des-cbc-crc. This option is available only when the local system's Kerberos library supports settable encryption types.
- -p path
- Tells rpc.gssd where to look for the rpc_pipefs filesystem. The default value is /var/lib/nfs/rpc_pipefs.
- -d search-path
- This option specifies a colon separated list of directories that rpc.gssd searches for credential files. The default value is /tmp:/run/user/%U. The literal sequence "%U" can be specified to substitue the UID of the user for whom credentials are being searched.
- By default, machine credentials are stored in files in the first directory in the credential directory search path (see the -d option). When -M is set, rpc.gssd stores machine credentials in memory instead.
- Increases the verbosity of the output (can be specified multiple times).
- If the RPCSEC_GSS library supports setting debug level, increases the verbosity of the output (can be specified multiple times).
- -R realm
- Kerberos tickets from this realm will be preferred when scanning available credentials cache files to be used to create a context. By default, the default realm, as configured in the Kerberos configuration file, is preferred.
- -t timeout
- Timeout, in seconds, for kernel GSS contexts. This option allows you to force new kernel contexts to be negotiated after timeout seconds, which allows changing Kerberos tickets and identities frequently. The default is no explicit timeout, which means the kernel context will live the lifetime of the Kerberos service ticket used in its creation.
- -T timeout
- Timeout, in seconds, to create an RPC connection with a server while establishing an authenticated gss context for a user. The default timeout is set to 5 seconds. If you get messages like "WARNING: can't create tcp rpc_clnt to server %servername% for user with uid %uid%: RPC: Remote system error - Connection timed out", you should consider an increase of this timeout.
- A Boolean flag equivalent to -M.
- A Boolean flag. Setting to false is equivalent to giving the -n flag.
- Setting to false is equivalent to providing the -D flag.
- Equivalent to -l.
- Equivalent to -T.
- Equivalent to -t.
- Equivalent to -k.
- Equivalent to -d.
- Equivalent to -R.
In addtion, the following value is recognized from the [general] section:
- Equivalent to -p.
Andy Adamson <firstname.lastname@example.org>
Marius Aamodt Eriksen <email@example.com>
J. Bruce Fields <firstname.lastname@example.org>
|20 Feb 2013|