Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752585AbYJNOs2 (ORCPT ); Tue, 14 Oct 2008 10:48:28 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751028AbYJNOsR (ORCPT ); Tue, 14 Oct 2008 10:48:17 -0400 Received: from zombie2.ncsc.mil ([144.51.88.133]:62398 "EHLO zombie2.ncsc.mil" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750878AbYJNOsQ (ORCPT ); Tue, 14 Oct 2008 10:48:16 -0400 Subject: Re: [Labeled-nfs] [RFC v3] Security Label Support for NFSv4 From: "David P. Quigley" To: Trond Myklebust Cc: "Matthew N. Dodd" , James Morris , labeled-nfs@linux-nfs.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, viro@zeniv.linux.org.uk, selinux@tycho.nsa.gov In-Reply-To: <1223990448.8907.1.camel@localhost> References: <1222707986-26606-1-git-send-email-dpquigl@tycho.nsa.gov> <48F400DD.50905@sparta.com> <1223990448.8907.1.camel@localhost> Content-Type: text/plain Date: Tue, 14 Oct 2008 10:28:44 -0400 Message-Id: <1223994524.3791.57.camel@moss-terrapins.epoch.ncsc.mil> Mime-Version: 1.0 X-Mailer: Evolution 2.22.3.1 (2.22.3.1-1.fc9) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1753 Lines: 43 On Tue, 2008-10-14 at 09:20 -0400, Trond Myklebust wrote: > On Mon, 2008-10-13 at 22:15 -0400, Matthew N. Dodd wrote: > > James Morris wrote: > > > On Mon, 29 Sep 2008, David P. Quigley wrote: > > > > > >> * New security flavor (auth_seclabel) to transport process label to > > >> server. This is a derivative of auth_unix so it does not support > > >> kerberos which has its own issues that need to be dealt with. > > > > > > This is a problem, as discussed last year: > > > > > > http://linux-nfs.org/pipermail/labeled-nfs/2007-November/000110.html > > > > > > We can't require the use of a new auth flavor which is incompatible with > > > auth_gss. > > > > auth_seclabel demonstrates the flavor independent changes required for > > any RPC layer process label transport. A GSS solution is currently > > under discussion. > > Right, but I'm not particularly interested in merging "demonstration" > code that might end up requiring permanent support. I'd very much like > to see all of this get further through the IETF process before we talk > about merging into mainline. > > Cheers > Trond Hello, Nico seems to have come up with a reasonable solution for this problem we just need to sit down and draw up a document for it. Apparently he already created a mechanism in rpcsec_gss for allowing you to bind the rpc session to more than just the normal credentials. Once we finalize this and get it into a draft we will work on implementing it in the rpcsec_gss auth flavor. Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/