Guillaume Rousse
2010-04-22 06:15:21 UTC
Hello list.
I've been using kerberized NFS with NetApp filer without
kerberos-specific troubles so far. However, I'm currently trying to
setup a Linux kerberized server for the first time, and I'm facing
Kerberos issues.
First, I had troubles with the des-cbc-crc enctype limitation. When the
NFS server is a Netapp filer, I don't need to take special care for the
client keytab file content, everything works as expected. However, when
the NFS server is a linux box, if the client keytab contains all
available enctypes for the client principal, the client always request
an unsupported enctype for the TGS:
2010-04-21T23:11:46 TGS-REQ nfs/beria.zarb.home at ZARB.HOME from
IPv4:192.168.0.7 for nfs/loubianka.zarb.home at ZARB.HOME [canonicalize]
2010-04-21T23:11:46 Server (nfs/loubianka.zarb.home at ZARB.HOME) has no
support for etypes
2010-04-21T23:11:46 Failed building TGS-REP to IPv4:192.168.0.7
2010-04-21T23:11:46 sending 106 bytes to IPv4:192.168.0.7
I guess this is because the NetApp filer advertise itself as not
supporting anything else as DES, whereas the Linux server advertise
itself as supporting AES. Am I correct ?
Second, even when restricting client keytab to des-cbc-crc enctype, I
have an unexpected failure getting a TGS. On client side, I have the
following error:
[root at beria ~]# mount -t nfs -o sec=krb5 loubianka:/ /mnt/filer/
mount.nfs: access denied by server while mounting loubianka:/
it as expected:
2010-04-21T23:27:43 AS-REQ nfs/beria.zarb.home at ZARB.HOME from
IPv4:192.168.0.7 for krbtgt/ZARB.HOME at ZARB.HOME
2010-04-21T23:27:43 No preauth found, returning PREAUTH-REQUIRED --
nfs/beria.zarb.home at ZARB.HOME
2010-04-21T23:27:43 sending 285 bytes to IPv4:192.168.0.7
The client logs seems to corroborate this hypothesis:
Apr 21 23:42:33 beria rpc.gssd[8727]: Full hostname for
'loubianka.zarb.home' is 'loubianka.zarb.home'
Apr 21 23:42:33 beria rpc.gssd[8727]: Full hostname for
'beria.zarb.home' is 'beria.zarb.home'
Apr 21 23:42:33 beria rpc.gssd[8727]: Key table entry not found while
getting keytab entry for 'root/beria.zarb.home at ZARB.HOME'
Apr 21 23:42:33 beria rpc.gssd[8727]: Success getting keytab entry for
'nfs/beria.zarb.home at ZARB.HOME'
Apr 21 23:42:34 beria rpc.gssd[8727]: WARNING: Key table entry not found
while getting initial ticket for principal
'nfs/beria.zarb.home at ZARB.HOME' using keytab 'FILE:/etc/krb5.keytab'
Apr 21 23:42:34 beria rpc.gssd[8727]: ERROR: No credentials found for
connection to server loubianka.zarb.home
Apr 21 23:42:34 beria rpc.gssd[8727]: doing error downcall
Apr 21 23:42:34 beria kernel: : nfs4_get_root: getroot error = 13
I couldn't exclude this specific principal from pre-auth requirement for
further testing.
Testing without krb5 security works OK. Other Kerberozed applications
(OpenLDAP, Apache) works OK. My KDC is heimdal 1.3.2, but nfs-utils is
linked against MIT kerberos 1.6.3. All the machines have
'allow_weak_crypto = true' in their configuration.
What's going on there ?
I've been using kerberized NFS with NetApp filer without
kerberos-specific troubles so far. However, I'm currently trying to
setup a Linux kerberized server for the first time, and I'm facing
Kerberos issues.
First, I had troubles with the des-cbc-crc enctype limitation. When the
NFS server is a Netapp filer, I don't need to take special care for the
client keytab file content, everything works as expected. However, when
the NFS server is a linux box, if the client keytab contains all
available enctypes for the client principal, the client always request
an unsupported enctype for the TGS:
2010-04-21T23:11:46 TGS-REQ nfs/beria.zarb.home at ZARB.HOME from
IPv4:192.168.0.7 for nfs/loubianka.zarb.home at ZARB.HOME [canonicalize]
2010-04-21T23:11:46 Server (nfs/loubianka.zarb.home at ZARB.HOME) has no
support for etypes
2010-04-21T23:11:46 Failed building TGS-REP to IPv4:192.168.0.7
2010-04-21T23:11:46 sending 106 bytes to IPv4:192.168.0.7
I guess this is because the NetApp filer advertise itself as not
supporting anything else as DES, whereas the Linux server advertise
itself as supporting AES. Am I correct ?
Second, even when restricting client keytab to des-cbc-crc enctype, I
have an unexpected failure getting a TGS. On client side, I have the
following error:
[root at beria ~]# mount -t nfs -o sec=krb5 loubianka:/ /mnt/filer/
mount.nfs: access denied by server while mounting loubianka:/
From KDC logs, it appears than the TGS-REQ is only submitted once,
without pre-authentication, making it fails, without the client retryingit as expected:
2010-04-21T23:27:43 AS-REQ nfs/beria.zarb.home at ZARB.HOME from
IPv4:192.168.0.7 for krbtgt/ZARB.HOME at ZARB.HOME
2010-04-21T23:27:43 No preauth found, returning PREAUTH-REQUIRED --
nfs/beria.zarb.home at ZARB.HOME
2010-04-21T23:27:43 sending 285 bytes to IPv4:192.168.0.7
The client logs seems to corroborate this hypothesis:
Apr 21 23:42:33 beria rpc.gssd[8727]: Full hostname for
'loubianka.zarb.home' is 'loubianka.zarb.home'
Apr 21 23:42:33 beria rpc.gssd[8727]: Full hostname for
'beria.zarb.home' is 'beria.zarb.home'
Apr 21 23:42:33 beria rpc.gssd[8727]: Key table entry not found while
getting keytab entry for 'root/beria.zarb.home at ZARB.HOME'
Apr 21 23:42:33 beria rpc.gssd[8727]: Success getting keytab entry for
'nfs/beria.zarb.home at ZARB.HOME'
Apr 21 23:42:34 beria rpc.gssd[8727]: WARNING: Key table entry not found
while getting initial ticket for principal
'nfs/beria.zarb.home at ZARB.HOME' using keytab 'FILE:/etc/krb5.keytab'
Apr 21 23:42:34 beria rpc.gssd[8727]: ERROR: No credentials found for
connection to server loubianka.zarb.home
Apr 21 23:42:34 beria rpc.gssd[8727]: doing error downcall
Apr 21 23:42:34 beria kernel: : nfs4_get_root: getroot error = 13
I couldn't exclude this specific principal from pre-auth requirement for
further testing.
Testing without krb5 security works OK. Other Kerberozed applications
(OpenLDAP, Apache) works OK. My KDC is heimdal 1.3.2, but nfs-utils is
linked against MIT kerberos 1.6.3. All the machines have
'allow_weak_crypto = true' in their configuration.
What's going on there ?
--
BOFH excuse #408:
Computers under water due to SYN flooding.
BOFH excuse #408:
Computers under water due to SYN flooding.