From: Volodymyr Khomenko <volodymyr@vastdata.com>
To: "J. Bruce Fields" <bfields@fieldses.org>
Cc: linux-nfs@vger.kernel.org
Subject: GSSAPI fix for pynfs nfs4.1 client code
Date: Thu, 30 Sep 2021 18:22:09 +0300 [thread overview]
Message-ID: <CANkgwetkTUjj-bMrM4XTvk0vhGiJt3wNKPpRvzgTk-u7ZfrdXg@mail.gmail.com> (raw)
[-- Attachment #1: Type: text/plain, Size: 673 bytes --]
Hello pynfs devs,
It turned out that the pynfs library doesn't work well with the
current version of the 'gssapi' package (API was changed some time
ago) so tests with security=krb5* didn't work.
The latest version of gssapi (aka python-gssapi) and documentation for
it can be found here:
https://github.com/pythongssapi/python-gssapi
https://pythongssapi.github.io/python-gssapi/latest/
Attached patches fixed the problem (tested with CentOS 7.7 NFS4 server
with pynfs + gssapi 1.6.2).
Note - changes are not a complete solution, only nfs4.1 client code is fixed.
nfs4.1 server code and all the code for nfs4.0 should be fixed separately.
Thanks,
Volodymyr Khomenko.
[-- Attachment #2: 2.patch --]
[-- Type: text/x-patch, Size: 1269 bytes --]
commit b77dc49c775756f08bdd0c6ebbe67a96f0ffe41f
Author: Volodymyr Khomenko <volodymyr@vastdata.com>
Date: Thu Sep 30 17:53:04 2021 +0300
Fixed GSSContext to start sequence numbering from 1
GSS sequence number 0 is usually used by NFS4 NULL request
during GSS context establishment (but ignored by server).
Client should never reuse GSS sequence number, so using
0 for the next real operation (EXCHANGE_ID) is possible but
looks suspicious. Fixed the code so numbering for operations
is done from 1 to avoid confusion.
Signed-off-by: Volodymyr Khomenko <volodymyr@vastdata.com>
diff --git a/rpc/security.py b/rpc/security.py
index 0682f43..86f6592 100644
--- a/rpc/security.py
+++ b/rpc/security.py
@@ -174,7 +174,9 @@ class GSSContext(object):
def __init__(self, context_ptr):
self.lock = threading.Lock()
self.ptr = context_ptr
- self.seqid = 0 # client - next seqid to use
+ # Note - seqid=0 is usually used during GSS context establishment,
+ # to have the unique number we need to use the next value now.
+ self.seqid = 1 # client - next seqid to use
self.highest = 0 # server - highest seqid seen
self.seen = 0 # server - bitmask of seen requests
[-- Attachment #3: 1.patch --]
[-- Type: text/x-patch, Size: 11055 bytes --]
commit a612cf9897f0fa5b5de94885e00ef9293e93ffa3
Author: Volodymyr Khomenko <volodymyr@vastdata.com>
Date: Thu Sep 30 16:29:07 2021 +0300
Fixed gssapi usage (RPCGSS) for nfs4.1 client
gssapi library used in the code has been changed and
current code is not compatible with API of new library version.
Fixed the code to work with recent gssapi (tested with 1.6.2).
Tested with krb5, krb5i and krb5p security:
./nfs4.1/testserver.py server.fqdn:/export --maketree --security=krb5 all
Signed-off-by: Volodymyr Khomenko <volodymyr@vastdata.com>
diff --git a/rpc/security.py b/rpc/security.py
index fe4390c..0682f43 100644
--- a/rpc/security.py
+++ b/rpc/security.py
@@ -10,6 +10,7 @@ from . import gss_type
from .gss_type import rpc_gss_init_res
try:
import gssapi
+ from gssapi.raw.misc import GSSError
except ImportError:
print("Could not find gssapi module, proceeding without")
gssapi = None
@@ -242,11 +243,11 @@ class AuthGss(AuthNone):
def init_cred(self, call, target="nfs@jupiter", source=None, oid=None):
# STUB - need intelligent way to set defaults
- good_major = [gssapi.GSS_S_COMPLETE, gssapi.GSS_S_CONTINUE_NEEDED]
+ good_major = [GSS_S_COMPLETE, GSS_S_CONTINUE_NEEDED]
p = Packer()
up = GSSUnpacker('')
# Set target (of form nfs@SERVER)
- target = gssapi.Name(target, gssapi.NT_HOSTBASED_SERVICE)
+ target = gssapi.Name(target, gssapi.NameType.hostbased_service)
# Set source (of form USERNAME)
if source is not None:
source = gssapi.Name(source, gssapi.NT_USER_NAME)
@@ -254,18 +255,26 @@ class AuthGss(AuthNone):
else:
# Just use default cred
gss_cred = None
- context = gssapi.Context()
- token = None
- handle = ''
+ # RFC2203 5.2.2. Context Creation Requests
+ # When GSS_Init_sec_context() is called, the parameters
+ # replay_det_req_flag and sequence_req_flag must be turned off.
+
+ # Note - by default, out_of_sequence_detection flag (sequence_req_flag) is used by gssapi.init_sec_context()
+ # and we have 'An expected per-message token was not received' error (GSS_S_GAP_TOKEN).
+ # To prevent this, we need to use default flags without out_of_sequence_detection bit.
+ flags = gssapi.IntEnumFlagSet(gssapi.RequirementFlag, [gssapi.RequirementFlag.mutual_authentication])
+ context = gssapi.SecurityContext(name=target, creds=gss_cred, flags=flags)
+ input_token = None
+ handle = b''
proc = RPCSEC_GSS_INIT
- while True:
+ while not context.complete:
# Call initSecContext. If it returns COMPLETE, we are done.
# If it returns CONTINUE_NEEDED, we must send d['token']
# to the target, which will run it through acceptSecContext,
# and give us back a token we need to send through initSecContext.
# Repeat as necessary.
- token = context.init(target, token, gss_cred)
- if context.open:
+ output_token = context.step(input_token)
+ if context.complete:
# XXX if res.major == CONTINUE there is a bug in library code
# STUB - now what? Just use context?
# XXX need to use res.seq_window
@@ -277,16 +286,16 @@ class AuthGss(AuthNone):
gss_proc=proc)
proc = RPCSEC_GSS_CONTINUE_INIT
p.reset()
- p.pack_opaque(token)
+ p.pack_opaque(output_token)
header, reply = call(p.get_buffer(), credinfo)
up.reset(reply)
res = up.unpack_rpc_gss_init_res()
up.done()
# res now holds relevent output from target's acceptSecContext call
if res.gss_major not in good_major:
- raise gssapi.Error(res.gss_major, res.gss_minor)
+ raise GSSError(res.gss_major, res.gss_minor)
handle = res.handle # Should not change between calls
- token = res.gss_token # This needs to be sent to initSecContext
+ input_token = res.gss_token # This needs to be sent to SecurityContext.step()
return CredInfo(self, context=handle)
@staticmethod
@@ -361,7 +370,7 @@ class AuthGss(AuthNone):
except:
log_gss.exception("unsecure_data - initial unpacking")
raise rpclib.RPCUnsuccessfulReply(GARBAGE_ARGS)
- qop = context.verifyMIC(data, checksum)
+ qop = context.verify_signature(data, checksum)
check_gssapi(qop)
data = pull_seqnum(data)
elif cred.service == rpc_gss_svc_privacy:
@@ -373,14 +382,14 @@ class AuthGss(AuthNone):
log_gss.exception("unsecure_data - initial unpacking")
raise rpclib.RPCUnsuccessfulReply(GARBAGE_ARGS)
# data, qop, conf = context.unwrap(data)
- data, qop = context.unwrap(data)
+ data, encrypted, qop = context.unwrap(data)
check_gssapi(qop)
data = pull_seqnum(data)
else:
# Can't get here, but doesn't hurt
log_gss.error("Unknown service %i for RPCSEC_GSS" % cred.service)
- except gssapi.Error as e:
- log_gss.warn("unsecure_data: gssapi call returned %s" % e.name)
+ except GSSError as e:
+ log_gss.warn("unsecure_data: gssapi call returned %s" % str(e))
raise rpclib.RPCUnsuccessfulReply(GARBAGE_ARGS)
return data
@@ -397,7 +406,7 @@ class AuthGss(AuthNone):
# data = opaque[gss_seq_num+data] + opaque[checksum]
p.pack_uint(cred.seq_num)
data = p.get_buffer() + data
- token = context.getMIC(data) # XXX BUG set qop
+ token = context.get_signature(data) # XXX BUG set qop
p.reset()
p.pack_opaque(data)
p.pack_opaque(token)
@@ -406,16 +415,16 @@ class AuthGss(AuthNone):
# data = opaque[wrap([gss_seq_num+data])]
p.pack_uint(cred.seq_num)
data = p.get_buffer() + data
- token = context.wrap(data) # XXX BUG set qop
+ wrap_res = context.wrap(data, encrypt=True) # XXX BUG set qop
p.reset()
- p.pack_opaque(token)
+ p.pack_opaque(wrap_res.message)
data = p.get_buffer()
else:
# Can't get here, but doesn't hurt
log_gss.error("Unknown service %i for RPCSEC_GSS" % cred.service)
- except gssapi.Error as e:
+ except GSSError as e:
# XXX What now?
- log_gss.warn("secure_data: gssapi call returned %s" % e.name)
+ log_gss.warn("secure_data: gssapi call returned %s" % str(e))
raise
return data
@@ -436,8 +445,8 @@ class AuthGss(AuthNone):
return rpclib.NULL_CRED
else:
data = self.partially_packed_header(xid, body)
- # XXX how handle gssapi.Error?
- token = self._get_context(body.cred.body.handle).getMIC(data)
+ # XXX how handle GSSError?
+ token = self._get_context(body.cred.body.handle).get_signature(data)
return opaque_auth(RPCSEC_GSS, token)
def check_call_verf(self, xid, body):
@@ -448,10 +457,10 @@ class AuthGss(AuthNone):
return False
data = self.partially_packed_header(xid, body)
try:
- qop = self._get_context(body.cred.body.handle).verifyMIC(data, body.verf.body)
- except gssapi.Error as e:
+ qop = self._get_context(body.cred.body.handle).verify_signature(data, body.verf.body)
+ except GSSError as e:
log_gss.warn("Verifier checksum failed verification with %s" %
- e.name)
+ str(e))
return False
body.cred.body.qop = qop # XXX Where store this?
log_gss.debug("verifier checks out (qop=%i)" % qop)
@@ -522,10 +531,10 @@ class AuthGss(AuthNone):
context = self._get_context(cred.body.handle)
try:
token = context.accept(token)
- except gssapi.Error as e:
+ except GSSError as e:
log_gss.debug("RPCSEC_GSS_INIT failed (%s, %i)!" %
- (e.name, e.minor))
- res = rpc_gss_init_res('', e.major, e.minor, 0, '')
+ (str(e), e.min_code))
+ res = rpc_gss_init_res('', e.maj_code, e.min_code, 0, '')
else:
log_gss.debug("RPCSEC_GSS_*INIT succeeded!")
if first:
@@ -538,9 +547,9 @@ class AuthGss(AuthNone):
else:
handle = cred.body.handle
if context.open:
- major = gssapi.GSS_S_COMPLETE
+ major = GSS_S_COMPLETE
else:
- major = gssapi.GSS_S_CONTINUE_NEEDED
+ major = GSS_S_CONTINUE_NEEDED
res = rpc_gss_init_res(handle, major, 0, # XXX can't see minor
WINDOWSIZE, token)
# Prepare response
@@ -559,15 +568,15 @@ class AuthGss(AuthNone):
# NOTE this relies on GSS_S_COMPLETE == rpc.SUCCESS == 0
return rpclib.NULL_CRED
elif cred.gss_proc in (RPCSEC_GSS_INIT, RPCSEC_GSS_CONTINUE_INIT):
- # init requires getMIC(seq_window)
+ # init requires get_signature(seq_window)
i = WINDOWSIZE
else:
- # Else return getMIC(cred.seq_num)
+ # Else return get_signature(cred.seq_num)
i = cred.seq_num
p = Packer()
p.pack_uint(i)
# XXX BUG - need to set qop
- token = self._get_context(cred.handle).getMIC(p.get_buffer())
+ token = self._get_context(cred.handle).get_signature(p.get_buffer())
return opaque_auth(RPCSEC_GSS, token)
def check_reply_verf(self, msg, call_cred, data):
@@ -593,12 +602,12 @@ class AuthGss(AuthNone):
if res.gss_major != GSS_S_COMPLETE:
raise SecError("Expected NULL")
# BUG - context establishment is not finished on client
- # - so how get context? How run verifyMIC?
+ # - so how get context? How run verify_signature?
# - This seems to be a protocol problem. Just ignore for now
else:
p = Packer()
p.pack_uint(call_cred.body.seq_num)
- qop = call_cred.context.verifyMIC(p.get_buffer(), verf.body)
+ qop = call_cred.context.verify_signature(p.get_buffer(), verf.body)
if qop != call_cred.body.qop:
raise SecError("Mismatched qop")
next reply other threads:[~2021-09-30 15:22 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-09-30 15:22 Volodymyr Khomenko [this message]
2021-09-30 21:11 ` GSSAPI fix for pynfs nfs4.1 client code J. Bruce Fields
2021-09-30 21:25 ` J. Bruce Fields
2021-10-01 6:27 ` Volodymyr Khomenko
2021-10-01 6:12 ` Volodymyr Khomenko
2021-10-01 6:49 ` Volodymyr Khomenko
2021-10-01 14:13 ` J. Bruce Fields
2021-10-01 14:38 ` Volodymyr Khomenko
2021-10-01 15:48 ` J. Bruce Fields
2021-10-02 6:12 ` Volodymyr Khomenko
2021-10-02 20:38 ` J. Bruce Fields
2021-10-01 20:55 ` J. Bruce Fields
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CANkgwetkTUjj-bMrM4XTvk0vhGiJt3wNKPpRvzgTk-u7ZfrdXg@mail.gmail.com \
--to=volodymyr@vastdata.com \
--cc=bfields@fieldses.org \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.