[RFC PATCH 00/27] Containers and using authenticated filesystems
smfrench at gmail.com
Wed Feb 20 18:54:17 UTC 2019
On Tue, Feb 19, 2019 at 5:42 PM David Howells <dhowells at redhat.com> wrote:
> Eric W. Biederman <ebiederm at xmission.com> wrote:
> > So you missed the main mailing lists for discussion of this kind of
> > thing
> Yeah, sorry about that. I was primarily aiming it at Trond and Steve as I'd
> like to consider how to go about interpolating request_key() into NFS and CIFS
> so that they can make use of the key-related facilities that this makes
> available with AFS.
I am interested in this discussion because I have gotten various questions
about using Containers better on SMB3 mounts, and the question about
doing request_key better comes up **a lot** on SMB3 mounts (not just
for kerberos, Active Directory), and usability could be improved of some
of the cifs-utils that cifs.ko depends on.
Note that various virtualization/container identify features were added to the
protocol a few years ago (which we don't yet implement in Linux) but which
probably be **very** useful to followup on how these could be exposed
to help containers on network mounts in Linux. See in particular this
new protocol feature (implemented by various servers including Windows
but not by Linux client yet) described in the protocol spec (MS-SMB2 section
126.96.36.199.1) - the "SMB2_REMOTED_IDENTITY_TREE_CONNECT context"
which can be sent at mount time:
This may be of interest to Samba server developers as well
> > and the maintainer.
> That would be me. I maintain keyrings.
More information about the Linux-security-module-archive