summaryrefslogtreecommitdiff
path: root/sound/aoa/Kconfig
diff options
context:
space:
mode:
authorChuck Lever <chuck.lever@oracle.com>2013-04-22 19:42:48 (GMT)
committerTrond Myklebust <Trond.Myklebust@netapp.com>2013-04-22 20:09:53 (GMT)
commit79d852bf5e7691dc78cc6322ecd1860c50940785 (patch)
treeeb196fbebad1ade31e2e688db0d82380f12c1070 /sound/aoa/Kconfig
parent845cbceb22c67030df76552892ad4935669bf2e5 (diff)
downloadlinux-fsl-qoriq-79d852bf5e7691dc78cc6322ecd1860c50940785.tar.xz
NFS: Retry SETCLIENTID with AUTH_SYS instead of AUTH_NONE
Recently I changed the SETCLIENTID code to use AUTH_GSS(krb5i), and then retry with AUTH_NONE if that didn't work. This was to enable Kerberos NFS mounts to work without forcing Linux NFS clients to have a keytab on hand. Rick Macklem reports that the FreeBSD server accepts AUTH_NONE only for NULL operations (thus certainly not for SETCLIENTID). Falling back to AUTH_NONE means our proposed 3.10 NFS client will not interoperate with FreeBSD servers over NFSv4 unless Kerberos is fully configured on both ends. If the Linux client falls back to using AUTH_SYS instead for SETCLIENTID, all should work fine as long as the NFS server is configured to allow AUTH_SYS for SETCLIENTID. This may still prevent access to Kerberos-only FreeBSD servers by Linux clients with no keytab. Rick is of the opinion that the security settings the server applies to its pseudo-fs should also apply to the SETCLIENTID operation. Linux and Solaris NFS servers do not place that limitation on SETCLIENTID. The security settings for the server's pseudo-fs are determined automatically as the union of security flavors allowed on real exports, as recommended by RFC 3530bis; and the flavors allowed for SETCLIENTID are all flavors supported by the respective server implementation. Signed-off-by: Chuck Lever <chuck.lever@oracle.com> Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
Diffstat (limited to 'sound/aoa/Kconfig')
0 files changed, 0 insertions, 0 deletions