rpc.gssd [-f] [-n] [-k keytab] [-p pipefsdir] [-v] [-r] [-d ccachedir]
The rpcsec_gss protocol gives a means of using the gss-api generic
security api to provide security for protocols using rpc (in particu-
lar, nfs). Before exchanging any rpc requests using rpcsec_gss, the
rpc client must first establish a security context. The linux kernel's
implementation of rpcsec_gss depends on the userspace daemon rpc.gssd
to establish security contexts. The rpc.gssd daemon uses files in the
rpc_pipefs filesystem to communicate with the kernel.
-f Runs rpc.gssd in the foreground and sends output to stderr (as
opposed to syslogd)
-n By default, rpc.gssd treats accesses by the user with UID 0 spe-
cially, and uses "machine credentials" for all accesses by that
user which require Kerberos authentication. With the -n option,
"machine credentials" will not be used for accesses by UID 0.
Instead, credentials must be obtained manually like all other
users. Use of this option means that "root" must manually
obtain Kerberos credentials before attempting to mount an nfs
filesystem requiring Kerberos authentication.
Tells rpc.gssd to use the keys found in keytab to obtain
"machine credentials". The default value is "/etc/krb5.keytab".
Previous versions of rpc.gssd used only "nfs/*" keys found
within the keytab. To be more consistent with other implementa-
tions, we now look for specific keytab entries. The search
order for keytabs to be used for "machine credentials" is now:
If this search order does not use the correct key then provide a
keytab file that contains only correct keys.
Tells rpc.gssd where to look for the rpc_pipefs filesystem. The
default value is "/var/lib/nfs/rpc_pipefs".
Tells rpc.gssd where to look for Kerberos credential files. The
default value is "/tmp". This can also be a colon separated
list of directories to be searched for Kerberos credential
Kerberos tickets from this realm will be preferred when scanning
available credentials cache files to be used to create a con-
text. By default, the default realm, as configured in the Ker-
beros configuration file, is preferred.
Timeout, in seconds, for kernel gss contexts. This option allows
you to force new kernel contexts to be negotiated after timeout
seconds, which allows changing Kerberos tickets and identities
frequently. The default is no explicit timeout, which means the
kernel context will live the lifetime of the Kerberos service
ticket used in its creation.
-e Return EACCESS instead of EKEYEXPIRED when a user's credentials
expire. Returning EKEYEXPIRED was introduced around kernel
2.6.34 and causes all nfs4 I/O to block when a user's creden-
tials expire. This option reverts to old bevavior.
Dug Song <firstname.lastname@example.org>
Andy Adamson <email@example.com>
Marius Aamodt Eriksen <firstname.lastname@example.org>
J. Bruce Fields <email@example.com>
14 Mar 2007 rpc.gssd(8)
Man Pages Copyright Respective Owners. Site Copyright (C) 1994 - 2017
All Rights Reserved.