gssd


SYNOPSIS
       rpc.gssd [-f] [-n] [-k keytab] [-p pipefsdir] [-v] [-r] [-d ccachedir]

DESCRIPTION
       The  rpcsec_gss  protocol  gives  a  means of using the gss-api generic
       security api to provide security for protocols using rpc  (in  particu-
       lar,  nfs).   Before  exchanging any rpc requests using rpcsec_gss, the
       rpc client must first establish a security context.  The linux kernel's
       implementation  of  rpcsec_gss depends on the userspace daemon rpc.gssd
       to establish security contexts.  The rpc.gssd daemon uses files in  the
       rpc_pipefs filesystem to communicate with the kernel.


OPTIONS
       -f     Runs  rpc.gssd  in the foreground and sends output to stderr (as
              opposed to syslogd)

       -n     By default, rpc.gssd treats accesses by the user with UID 0 spe-
              cially,  and uses "machine credentials" for all accesses by that
              user which require Kerberos authentication.  With the -n option,
              "machine  credentials"  will  not be used for accesses by UID 0.
              Instead, credentials must be obtained manually  like  all  other
              users.   Use  of  this  option  means  that "root" must manually
              obtain Kerberos credentials before attempting to  mount  an  nfs
              filesystem requiring Kerberos authentication.

       -k keytab
              Tells  rpc.gssd  to  use  the  keys  found  in  keytab to obtain
              "machine credentials".  The default value is "/etc/krb5.keytab".

              Previous versions of  rpc.gssd  used  only  "nfs/*"  keys  found
              within the keytab.  To be more consistent with other implementa-
              tions, we now look for  specific  keytab  entries.   The  search
              order for keytabs to be used for "machine credentials" is now:
                <HOSTNAME>$@<REALM>
                root/<hostname>@<REALM>
                nfs/<hostname>@<REALM>
                host/<hostname>@<REALM>
                root/<anyname>@<REALM>
                nfs/<anyname>@<REALM>
                host/<anyname>@<REALM>

              If this search order does not use the correct key then provide a
              keytab file that contains only correct keys.

       -p path
              Tells rpc.gssd where to look for the rpc_pipefs filesystem.  The
              default value is "/var/lib/nfs/rpc_pipefs".

       -d directory
              Tells rpc.gssd where to look for Kerberos credential files.  The
              default value is "/tmp".  This can also  be  a  colon  separated
              list  of  directories  to  be  searched  for Kerberos credential
              Kerberos tickets from this realm will be preferred when scanning
              available credentials cache files to be used to  create  a  con-
              text.   By default, the default realm, as configured in the Ker-
              beros configuration file, is preferred.

       -t timeout
              Timeout, in seconds, for kernel gss contexts. This option allows
              you  to force new kernel contexts to be negotiated after timeout
              seconds, which allows changing Kerberos tickets  and  identities
              frequently.  The default is no explicit timeout, which means the
              kernel context will live the lifetime of  the  Kerberos  service
              ticket used in its creation.

       -e     Return  EACCESS instead of EKEYEXPIRED when a user's credentials
              expire.  Returning  EKEYEXPIRED  was  introduced  around  kernel
              2.6.34  and  causes  all nfs4 I/O to block when a user's creden-
              tials expire. This option reverts to old bevavior.

SEE ALSO
       rpc.svcgssd(8)

AUTHORS
       Dug Song <dugsong@umich.edu>
       Andy Adamson <andros@umich.edu>
       Marius Aamodt Eriksen <marius@umich.edu>
       J. Bruce Fields <bfields@umich.edu>



                                  14 Mar 2007                      rpc.gssd(8)
Man Pages Copyright Respective Owners. Site Copyright (C) 1994 - 2017 Hurricane Electric. All Rights Reserved.