[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: MEMORY credential cache interop between Heimdal and MIT?



> >The interesting thing about this thread, to me, is that we seem to  
> >have people interested in pushing the envelope, and using new  
> >userland capabilities to get better scoping semantics.
> 
> The kernel hacks in AFS/DFS were only necessary because their respective 
> filesystem drivers wanted to use those credentials instead of the standard 
> Unix credentials. The reason we can have a discussion about userland 
> solutions for Kerberos in general is because there are no kernel/filesystem 
> considerations to muddy the water, the information is only needed in 
> userland. If you decide that you want a credential cache that will also 
> work for AFS and OpenDCE then efficiency will dictate bringing us back to 
> kernel mode.

It's not just AFS and OpenDCE (does anyone use OpenDCE?).. NFSv4 and
Lustre are two other kernel-level filesystems that want to share
credentials with userspace.

The linux kernel keyring model looks like it has potential to support a
lot of these things, and it has buy-in from the linux community. If we
are going to do anything with more advanced credential
sharing/management, it needs to take advantage of OS-kernel features for
secure keyrings on platforms that have it. I would also suggest that
those interested in other platforms also lobby the platform developers.