lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 20 Feb 2019 12:54:17 -0600
From:   Steve French <>
To:     David Howells <>
Cc:     "Eric W. Biederman" <>,,,
        Steve French <>,,,
        CIFS <>,
        linux-fsdevel <>,,
        LKML <>,
        Linux Containers <>,
        Linux API <>,
        samba-technical <>
Subject: Re: [RFC PATCH 00/27] Containers and using authenticated filesystems

On Tue, Feb 19, 2019 at 5:42 PM David Howells <> wrote:
> Eric W. Biederman <> wrote:
> > So you missed the main mailing lists for discussion of this kind of
> > thing
> Yeah, sorry about that.  I was primarily aiming it at Trond and Steve as I'd
> like to consider how to go about interpolating request_key() into NFS and CIFS
> so that they can make use of the key-related facilities that this makes
> available with AFS.

I am interested in this discussion because I have gotten various questions
about using Containers better on SMB3 mounts, and the question about
doing request_key better comes up **a lot** on SMB3 mounts (not just
for kerberos, Active Directory), and usability could be improved of some
of the cifs-utils that cifs.ko depends on.

Note that various virtualization/container identify features were added to the
protocol a few years ago (which we don't yet implement in Linux) but which
probably be **very** useful to followup on how these could be exposed
to help containers on network mounts in Linux.    See in particular this
new protocol feature (implemented by various servers including Windows
but not by Linux client yet) described in the protocol spec (MS-SMB2 section - the "SMB2_REMOTED_IDENTITY_TREE_CONNECT context"
which can be sent at mount time:

This may be of interest to Samba server developers as well

> > and the maintainer.
> That would be me.  I maintain keyrings.



Powered by blists - more mailing lists