<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/include/linux/sunrpc/gss_api.h, branch stable/2.6.16.y</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=stable%2F2.6.16.y</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=stable%2F2.6.16.y'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2005-10-19T06:19:47Z</updated>
<entry>
<title>RPCSEC_GSS remove all qop parameters</title>
<updated>2005-10-19T06:19:47Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:55:18Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=00fd6e14255fe7a249315746386d640bc4e9e758'/>
<id>urn:sha1:00fd6e14255fe7a249315746386d640bc4e9e758</id>
<content type='text'>
 Not only are the qop parameters that are passed around throughout the gssapi
 unused by any currently implemented mechanism, but there appears to be some
 doubt as to whether they will ever be used.  Let's just kill them off for now.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>SUNRPC: Add support for privacy to generic gss-api code.</title>
<updated>2005-10-19T06:19:42Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:54:37Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=293f1eb551a77fe5c8956a559a3c0baea95cd9bc'/>
<id>urn:sha1:293f1eb551a77fe5c8956a559a3c0baea95cd9bc</id>
<content type='text'>
 Add support for privacy to generic gss-api code.  This is dead code until we
 have both a mechanism that supports privacy and code in the client or server
 that uses it.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPCSEC_GSS: Misc little cleanups.</title>
<updated>2005-03-10T12:59:09Z</updated>
<author>
<name>Trond Myklebust</name>
<email>trond.myklebust@fys.uio.no</email>
</author>
<published>2005-03-10T12:59:09Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d554fe251e7c3ee4c28497e987c39b35e8e176d4'/>
<id>urn:sha1:d554fe251e7c3ee4c28497e987c39b35e8e176d4</id>
<content type='text'>
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPC: clean up the RPCSEC_GSS kerberos and spkm3 context import functions</title>
<updated>2005-03-10T12:58:17Z</updated>
<author>
<name>Trond Myklebust</name>
<email>trond.myklebust@fys.uio.no</email>
</author>
<published>2005-03-10T12:58:17Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=41e3d179c4258768ca543c43d36572bf5407e952'/>
<id>urn:sha1:41e3d179c4258768ca543c43d36572bf5407e952</id>
<content type='text'>
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>[PATCH] gss_api build fix</title>
<updated>2004-05-22T03:37:19Z</updated>
<author>
<name>Andrew Morton</name>
<email>akpm@osdl.org</email>
</author>
<published>2004-05-22T03:37:19Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9b19f4f0bf4daf2e8bbec3b4e14d35a0872620a4'/>
<id>urn:sha1:9b19f4f0bf4daf2e8bbec3b4e14d35a0872620a4</id>
<content type='text'>
From: "J. Bruce Fields" &lt;bfields@fieldses.org&gt;

Older gcc's don't like that dimensionless array.  Remove it in favour of a
pointer to the data.
</content>
</entry>
<entry>
<title>RPCSEC_GSS: Fix module reference counting.</title>
<updated>2004-05-20T11:49:58Z</updated>
<author>
<name>Trond Myklebust</name>
<email>trond.myklebust@fys.uio.no</email>
</author>
<published>2004-05-20T11:49:58Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=47737de1a783b5001d0c1aa3346e9ed1dae317dc'/>
<id>urn:sha1:47737de1a783b5001d0c1aa3346e9ed1dae317dc</id>
<content type='text'>
    Clean up the interface to the GSSAPI code.
                                                                                
Patch by Bruce Fields
</content>
</entry>
<entry>
<title>[PATCH] kNFSd: Add minimal server-side support for rpcsec_gss.</title>
<updated>2004-02-26T14:45:25Z</updated>
<author>
<name>Andrew Morton</name>
<email>akpm@osdl.org</email>
</author>
<published>2004-02-26T14:45:25Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=8c54e6b2db2ecc3217d82ee76e59fd520d8c5863'/>
<id>urn:sha1:8c54e6b2db2ecc3217d82ee76e59fd520d8c5863</id>
<content type='text'>
From: NeilBrown &lt;neilb@cse.unsw.edu.au&gt;

From: "J. Bruce Fields" &lt;bfields@fieldses.org&gt;

Note that the user (or exportfs, on the user's behalf) allows a gss
pseudoflavor to be used to access an export by exporting to a special client
named "gss/pseudoflavor-name", e.g., "gss/krb5" or "gss/lipkey-i".
</content>
</entry>
<entry>
<title>RPCSEC_GSS: Client-side only support for rpcsec_gss integrity</title>
<updated>2004-02-07T15:44:01Z</updated>
<author>
<name>Trond Myklebust</name>
<email>trond.myklebust@fys.uio.no</email>
</author>
<published>2004-02-07T15:44:01Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=955ac3514fc5eb754827bd69edbe09012b95beb8'/>
<id>urn:sha1:955ac3514fc5eb754827bd69edbe09012b95beb8</id>
<content type='text'>
protection. Since this requires checksumming an entire request,
instead of just the header, and since the request may include,
for example, pages with write data, we modify the gss_api
routines to pass xdr_bufs instead of xdr_netobjs where
necessary.

We add rpcauth_wrap_req and rpcauth_unwrap_resp to rpcauth.c,
wrappers for the new rpc cred ops crwrap_req and crunwrap_req,
which are called just before encoding, and just after decoding,
respectively.
</content>
</entry>
<entry>
<title>Trivial; I kept forgetting what each of the xdr_netobj's passed to the gss-api</title>
<updated>2003-06-11T12:25:47Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@citi.umich.edu</email>
</author>
<published>2003-06-11T12:25:47Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=34df5d58e5adbf7f59427a87a93c830d96c8bba8'/>
<id>urn:sha1:34df5d58e5adbf7f59427a87a93c830d96c8bba8</id>
<content type='text'>
routine meant, so I thought I'd fool with the argument names in an effort to
make them more helpful.
</content>
</entry>
<entry>
<title>[PATCH] RPCSEC_GSS authentication framework [4/6]</title>
<updated>2003-01-13T05:41:33Z</updated>
<author>
<name>Trond Myklebust</name>
<email>trond.myklebust@fys.uio.no</email>
</author>
<published>2003-01-13T05:41:33Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=8d188768b6a1b5692994c02539c801aad888b555'/>
<id>urn:sha1:8d188768b6a1b5692994c02539c801aad888b555</id>
<content type='text'>
This patch provides the basic framework for RPCSEC_GSS authentication
in the RPC client. The protocol is fully described in RFC-2203.
Sun has supported it in their commercial NFSv3 and v2 implementations
for quite some time, and it has been specified in RFC3010 as being
mandatory for NFSv4.

  - Update the mount_data struct for NFSv2 and v3 in order to allow them
    to pass an RPCSEC_GSS security flavour. Compatibility with existing
    versions of the 'mount' program is ensured by requiring that RPCSEC
    support be enabled using the new flag NFS_MOUNT_SECFLAVOUR.
  - Provide secure authentication, and later data encryption on
    a per-user basis. A later patch will an provide an implementation
    of the Kerberos 5 security mechanism. SPKM and LIPKEY are still
    being planned.
  - Security context negotiation and initialization are all assumed
    to be done in userland. A later patch will provide the actual upcall
    mechanisms to allow for this.
</content>
</entry>
</feed>
