-
Notifications
You must be signed in to change notification settings - Fork 140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kerberos ticket #512
Comments
so what's the mount options in this case? |
the options above are get a ticket with It just exchanges user, passwd with a kerberos ticket. the ticket would be generated in the pod. |
Working with Kerberos also solves working under FIPS since NTLM-based SMB requires hmac-md5. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
Not sure what In this mode, when a process tries to access a share, the kernel makes a cifs.spnego upcall to request encryption keys. It's not clear how this can work when the process triggering the upcall is running in a container. I found a linux-security-module mailing list thread proposing changes to make it work smoothly but I don't know if it was adopted. |
for Kerberos ticket support, it requires agent node domain join first, here is one example: |
since this feature is already implemented by this driver, when the kerberos ticket is expired, how does this driver handle this issue? do we need to unmount the pv and mount again? |
I think the existing Kerberos support is a little bit incomplete. As a user I would like to put a keytab into a secret and have that be used to authenticate the mount; I don't want to have to manage a directory of credentials cache files on every node... |
"To pass a ticket through secret, it needs to be acquired" - there's the problem. The tickets in a credential cache expire within a few hours. What I'd like as a user is to have The difficultly comes when the kernel makes the |
I'd like this feature as well |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
I would like this feature too. At the moment, I am faced with trying to create a sidecar container to refresh the tickets and then update the secret. |
@RustyF how do you do this? would you mind sharing your config here? thanks. and when the secret is updated, do you make remount with the new ticket? |
I've now done the work to create a sidecar that re-builds the ticket cache every 8 hours and updates the secret. Let me know if you want me to expand on this. It's probably an addition to the documentation. I'm not sure if I've solved the PV remount issue yet. I've just installed https://github.com/stakater/Reloader to restart the deployment but not sure if this will have the required effect. |
@RustyF Secrets are updated on projected keys |
@avishefi The secret in this case is on the PV - not the pod - so I'm not sure how this would help? I'm a k8s newbie so maybe I've missed your point ;) |
I though you meant it is a Kubernetes secret. If it is a file on a PV then usually applications can refresh their ticket from the credentials cache and you don't need to restart the pod. You probably want to use an emptyDir instead of a PV if it is ephemeral. |
Would it be possible to not go for username and password but to use a Kerberos ticket for the mount instead?
It would be the equivalent of a mount on the host as:
//server/share /mnt cifs multiuser,sec=krb5,user 0 0
Users will have access to it after a
kinit
to get a kerberos ticket. Equivalently the pod would need a kerberos ticket but that could be provided by an init script.The text was updated successfully, but these errors were encountered: