Skip to content

Conversation

chucklever
Copy link
Member

NFSD depends on seeing a non-zero peerid to know when the session has been authenticated (mTLS). Currently NFSD does not read or parse the remote peer's certificate.

If tlshd fails to link the certificate onto the USER_SPEC keyring, it still needs to return a peerid that is non-zero to show that the remote peer presented a trusted certificate.

Hack city. But this "fix" is compatible with older kernels and ktls-utils releases. A more complete fix is forthcoming.

NFSD depends on seeing a non-zero peerid to know when the session
has been authenticated (mTLS). Currently NFSD does not read or
parse the remote peer's certificate.

If tlshd fails to link the certificate onto the USER_SPEC keyring,
it still needs to return a peerid that is non-zero to show that
the remote peer presented a trusted certificate.

Hack city. But this "fix" is compatible with older kernels and
ktls-utils releases. A more complete fix is forthcoming.

Signed-off-by: Chuck Lever <[email protected]>
@chucklever chucklever merged commit 59ecb97 into main Jul 31, 2025
8 of 9 checks passed
@chucklever chucklever deleted the cel-fixes branch July 31, 2025 18:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant