Main index | Section 8 | Options |
Also, if the IP address used by the client cannot be trusted,
the rules in
exports(5)
cannot be applied safely.
As such, the
A certificate and associated key must exist in /etc/rpc.tlsservd
(or the
"certdir"
specified by the
If a SIGHUP signal is sent to the daemon it will reload the
"CRLfile"
and will shut down any extant connections that presented certificates
during TLS handshake that have been revoked.
If the
The daemon will log failed certificate verifications via
syslogd(8)
using LOG_INFO | LOG_DAEMON when the
The options are as follows:
| |
Permit clients to mount using TLS version 1.2. By default, the daemon will only allow mounts using TLS version 1.3, as required by the RFC. However, early FreeBSD (13.0 and 13.1) clients require this option, since they use TLS version 1.2. | |
| |
Specify which ciphers are available during TLS handshake. If this option is specified, "SSL_CTX_set_ciphersuites()" will be called with "available_ciphers" as the argument. If this option is not specified, the cipher will be chosen by ssl(7), which should be adequate for most cases. The format for the available ciphers is a simple ' : ' separated list, in order of preference. The command "openssl ciphers -s -tls1_3" lists available ciphers. | |
| |
Use "certdir" instead of /etc/rpc.tlsservd as the location for the certificate in a file called "cert.pem" and associated key in "certkey.pem". | |
| |
Run in debug mode. In this mode, rpc.tlsservd will not fork when it starts. | |
| |
This option specifies that the client must provide a certificate
that both verifies and has a FQDN that matches the reverse
DNS name for the IP address that
the client uses to connect to the server.
The FQDN should be
in the DNS field of the subjectAltName, but is also allowed
to be in the CN field of the
subjectName in the certificate.
By default, a wildcard "*" in the FQDN is not allowed.
With this option, a failure to verify the client certificate
or match the FQDN will result in the
server sending AUTH_REJECTEDCRED replies to all client RPCs.
This option requires the
| |
| |
This option specifies the path name of a CA certificate(s) file
in pem format, which is used to verify client certificates and to
set the list of CA(s) sent to the client so that it knows which
certificate to send to the server during the TLS handshake.
This path name is used in
"SSL_CTX_load_verify_locations(ctx,CAfile,NULL)"
and
"SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile))"
openssl library calls.
Note that this is a path name for the file and is not assumed to be
in
"certdir".
Either this option or the
| |
| |
This option specifies that the server is to request a certificate
from the client during the TLS handshake.
It does not require that the client provide a certificate.
It should be specified unless no client doing RPC over TLS is
required to have a certificate.
For NFS, either the
exports(5)
option
| |
| |
This option specifies what the
"domain"
is for use with the
| |
| |
This option is similar to the
| |
| |
This option specifies a Certificate Revocation List (CRL) file
that is to be loaded into the verify certificate store and
checked during verification.
This option is only meaningful when either the
| |
| |
This option specifies that if the client provides a certificate
that both verifies and has a subjectAltName with an otherName
component of the form
"otherName:1.3.6.1.4.1.2238.1.1.1;UTF8:user@domain"
where
"domain"
matches the one for this server,
then the daemon will attempt to map
"user"
in the above
to a user credential <uid, gid_list>.
There should only be one of these otherName components for each
"domain".
If
"user"
is a valid username in the password database,
then the <uid, gid_list> for
"user"
will be used for all
RPCs on the mount instead of the credentials in the RPC request
header.
This option requires the
| |
| |
Run in verbose mode.
In this mode,
rpc.tlsservd
will log activity messages to
syslogd(8)
using LOG_INFO | LOG_DAEMON or to
stderr, if the
| |
| |
This option is used with the
| |
| |
Similar to
| |
RFC 9289, Towards Remote Procedure Call Encryption By Default,
RPC.TLSSERVD (8) | September 23, 2022 |
Main index | Section 8 | Options |
Please direct any comments about this manual page service to Ben Bullock. Privacy policy.
“ | How's my programming? Call 1-800-DEV-NULL | ” |