I am using NFSv4 with sec=krb5p
encryption enabled on a CentOS 7 client & server. My NFS shares mount flawlessly at boot-time, and when I query my keytab file I am able to view the list of available ciphers, as so...
# klist -ke
Keytab name: FILE:/etc/krb5.keytab
KVNO Principal
---- ---------------------------------------------
3 nfs/fqdn.host.name@ADS (des-cbc-crc)
3 nfs/fqdn.host.name@ADS (des-cbc-md5)
3 nfs/fqdn.host.name@ADS (arcfour-hmac)
3 nfs/fqdn.host.name@ADS (aes256-cts-hmac-sha1-96)
3 nfs/fqdn.host.name@ADS (aes128-cts-hmac-sha1-96)
This is wonderful, and I'm happy that I am able to securely employ NFSv4 with end-to-end encryption using Kerberos 5 authentication and even limit which ciphers are available, or exclude "weak ciphers" via the /etc/krb5.conf
file. Now that it's "working", I'd sure like to be able to verify that my client hasn't defaulted to a weak encryption cipher like "des-cbc-crc", or better yet confirm that my client IS using "aes256-cts-hmac-sha1-96" encryption! I don't seem to be able to find this functionality in any of my Kerberos package utilities.
Is there a way to determine WHICH cipher is being used to secure an existing NFS mount?