You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.
It appears that ntlm uses md5 hashes which are not supported under FIPS mode. The only supported mode is sec=krb5. I'm not sure enabling krb5 is possible when using the storage class.
I'm not sure enabling krb5 is possible when using the storage class.
As someone who has run kerberized mounts in production, we don't want this (and I don't think we have the necessary infra set up right now to make it happen).
I'd be okay with rolling this back for now to unblock things, and possibly permanently. We should confirm with some folks for security whether or not we need FIPS support. Interestingly, I found an article from MS TechNet that removed a recommendation to use FIPS mode in 2014.
With the recent updates to the vm image and enabling FIPS mode in the kernel the CIFS mounts have stopped working.
After searching through logs and manual attempts to perform the mount I discovered this in the logs:
A quick internet search brought back multiple articles responding to the inquiry:
https://access.redhat.com/solutions/256053
It appears that ntlm uses md5 hashes which are not supported under FIPS mode. The only supported mode is
sec=krb5. I'm not sure enabling krb5 is possible when using the storage class.Doc: https://kubernetes.io/docs/concepts/storage/storage-classes/#azure-file
This includes mount options but I'm not sure how we could hook up kerberos for the storage class:
https://github.com/feiskyer/kubernetes-handbook/blob/master/en/troubleshooting/azurefile.md
The text was updated successfully, but these errors were encountered: