cifscreds: use the session keyring
authorJeff Layton <jlayton@samba.org>
Tue, 17 Jan 2012 19:43:24 +0000 (14:43 -0500)
committerJeff Layton <jlayton@samba.org>
Tue, 17 Jan 2012 19:43:24 +0000 (14:43 -0500)
This seems like a reasonable change, but I'm willing to listen to
arguments to the contrary...

cifscreds currently hangs the keys off of the uid keyring. It seems
more appropriate though that we require that each session have its
own set. This might be particularly important in a containerized
situation. If a user authenticates in one container, then we probably
don't want to allow a user in another to "borrow" those creds.

Signed-off-by: Jeff Layton <jlayton@samba.org>
cifscreds.c

index cbd431eabb3ce3d8ee7fdf43e523cfd0fc8d5bc0..6079b388fddfa814576ba3f755e4a0fe39889ff0 100644 (file)
@@ -51,7 +51,7 @@
 #define DOMAIN_DISALLOWED_CHARS "\\/:*?\"<>|"
 
 /* destination keyring */
-#define DEST_KEYRING KEY_SPEC_USER_KEYRING
+#define DEST_KEYRING KEY_SPEC_SESSION_KEYRING
 
 struct cmdarg {
        char            *host;