Packages: src:krb5, nfs-kernel-server; Maintainer for src:krb5 is Sam Hartman <hartmans@debian.org>; Maintainer for nfs-kernel-server is Debian kernel team <debian-kernel@lists.debian.org>; Source for nfs-kernel-server is src:nfs-utils (PTS, buildd, popcon).
Reported by: Rico Rommel <rico@bierrommel.de>
Date: Sun, 10 Apr 2011 15:51:04 UTC
Severity: normal
Tags: patch
Found in versions nfs-kernel-server/1:1.2.2-4, krb5/1.8.3+dfsg-4, 1:1.2.4-1~bpo60+1
Fixed in versions nfs-kernel-server/1:1.2.4-1, krb5/1.9.1+dfsg-1, krb5/1.8.3+dfsg-4squeeze2, nfs-utils/1:1.2.2-4squeeze1
Done: Luk Claes <luk@debian.org>
Bug is archived. No further changes may be made.
View this report as an mbox folder, status mbox, maintainer mbox
Report forwarded
to debian-bugs-dist@lists.debian.org, rico@bierrommel.de, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sun, 10 Apr 2011 15:51:18 GMT) (full text, mbox, link).
Acknowledgement sent
to Rico Rommel <rico@bierrommel.de>:
New Bug report received and forwarded. Copy sent to rico@bierrommel.de, Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 10 Apr 2011 15:51:22 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: nfs-common Version: 1:1.2.2-4 Severity: normal Tags: ipv6 After installing nfs-common 1:1.2.3-2 on clients (unstable) the nfs-kernel- server in squeeze denies access for kerberized nfs exports. syslog on the server (squeeze) gives: rpc.svcgssd[1049]: ERROR: prepare_krb5_rfc_cfx_buffer: not implemented rpc.svcgssd[1049]: ERROR: failed serializing krb5 context for kernel rpc.svcgssd[1049]: WARNING: handle_nullreq: serialize_context_for_kernel failed and qword_eol: fflush failed: errno 38 (Function not implemented) A workaround is to upgrade servers version of nfs-kernel-server and nfs-common to 1:1.2.3-2 and linux-image to 2.6.38, but these packages are not part of squeeze. -- System Information: Debian Release: wheezy/sid APT prefers oldstable APT policy: (500, 'oldstable'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (101, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.38-2-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages nfs-common depends on: ii adduser 3.112+nmu2 add and remove users and groups ii initscripts 2.88dsf-13.1 scripts for initializing and shutt ii libc6 2.11.2-13 Embedded GNU C Library: Shared lib ii libcap2 1:2.20-1 support for getting/setting POSIX. ii libcomerr2 1.41.12-2 common error description library ii libevent-1.4-2 1.4.13-stable-1 An asynchronous event notification ii libgssapi-krb5-2 1.9+dfsg-1 MIT Kerberos runtime libraries - k ii libgssglue1 0.2-2 mechanism-switch gssapi library ii libk5crypto3 1.9+dfsg-1 MIT Kerberos runtime libraries - C ii libkrb5-3 1.9+dfsg-1 MIT Kerberos runtime libraries ii libnfsidmap2 0.24-1 An nfs idmapping library ii librpcsecgss3 0.19-2 allows secure rpc communication us ii libwrap0 7.6.q-19 Wietse Venema's TCP wrappers libra ii lsb-base 3.2-27 Linux Standard Base 3.2 init scrip ii netbase 4.45 Basic TCP/IP networking system ii rpcbind [portmap] 0.2.0-6 converts RPC program numbers into ii ucf 3.0025+nmu1 Update Configuration File: preserv nfs-common recommends no packages. nfs-common suggests no packages. -- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sun, 10 Apr 2011 16:39:16 GMT) (full text, mbox, link).
Acknowledgement sent
to Rico Rommel <rico@bierrommel.de>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 10 Apr 2011 16:39:17 GMT) (full text, mbox, link).
Message #10 received at 622146@bugs.debian.org (full text, mbox, reply):
Am Sonntag, 10. April 2011, 17:57:11 schrieb Ben Hutchings: > On Sun, 2011-04-10 at 17:48 +0200, Rico Rommel wrote: > > Package: nfs-common > > Version: 1:1.2.2-4 > > Severity: normal > > Tags: ipv6 > > [...] > > Why ipv6? > > Ben. I noticed, that nfs-common doesn't depend on librpcsecgss3 anymore and tried a rebuild using librpcsecgss3. But librpcsecgss3 conflicts with the now used libtirpc1, which provides ipv6 support to nfs. (as i understood)
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sun, 10 Apr 2011 17:42:26 GMT) (full text, mbox, link).
Acknowledgement sent
to Ben Hutchings <ben@decadent.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 10 Apr 2011 17:42:27 GMT) (full text, mbox, link).
Message #15 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Sun, 2011-04-10 at 17:48 +0200, Rico Rommel wrote: > Package: nfs-common > Version: 1:1.2.2-4 > Severity: normal > Tags: ipv6 [...] Why ipv6? Ben. -- Ben Hutchings Once a job is fouled up, anything done to improve it makes it worse.
[signature.asc (application/pgp-signature, inline)]
Removed tag(s) ipv6.
Request was from Ben Hutchings <ben@decadent.org.uk>
to control@bugs.debian.org.
(Sun, 10 Apr 2011 17:57:40 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sun, 10 Apr 2011 18:18:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 10 Apr 2011 18:18:25 GMT) (full text, mbox, link).
Message #22 received at 622146@bugs.debian.org (full text, mbox, reply):
On 04/10/2011 06:10 PM, Rico Rommel wrote: > Am Sonntag, 10. April 2011, 17:57:11 schrieb Ben Hutchings: >> On Sun, 2011-04-10 at 17:48 +0200, Rico Rommel wrote: >>> Package: nfs-common >>> Version: 1:1.2.2-4 >>> Severity: normal >>> Tags: ipv6 >> >> [...] >> >> Why ipv6? >> >> Ben. > > I noticed, that nfs-common doesn't depend on librpcsecgss3 anymore and tried a > rebuild using librpcsecgss3. > But librpcsecgss3 conflicts with the now used libtirpc1, which provides ipv6 > support to nfs. (as i understood) Does removing librpcsecgss3 solve the problem? Cheers Luk
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sun, 10 Apr 2011 18:48:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Rico Rommel <rico@bierrommel.de>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 10 Apr 2011 18:48:07 GMT) (full text, mbox, link).
Message #27 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Am Sonntag, 10. April 2011, 20:09:36 schrieb Luk Claes: > On 04/10/2011 06:10 PM, Rico Rommel wrote: > > Am Sonntag, 10. April 2011, 17:57:11 schrieb Ben Hutchings: > >> On Sun, 2011-04-10 at 17:48 +0200, Rico Rommel wrote: > >>> Package: nfs-common > >>> Version: 1:1.2.2-4 > >>> Severity: normal > >>> Tags: ipv6 > >> > >> [...] > >> > >> Why ipv6? > >> > >> Ben. > > > > I noticed, that nfs-common doesn't depend on librpcsecgss3 anymore and > > tried a rebuild using librpcsecgss3. > > But librpcsecgss3 conflicts with the now used libtirpc1, which provides > > ipv6 support to nfs. (as i understood) > > Does removing librpcsecgss3 solve the problem? No, it doesn't make any difference. librpcsecgss3 isn't used by nfs-common 1.2.3-2 Rico
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Mon, 11 Apr 2011 16:39:32 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 11 Apr 2011 16:39:33 GMT) (full text, mbox, link).
Message #32 received at 622146@bugs.debian.org (full text, mbox, reply):
On 04/10/2011 08:45 PM, Rico Rommel wrote: > Am Sonntag, 10. April 2011, 20:09:36 schrieb Luk Claes: >> On 04/10/2011 06:10 PM, Rico Rommel wrote: >>> Am Sonntag, 10. April 2011, 17:57:11 schrieb Ben Hutchings: >>>> On Sun, 2011-04-10 at 17:48 +0200, Rico Rommel wrote: >>> I noticed, that nfs-common doesn't depend on librpcsecgss3 anymore and >>> tried a rebuild using librpcsecgss3. >>> But librpcsecgss3 conflicts with the now used libtirpc1, which provides >>> ipv6 support to nfs. (as i understood) >> >> Does removing librpcsecgss3 solve the problem? > > No, it doesn't make any difference. > librpcsecgss3 isn't used by nfs-common 1.2.3-2 What kernel version are you using on the clients? If you're not using sid's kernel, does upgrading to a recent kernel (and rebooting obviously) solve anything? If that also does not work, I guess we could prepare an upload containing support to limit the negotiated enctypes [1] to see if that helps. Cheers Luk [1] http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=d6c1b35c6b40243bfd6fba2591c9f8f2653078c0 Cheers Luk
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Mon, 11 Apr 2011 17:18:28 GMT) (full text, mbox, link).
Acknowledgement sent
to Rico Rommel <rico@bierrommel.de>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 11 Apr 2011 17:18:28 GMT) (full text, mbox, link).
Message #37 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Am Montag, 11. April 2011, 18:28:45 schrieb Luk Claes: > On 04/10/2011 08:45 PM, Rico Rommel wrote: > > Am Sonntag, 10. April 2011, 20:09:36 schrieb Luk Claes: > >> On 04/10/2011 06:10 PM, Rico Rommel wrote: > >>> Am Sonntag, 10. April 2011, 17:57:11 schrieb Ben Hutchings: > >>>> On Sun, 2011-04-10 at 17:48 +0200, Rico Rommel wrote: > >>> I noticed, that nfs-common doesn't depend on librpcsecgss3 anymore and > >>> tried a rebuild using librpcsecgss3. > >>> But librpcsecgss3 conflicts with the now used libtirpc1, which provides > >>> ipv6 support to nfs. (as i understood) > >> > >> Does removing librpcsecgss3 solve the problem? > > > > No, it doesn't make any difference. > > librpcsecgss3 isn't used by nfs-common 1.2.3-2 > > What kernel version are you using on the clients? If you're not using > sid's kernel, does upgrading to a recent kernel (and rebooting > obviously) solve anything? The clients are running 2.6.38-2 (amd64) from sid.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sun, 15 May 2011 22:33:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Clint Adams <clint@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 15 May 2011 22:33:03 GMT) (full text, mbox, link).
Message #42 received at 622146@bugs.debian.org (full text, mbox, reply):
I also have this problem.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Mon, 06 Jun 2011 14:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Alberto Gonzalez Iniesta <agi@inittab.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 06 Jun 2011 14:57:04 GMT) (full text, mbox, link).
Message #47 received at 622146@bugs.debian.org (full text, mbox, reply):
Same thing here, against a Lenny nfs server. -- Alberto Gonzalez Iniesta | Formación, consultoría y soporte técnico agi@(inittab.org|debian.org)| en GNU/Linux y software libre Encrypted mail preferred | http://inittab.com Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Mon, 06 Jun 2011 15:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Alberto Gonzalez Iniesta <agi@inittab.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 06 Jun 2011 15:39:03 GMT) (full text, mbox, link).
Message #52 received at 622146@bugs.debian.org (full text, mbox, reply):
Adding the following line in the [libdefaults] section of /etc/krb5.conf fixed the problem for me (tm), probably not the best solution, but works: permitted_enctypes = des-cbc-md5 I also exported ONLY the DES-CBC-MD5:NORMAL key for my sid host: kadmin.local: ktadd -k lib.keytab -e DES-CBC-MD5:NORMAL host/lib (probably not needed, but just to stay on the ""safe"" side) HTH, Alberto -- Alberto Gonzalez Iniesta | Formación, consultoría y soporte técnico agi@(inittab.org|debian.org)| en GNU/Linux y software libre Encrypted mail preferred | http://inittab.com Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 07 Jun 2011 17:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 07 Jun 2011 17:03:03 GMT) (full text, mbox, link).
Message #57 received at 622146@bugs.debian.org (full text, mbox, reply):
On 06/06/2011 05:37 PM, Alberto Gonzalez Iniesta wrote: > Adding the following line in the [libdefaults] section of /etc/krb5.conf > fixed the problem for me (tm), probably not the best solution, but > works: > permitted_enctypes = des-cbc-md5 It's probably better to set enable_weak_crypto=yes, does that work? > I also exported ONLY the DES-CBC-MD5:NORMAL key for my sid host: > kadmin.local: ktadd -k lib.keytab -e DES-CBC-MD5:NORMAL host/lib > (probably not needed, but just to stay on the ""safe"" side) Cheers Luk
Message sent on
to Rico Rommel <rico@bierrommel.de>:
Bug#622146.
(Tue, 07 Jun 2011 17:03:04 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 07 Jun 2011 17:09:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 07 Jun 2011 17:09:07 GMT) (full text, mbox, link).
Message #65 received at 622146@bugs.debian.org (full text, mbox, reply):
On 06/07/2011 07:01 PM, Luk Claes wrote: > On 06/06/2011 05:37 PM, Alberto Gonzalez Iniesta wrote: >> Adding the following line in the [libdefaults] section of /etc/krb5.conf >> fixed the problem for me (tm), probably not the best solution, but >> works: >> permitted_enctypes = des-cbc-md5 > > It's probably better to set enable_weak_crypto=yes, does that work? 'allow_weak_crypto = true', that is. >> I also exported ONLY the DES-CBC-MD5:NORMAL key for my sid host: >> kadmin.local: ktadd -k lib.keytab -e DES-CBC-MD5:NORMAL host/lib >> (probably not needed, but just to stay on the ""safe"" side) Cheers Luk
Message sent on
to Rico Rommel <rico@bierrommel.de>:
Bug#622146.
(Tue, 07 Jun 2011 17:09:11 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 07 Jun 2011 17:21:10 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 07 Jun 2011 17:21:10 GMT) (full text, mbox, link).
Message #73 received at 622146@bugs.debian.org (full text, mbox, reply):
>>>>> "Luk" == Luk Claes <luk@debian.org> writes:
Luk> On 06/06/2011 05:37 PM, Alberto Gonzalez Iniesta wrote:
>> Adding the following line in the [libdefaults] section of
>> /etc/krb5.conf fixed the problem for me (tm), probably not the
>> best solution, but works: permitted_enctypes = des-cbc-md5
Luk> It's probably better to set enable_weak_crypto=yes, does that
Luk> work?
Hi.
I think I gave Luk the wrong setting.
It's allow_weak_crypto = yes not enable_weak_crypto = yes.
You should not have to set permitted_enctypes.
Enabling weak_crypto and only setting the des-cbc-crc key with ktadd in
kadmin is supposed to be sufficient.
--Sam
Message sent on
to Rico Rommel <rico@bierrommel.de>:
Bug#622146.
(Tue, 07 Jun 2011 17:21:14 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 07 Jun 2011 21:25:25 GMT) (full text, mbox, link).
Acknowledgement sent
to Alberto Gonzalez Iniesta <agi@inittab.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 07 Jun 2011 21:25:31 GMT) (full text, mbox, link).
Message #81 received at 622146@bugs.debian.org (full text, mbox, reply):
On Tue, Jun 07, 2011 at 01:10:23PM -0400, Sam Hartman wrote: > >>>>> "Luk" == Luk Claes <luk@debian.org> writes: > > Luk> On 06/06/2011 05:37 PM, Alberto Gonzalez Iniesta wrote: > >> Adding the following line in the [libdefaults] section of > >> /etc/krb5.conf fixed the problem for me (tm), probably not the > >> best solution, but works: permitted_enctypes = des-cbc-md5 > > Luk> It's probably better to set enable_weak_crypto=yes, does that > Luk> work? > > Hi. > I think I gave Luk the wrong setting. > It's allow_weak_crypto = yes not enable_weak_crypto = yes. > > You should not have to set permitted_enctypes. > Enabling weak_crypto and only setting the des-cbc-crc key with ktadd in > kadmin is supposed to be sufficient. I have both set: allow_weak_crypto=true permitted_enctypes = des-cbc-md5 And only the... wait I have des-cbc-md5 IIRC, not des-cbc-crc. I'll check that tomorrow. But it's not working after the last upgrade. When I posted yesterday I was running a sid versión from a couple of weeks ago. Probably 1.9, sorry can't remember now. Regards, Alberto -- Alberto Gonzalez Iniesta | Formación, consultoría y soporte técnico agi@(inittab.org|debian.org)| en GNU/Linux y software libre Encrypted mail preferred | http://inittab.com Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Wed, 08 Jun 2011 10:27:20 GMT) (full text, mbox, link).
Acknowledgement sent
to Alberto Gonzalez Iniesta <agi@inittab.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Wed, 08 Jun 2011 10:27:22 GMT) (full text, mbox, link).
Message #86 received at 622146@bugs.debian.org (full text, mbox, reply):
Ok, got tired of this now. I don't know how it worked a couple of days ago, I'm not able to get it to work now. Either with 1.9 or 1.9.1. Only the des-cbc-md5 or des-cbc-crc keys in the client's keytab, with both: allow_weak_crypto = yes permitted_enctypes = des-cbc-(md5|crc) Or just with allow_weak_crypto No way to mount, with the known errors on the server. I'll play with this again in some days, sshfs will do the job for the time being. -- Alberto Gonzalez Iniesta | Formación, consultoría y soporte técnico agi@(inittab.org|debian.org)| en GNU/Linux y software libre Encrypted mail preferred | http://inittab.com Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Wed, 08 Jun 2011 18:12:10 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Wed, 08 Jun 2011 18:12:10 GMT) (full text, mbox, link).
Message #91 received at 622146@bugs.debian.org (full text, mbox, reply):
Hi. I was missing some context here. My suspicion is that things will work if you add permitted_enctypes = des-cbc-crc default_tgs_enctypes = des-cbc-crc to the configuration of the nfs server And make sure that the nfs principal on the NFS server has nothing but a des-cbc-crc key in the KDC database. That is kadmin.local: getprinc nfs/machine_name should only list DES keys. If you satisfy all of these conditions then I *think* that a sid client can connect to a squeeze server. It may also work to make the following config changes on the client: default_tgs_enctypes = des-cbc-crc and no config changes on the server. Clearly, this is all non-ideal. Once we confirm what's going on, we can look into backporting some fixes to this issue introduced into MIT Kerberos and nfs-utils. --Sam
Message sent on
to Rico Rommel <rico@bierrommel.de>:
Bug#622146.
(Wed, 08 Jun 2011 18:12:17 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Thu, 09 Jun 2011 11:06:30 GMT) (full text, mbox, link).
Acknowledgement sent
to Alberto Gonzalez Iniesta <agi@inittab.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Thu, 09 Jun 2011 11:06:44 GMT) (full text, mbox, link).
Message #99 received at 622146@bugs.debian.org (full text, mbox, reply):
On Wed, Jun 08, 2011 at 02:10:32PM -0400, Sam Hartman wrote:
> Hi.
> I was missing some context here.
>
> My suspicion is that things will work
> if you add
> permitted_enctypes = des-cbc-crc
> default_tgs_enctypes = des-cbc-crc
> to the configuration of the nfs server
>
> And make sure that the nfs principal on the NFS server has nothing but a
> des-cbc-crc key in the KDC database.
> That is
> kadmin.local: getprinc nfs/machine_name
> should only list DES keys.
Hi Sam,
Thanks for looking into this.
I'd rather not touch anything in the server, since +100 clients are
using it.
> If you satisfy all of these conditions then I *think* that a sid client
> can connect to a squeeze server.
Humm, the server is (right now) lenny in my case.
> It may also work to make the following config changes on the client:
>
> default_tgs_enctypes = des-cbc-crc
>
> and no config changes on the server.
Did that, no luck :-(
I really wonder how I make it work last time...
Now I have (not working):
agi@lib:~$ grep cbc /etc/krb5.conf
permitted_enctypes = des-cbc-crc
default_tgs_enctypes = des-cbc-crc
agi@lib:~$ grep weak /etc/krb5.conf
allow_weak_crypto = yes
And only the des-cbc-crc:normal key on this hosts' keytab.
Regards,
Alberto
--
Alberto Gonzalez Iniesta | Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred | http://inittab.com
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Thu, 09 Jun 2011 13:39:24 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Thu, 09 Jun 2011 13:39:24 GMT) (full text, mbox, link).
Message #104 received at 622146@bugs.debian.org (full text, mbox, reply):
OK, I have no clue nor really any interest in debugging DES. There is a real bug here introduced in krb5 1.7 which added enctype negotiation . I'd expect that to create some problems for sid clients talking to squeeze servers. There's a solution to that which involves backporting the nfs-utils patch mentioned earlier in this bug to squeeze and backporting a krb5 patch that depends on to squeeze. I'm certainly happy to backport the krb5 patch if the stable release managers approve. However, that won't help you. I don't understand how you're seeing that issue because the code that causes the problem is introduced into krb5 1.7 and lenny has krb5 1.6. If the server doesn't support the negotiation feature, it is not used.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Sat, 18 Jun 2011 08:30:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Tom Boven <tom.boven@telenet.be>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sat, 18 Jun 2011 08:30:09 GMT) (full text, mbox, link).
Message #109 received at 622146@bugs.debian.org (full text, mbox, reply):
Package: nfs-common
Version: 1:1.2.3-2
Followup-For: Bug #622146
At my pc I'm running sid and my server is running wheezy (on a 2.6.32-5-xen-amd64 kernel). I've upgrade it to all latest packages today and I can confirm that with this configuration the issue also exists. I'll try a more recent kernel to see what effect it has on this.
-- Package-specific info:
-- rpcinfo --
program vers proto port service
100000 4 tcp 111 portmapper
100000 3 tcp 111 portmapper
100000 2 tcp 111 portmapper
100000 4 udp 111 portmapper
100000 3 udp 111 portmapper
100000 2 udp 111 portmapper
100024 1 udp 49727 status
100024 1 tcp 60755 status
-- /etc/default/nfs-common --
NEED_STATD=
STATDOPTS=
RPCGSSDOPTS=""
NEED_IDMAPD=yes
NEED_GSSD=yes
-- /etc/idmapd.conf --
[General]
Verbosity = 0
Pipefs-Directory = /var/lib/nfs/rpc_pipefs
Domain = THUIS.LAN
[Mapping]
Nobody-User = nobody
Nobody-Group = nogroup
-- /etc/fstab --
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (400, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=nl_BE.utf8, LC_CTYPE=nl_BE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages nfs-common depends on:
ii adduser 3.113 add and remove users and groups
ii initscripts 2.88dsf-13.10 scripts for initializing and shutt
ii libc6 2.13-7 Embedded GNU C Library: Shared lib
ii libcap2 1:2.21-1 support for getting/setting POSIX.
ii libcomerr2 1.41.12-4 common error description library
ii libevent-1.4-2 1.4.13-stable-1 An asynchronous event notification
ii libgssapi-krb5-2 1.9.1+dfsg-1+b1 MIT Kerberos runtime libraries - k
ii libgssglue1 0.2-3 mechanism-switch gssapi library
ii libk5crypto3 1.9.1+dfsg-1+b1 MIT Kerberos runtime libraries - C
ii libkrb5-3 1.9.1+dfsg-1+b1 MIT Kerberos runtime libraries
ii libnfsidmap2 0.24-1 An nfs idmapping library
ii libtirpc1 0.2.2-2 transport-independent RPC library
ii libwrap0 7.6.q-19 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-27 Linux Standard Base 3.2 init scrip
ii netbase 4.45 Basic TCP/IP networking system
ii rpcbind 0.2.0-6 converts RPC program numbers into
ii ucf 3.0025+nmu2 Update Configuration File: preserv
Versions of packages nfs-common recommends:
ii python 2.6.6-14 interactive high-level object-orie
nfs-common suggests no packages.
-- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 19 Jul 2011 17:45:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Steve Langasek <vorlon@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 19 Jul 2011 17:45:03 GMT) (full text, mbox, link).
Message #114 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi Sam,
I've also run into this bug, in the context of preparing to update nfs-utils
in Ubuntu for IPv6 support. My NFS server is running squeeze, and updating
causes the client and server to fail to negotiate as described.
It seems that it's possible to work around it by adding this single line to
the server:
permitted_enctypes = des-cbc-crc
in addition to the 'allow_weak_crypto = true' that was already there.
But what's confusing is that before this change, I had a DES3 *only* key for
this server, and everything was working! How could that be if the server
didn't support the DES3?
To work around this problem locally without having to set permitted_enctypes
for all other services on the NFS server, I've added a new separate
krb5.conf file under /etc, and am setting KRB5_CONFIG in
/etc/init.d/nfs-kernel-server to point to that path.
You mention that fixing this properly requires backporting patches to both
nfs-utils and krb5. Could you provide a reference for the krb5 patch? (I
assume the nfs-utils one is the one Luk already linked to) I'm potentially
willing to help with getting this int a stable update.
Thanks,
--
Steve Langasek Give me a lever long enough and a Free OS
Debian Developer to set it on, and I can move the world.
Ubuntu Developer http://www.debian.org/
slangasek@ubuntu.com vorlon@debian.org
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 19 Jul 2011 18:33:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 19 Jul 2011 18:33:09 GMT) (full text, mbox, link).
Message #119 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
>>>>> "Steve" == Steve Langasek <vorlon@debian.org> writes:
Steve> Hi Sam, I've also run into this bug, in the context of
Steve> preparing to update nfs-utils in Ubuntu for IPv6 support. My
Steve> NFS server is running squeeze, and updating causes the client
Steve> and server to fail to negotiate as described.
Your nfs server is squeeze and your client was squeeze but is now more
than squeeze?
(substitute ubuntu releases with pre-ipv6 nfs-utils as appropriate for
squeeze?)
R24603 in MIT upstream subversion.
See attached.
I'm happy to interact with SRM for the krb5 side of it. However, the
bug as reported didn't seem to be this one because the server involved
was older than squeeze.
so I didn't actually have any users rrequesting a solution to a problem
I knew how to solve. If you have a problem that this krb5 patch and the
mentioned nfs-utils patch solve then we definitely should propose a
backport to SRM. I'll be happy to prepare krb5 packages.
[0001-ticket-6852.patch (text/x-diff, inline)]
From 82affd78ac2c2b13bacf8e004f13f2d0dba5acea Mon Sep 17 00:00:00 2001
From: ghudson <ghudson@dc483132-0cff-0310-8789-dd5450dbe970>
Date: Tue, 25 Jan 2011 00:23:48 +0000
Subject: [PATCH] ticket: 6852
subject: Make gss_krb5_set_allowable_enctypes work for the acceptor
target_version: 1.9.1
tags: pullup
With the addition of enctype negotiation in 1.7, a gss-krb5 acceptor
can choose an enctype for the acceptor subkey other than the one in
the keytab. If the resulting security context will be exported and
re-imported by another gss-krb5 implementation (such as one in the
kernel), the acceptor needs a way to restrict the set of negotiated
enctypes to those supported by the other implementation. We had that
functionality for the initiator already in the form of
gss_krb5_set_allowable_enctypes; this change makes it work for the
acceptor as well.
git-svn-id: svn://anonsvn.mit.edu/svn/krb5/trunk@24603 dc483132-0cff-0310-8789-dd5450dbe970
---
src/lib/gssapi/krb5/accept_sec_context.c | 9 +++++++++
1 files changed, 9 insertions(+), 0 deletions(-)
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index 9d40f68..c3cb2f1 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -623,6 +623,15 @@ kg_accept_krb5(minor_status, context_handle,
goto fail;
}
+ /* Limit the encryption types negotiated (if requested). */
+ if (cred->req_enctypes) {
+ if ((code = krb5_set_default_tgs_enctypes(context,
+ cred->req_enctypes))) {
+ major_status = GSS_S_FAILURE;
+ goto fail;
+ }
+ }
+
if ((code = krb5_rd_req(context, &auth_context, &ap_req,
cred->default_identity ? NULL : cred->name->princ,
cred->keytab,
--
1.7.4.1
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 19 Jul 2011 21:21:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Steve Langasek <vorlon@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 19 Jul 2011 21:21:03 GMT) (full text, mbox, link).
Message #124 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Tue, Jul 19, 2011 at 02:31:36PM -0400, Sam Hartman wrote: > >>>>> "Steve" == Steve Langasek <vorlon@debian.org> writes: > Steve> Hi Sam, I've also run into this bug, in the context of > Steve> preparing to update nfs-utils in Ubuntu for IPv6 support. My > Steve> NFS server is running squeeze, and updating causes the client > Steve> and server to fail to negotiate as described. > Your nfs server is squeeze and your client was squeeze but is now more > than squeeze? > (substitute ubuntu releases with pre-ipv6 nfs-utils as appropriate for > squeeze?) Yes - Ubuntu currently has an nfs-utils package based on 1:1.2.2-4 (precisely the version in squeeze), and I'm in the process of updating it to 1.2.4. > R24603 in MIT upstream subversion. > See attached. Thanks! > I'm happy to interact with SRM for the krb5 side of it. However, the > bug as reported didn't seem to be this one because the server involved > was older than squeeze. Oh, the original report said that the problem happened with a squeeze server. Only agi reported it with a lenny server. > so I didn't actually have any users rrequesting a solution to a problem > I knew how to solve. If you have a problem that this krb5 patch and the > mentioned nfs-utils patch solve then we definitely should propose a > backport to SRM. I'll be happy to prepare krb5 packages. So the originally linked patch for nfs-utils, <http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=d6c1b35c6b40243bfd6fba2591c9f8f2653078c0>, doesn't apply cleanly against the nfs-utils 1.2.2 in squeeze; it appears to have some prerequisites. (The number of args to gssd_acquire_cred has changed.) Anyone know which commits we need here? Or should I just rewrite gssd_acquire_cred(NULL, GSS_C_NT_HOSTBASED_SERVICE) to gssd_acquire_cred(NULL)? -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developer http://www.debian.org/ slangasek@ubuntu.com vorlon@debian.org
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Tue, 19 Jul 2011 21:45:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 19 Jul 2011 21:45:03 GMT) (full text, mbox, link).
Message #129 received at 622146@bugs.debian.org (full text, mbox, reply):
I don't have checkouts handy, but my strong suspicion is that if someone is now passing in GSS_C_NT_HOSTBASED_SERVICE into gssd_acquire_cred and there isn't an argument slot, you can leave it off. gss_c_nt_hostbased_service has always been the default for gssd.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-common.
(Mon, 01 Aug 2011 08:36:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Steve Langasek <vorlon@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 01 Aug 2011 08:36:03 GMT) (full text, mbox, link).
Message #134 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
reassign 622146 nfs-kernel-server,src:krb5 found 622146 nfs-kernel-server/1:1.2.2-4 found 622146 src:krb5/1.8.3+dfsg-4 fixed 622146 nfs-kernel-server/1:1.2.4-1 fixed 622146 src:krb5/1.9.1+dfsg-1 tags 622146 patch thanks On Tue, Jul 19, 2011 at 05:42:34PM -0400, Sam Hartman wrote: > I don't have checkouts handy, but my strong suspicion is that if someone > is now passing in GSS_C_NT_HOSTBASED_SERVICE into gssd_acquire_cred and > there isn't an argument slot, you can leave it off. > gss_c_nt_hostbased_service has always been the default for gssd. Ok, thanks. I've built packages of nfs-utils and krb5 using the referenced backported patches, and can confirm that I'm now able to connect successfully from an nfs-utils 1.2.4 client without having to set permitted_enctypes on the server. I've attached the patches for both packages to this mail. Phil, is it ok for these to be uploaded to stable-proposed-updates? This fixes a bug that makes squeeze kerberized NFS servers unusable with newer clients (e.g., wheezy). Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developer http://www.debian.org/ slangasek@ubuntu.com vorlon@debian.org
[krb5-622146.diff (text/x-diff, attachment)]
[nfs-utils-622146.diff (text/x-diff, attachment)]
[signature.asc (application/pgp-signature, inline)]
Bug reassigned from package 'nfs-common' to 'nfs-kernel-server,src:krb5'.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:36:08 GMT) (full text, mbox, link).
Bug No longer marked as found in versions nfs-utils/1:1.2.3-2 and nfs-utils/1:1.2.2-4.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:36:09 GMT) (full text, mbox, link).
Bug Marked as found in versions nfs-kernel-server/1:1.2.2-4.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:36:10 GMT) (full text, mbox, link).
Bug Marked as fixed in versions nfs-kernel-server/1:1.2.4-1.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:36:10 GMT) (full text, mbox, link).
Added tag(s) patch.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:36:13 GMT) (full text, mbox, link).
Bug Marked as found in versions krb5/1.8.3+dfsg-4.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:51:12 GMT) (full text, mbox, link).
Bug Marked as fixed in versions krb5/1.9.1+dfsg-1.
Request was from Steve Langasek <vorlon@debian.org>
to control@bugs.debian.org.
(Mon, 01 Aug 2011 08:51:14 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 01 Aug 2011 13:06:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 01 Aug 2011 13:06:03 GMT) (full text, mbox, link).
Message #153 received at 622146@bugs.debian.org (full text, mbox, reply):
If I get an ack from SRM i'll do the krb5 upload.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Wed, 03 Aug 2011 21:45:06 GMT) (full text, mbox, link).
Message #156 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Mon, Aug 01, 2011 at 01:34:34AM -0700, Steve Langasek wrote: > On Tue, Jul 19, 2011 at 05:42:34PM -0400, Sam Hartman wrote: > > I don't have checkouts handy, but my strong suspicion is that if someone > > is now passing in GSS_C_NT_HOSTBASED_SERVICE into gssd_acquire_cred and > > there isn't an argument slot, you can leave it off. > > gss_c_nt_hostbased_service has always been the default for gssd. > > Ok, thanks. I've built packages of nfs-utils and krb5 using the referenced > backported patches, and can confirm that I'm now able to connect > successfully from an nfs-utils 1.2.4 client without having to set > permitted_enctypes on the server. Why is the nfs-utils patch needed again? To be able to run nfs-utils in squeeze with a newer kernel? Kind regards Philipp Kern
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Wed, 03 Aug 2011 22:09:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Wed, 03 Aug 2011 22:09:08 GMT) (full text, mbox, link).
Message #161 received at 622146@bugs.debian.org (full text, mbox, reply):
>>>>> "Philipp" == Philipp Kern <pkern@debian.org> writes:
Philipp> On Mon, Aug 01, 2011 at 01:34:34AM -0700, Steve Langasek wrote:
>> On Tue, Jul 19, 2011 at 05:42:34PM -0400, Sam Hartman wrote:
> > I don't have checkouts handy, but my strong suspicion is that if
>> someone > is now passing in GSS_C_NT_HOSTBASED_SERVICE into
>> gssd_acquire_cred and > there isn't an argument slot, you can
>> leave it off. > gss_c_nt_hostbased_service has always been the
>> default for gssd.
>>
>> Ok, thanks. I've built packages of nfs-utils and krb5 using the
>> referenced backported patches, and can confirm that I'm now able
>> to connect successfully from an nfs-utils 1.2.4 client without
>> having to set permitted_enctypes on the server.
Philipp> Why is the nfs-utils patch needed again? To be able to run
Philipp> nfs-utils in squeeze with a newer kernel?
No. The issue is that sid clients will ask a squeeze server to do
something the squeeze kernel can't handle. However, rather than asking
the kernel you ask the nfs-utils userspace. The squeeze krb5 can handle
the new encryption type and so it negotiates something, tries to stuff
it into the kernel, and doesn't even know how to do that.
The krb5 patch revises an existing API which allows userspace to tell
krb5 about the kernel capabilities to apply to the server as well as the
client.
the nfs-utils patch tells the server userspace code to call that
existing API which is only called on the client in squeeze.
The failure mode is that without both patches, squeeze servers fail to
work with sid clients running sid kernels.
--Sam
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Fri, 05 Aug 2011 17:15:03 GMT) (full text, mbox, link).
Message #164 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Mon, Aug 01, 2011 at 01:34:34AM -0700, Steve Langasek wrote: > On Tue, Jul 19, 2011 at 05:42:34PM -0400, Sam Hartman wrote: > > I don't have checkouts handy, but my strong suspicion is that if someone > > is now passing in GSS_C_NT_HOSTBASED_SERVICE into gssd_acquire_cred and > > there isn't an argument slot, you can leave it off. > > gss_c_nt_hostbased_service has always been the default for gssd. > > Ok, thanks. I've built packages of nfs-utils and krb5 using the referenced > backported patches, and can confirm that I'm now able to connect > successfully from an nfs-utils 1.2.4 client without having to set > permitted_enctypes on the server. > > I've attached the patches for both packages to this mail. Phil, is it ok > for these to be uploaded to stable-proposed-updates? This fixes a bug that > makes squeeze kerberized NFS servers unusable with newer clients (e.g., > wheezy). Please go ahead. I really hope that the regression potential is low for existing clients. Let's hope we find it out before the point release. (The change in nfs-utils is streching the guidelines a bit.) Kind regards Philipp Kern
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Tue, 09 Aug 2011 00:12:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Tue, 09 Aug 2011 00:12:03 GMT) (full text, mbox, link).
Message #169 received at 622146@bugs.debian.org (full text, mbox, reply):
I expect to get to the krb5 package in a day or so. I expect nfs-utils will want to up its build-depends on krb5 to 1.8.3+dfsg-4squeeze2
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Sun, 04 Sep 2011 15:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to "Adam D. Barratt" <adam@adam-barratt.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Sun, 04 Sep 2011 15:39:03 GMT) (full text, mbox, link).
Message #174 received at 622146@bugs.debian.org (full text, mbox, reply):
On Fri, 2011-08-05 at 19:09 +0200, Philipp Kern wrote: > On Mon, Aug 01, 2011 at 01:34:34AM -0700, Steve Langasek wrote: > > I've attached the patches for both packages to this mail. Phil, is it ok > > for these to be uploaded to stable-proposed-updates? This fixes a bug that > > makes squeeze kerberized NFS servers unusable with newer clients (e.g., > > wheezy). > > Please go ahead. I really hope that the regression potential is low > for existing clients. Let's hope we find it out before the point > release. (The change in nfs-utils is streching the guidelines a bit.) The krb5 package was uploaded and I've (somewhat belatedly) marked it for acceptance at the next dinstall. What's the status of the nfs-utils upload? Regards, Adam
Reply sent
to Sam Hartman <hartmans@debian.org>:
You have taken responsibility.
(Sun, 04 Sep 2011 20:00:03 GMT) (full text, mbox, link).
Notification sent
to Rico Rommel <rico@bierrommel.de>:
Bug acknowledged by developer.
(Sun, 04 Sep 2011 20:00:03 GMT) (full text, mbox, link).
Message #179 received at 622146-close@bugs.debian.org (full text, mbox, reply):
Source: krb5
Source-Version: 1.8.3+dfsg-4squeeze2
We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive:
krb5-admin-server_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/krb5-admin-server_1.8.3+dfsg-4squeeze2_i386.deb
krb5-doc_1.8.3+dfsg-4squeeze2_all.deb
to main/k/krb5/krb5-doc_1.8.3+dfsg-4squeeze2_all.deb
krb5-kdc-ldap_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/krb5-kdc-ldap_1.8.3+dfsg-4squeeze2_i386.deb
krb5-kdc_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/krb5-kdc_1.8.3+dfsg-4squeeze2_i386.deb
krb5-multidev_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/krb5-multidev_1.8.3+dfsg-4squeeze2_i386.deb
krb5-pkinit_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/krb5-pkinit_1.8.3+dfsg-4squeeze2_i386.deb
krb5-user_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/krb5-user_1.8.3+dfsg-4squeeze2_i386.deb
krb5_1.8.3+dfsg-4squeeze2.diff.gz
to main/k/krb5/krb5_1.8.3+dfsg-4squeeze2.diff.gz
krb5_1.8.3+dfsg-4squeeze2.dsc
to main/k/krb5/krb5_1.8.3+dfsg-4squeeze2.dsc
libgssapi-krb5-2_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libgssapi-krb5-2_1.8.3+dfsg-4squeeze2_i386.deb
libgssrpc4_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libgssrpc4_1.8.3+dfsg-4squeeze2_i386.deb
libk5crypto3_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libk5crypto3_1.8.3+dfsg-4squeeze2_i386.deb
libkadm5clnt-mit7_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkadm5clnt-mit7_1.8.3+dfsg-4squeeze2_i386.deb
libkadm5srv-mit7_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkadm5srv-mit7_1.8.3+dfsg-4squeeze2_i386.deb
libkdb5-4_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkdb5-4_1.8.3+dfsg-4squeeze2_i386.deb
libkrb5-3_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkrb5-3_1.8.3+dfsg-4squeeze2_i386.deb
libkrb5-dbg_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkrb5-dbg_1.8.3+dfsg-4squeeze2_i386.deb
libkrb5-dev_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkrb5-dev_1.8.3+dfsg-4squeeze2_i386.deb
libkrb53_1.8.3+dfsg-4squeeze2_all.deb
to main/k/krb5/libkrb53_1.8.3+dfsg-4squeeze2_all.deb
libkrb5support0_1.8.3+dfsg-4squeeze2_i386.deb
to main/k/krb5/libkrb5support0_1.8.3+dfsg-4squeeze2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 622146@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sam Hartman <hartmans@debian.org> (supplier of updated krb5 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Tue, 09 Aug 2011 10:53:59 -0400
Source: krb5
Binary: krb5-user krb5-kdc krb5-kdc-ldap krb5-admin-server krb5-multidev libkrb5-dev libkrb5-dbg krb5-pkinit krb5-doc libkrb5-3 libgssapi-krb5-2 libgssrpc4 libkadm5srv-mit7 libkadm5clnt-mit7 libk5crypto3 libkdb5-4 libkrb5support0 libkrb53
Architecture: source all i386
Version: 1.8.3+dfsg-4squeeze2
Distribution: stable
Urgency: low
Maintainer: Sam Hartman <hartmans@debian.org>
Changed-By: Sam Hartman <hartmans@debian.org>
Description:
krb5-admin-server - MIT Kerberos master server (kadmind)
krb5-doc - Documentation for MIT Kerberos
krb5-kdc - MIT Kerberos key server (KDC)
krb5-kdc-ldap - MIT Kerberos key server (KDC) LDAP plugin
krb5-multidev - Development files for MIT Kerberos without Heimdal conflict
krb5-pkinit - PKINIT plugin for MIT Kerberos
krb5-user - Basic programs to authenticate using MIT Kerberos
libgssapi-krb5-2 - MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
libgssrpc4 - MIT Kerberos runtime libraries - GSS enabled ONCRPC
libk5crypto3 - MIT Kerberos runtime libraries - Crypto Library
libkadm5clnt-mit7 - MIT Kerberos runtime libraries - Administration Clients
libkadm5srv-mit7 - MIT Kerberos runtime libraries - KDC and Admin Server
libkdb5-4 - MIT Kerberos runtime libraries - Kerberos database
libkrb5-3 - MIT Kerberos runtime libraries
libkrb5-dbg - Debugging files for MIT Kerberos
libkrb5-dev - Headers and development libraries for MIT Kerberos
libkrb53 - transitional package for MIT Kerberos libraries
libkrb5support0 - MIT Kerberos runtime libraries - Support library
Closes: 622146
Changes:
krb5 (1.8.3+dfsg-4squeeze2) stable; urgency=low
.
* Upstream ticket 6852: permit gss_set_allowable_enctypes to restirct
acceptor enctypes. Required in order to permit newer than squeeze
clients to talk to a squeeze nfs server without degrading security
for non-nfs applications on the box, Closes: #622146
Checksums-Sha1:
ee1444befef982f3223f3f493430a4266dde0512 1610 krb5_1.8.3+dfsg-4squeeze2.dsc
fd817286d9a5a90fd620427c12fce081a20f05a1 105232 krb5_1.8.3+dfsg-4squeeze2.diff.gz
937bc52291d4528a50daf44463cdf52acf23a841 2255782 krb5-doc_1.8.3+dfsg-4squeeze2_all.deb
9236a243401d9794a0c73c7d77821e429c0e4f57 1373270 libkrb53_1.8.3+dfsg-4squeeze2_all.deb
df3bf5da7fe2ee0dd4fc273d4d64622090002fe9 129904 krb5-user_1.8.3+dfsg-4squeeze2_i386.deb
b7b1b620b5b605649bf198027d46a8c1dad84170 202532 krb5-kdc_1.8.3+dfsg-4squeeze2_i386.deb
6483c5b9bd14721c301730e875957aa2d3f68fcc 112612 krb5-kdc-ldap_1.8.3+dfsg-4squeeze2_i386.deb
2c494da5314d81497791a14176e0b9c0b7e3c626 106292 krb5-admin-server_1.8.3+dfsg-4squeeze2_i386.deb
5900bfb55470ef72dac73fbd652c0aa5949502e8 104334 krb5-multidev_1.8.3+dfsg-4squeeze2_i386.deb
a3b5d87969cb98bcc2f4ce91198734fc223d281f 36828 libkrb5-dev_1.8.3+dfsg-4squeeze2_i386.deb
e3cc03b72c10e9bde9032f03496ec24a0dfb1fd7 1611474 libkrb5-dbg_1.8.3+dfsg-4squeeze2_i386.deb
a75d88a35e3a8747fd8209fcf614316baaaa9860 75332 krb5-pkinit_1.8.3+dfsg-4squeeze2_i386.deb
2f77671dc17c47ae83c12cf66faac22169863714 356844 libkrb5-3_1.8.3+dfsg-4squeeze2_i386.deb
5852805851c5567655c839dbf648b33ad2741384 123190 libgssapi-krb5-2_1.8.3+dfsg-4squeeze2_i386.deb
bf4fa2e3479776b45232a8456dd3ec84ae83c0f0 77640 libgssrpc4_1.8.3+dfsg-4squeeze2_i386.deb
9847a813b03b797baf6e867fe9829af8f08ca3b7 74740 libkadm5srv-mit7_1.8.3+dfsg-4squeeze2_i386.deb
98dedfb658ef6c79146d44b189f2d6b5dd0cef29 61350 libkadm5clnt-mit7_1.8.3+dfsg-4squeeze2_i386.deb
2381ae709ca19277bf0db0a8157efc8e66c5655b 98486 libk5crypto3_1.8.3+dfsg-4squeeze2_i386.deb
0aaf3ae4510f9486fe263ea20622cd408a02dd28 61336 libkdb5-4_1.8.3+dfsg-4squeeze2_i386.deb
7d71a6ebc8193008796b526909fb61b26854727a 44030 libkrb5support0_1.8.3+dfsg-4squeeze2_i386.deb
Checksums-Sha256:
f90b5a3c8b214150df50895cc64d75fc619fb0bdc04c1732767abd1752ada2ba 1610 krb5_1.8.3+dfsg-4squeeze2.dsc
b4a79817ce86db126e1c9907993cc263cd830ddfbcfa11df9c992e0b508414a5 105232 krb5_1.8.3+dfsg-4squeeze2.diff.gz
f8f8ad8ecd2c975f217d7128bbe5fb6da61a5f8a0b1c0b1fd04a013d62dfd74f 2255782 krb5-doc_1.8.3+dfsg-4squeeze2_all.deb
03d9e15c8e9ec831864bb803da87ab28c825d89361b0b2882c856318ebfc0b7e 1373270 libkrb53_1.8.3+dfsg-4squeeze2_all.deb
2871b48a5090d9836a716aae30938b38babbfa459e366243458581d71b3414c6 129904 krb5-user_1.8.3+dfsg-4squeeze2_i386.deb
2f4684993b62d543d45a96c8b2ed6aa6ca87045e795609bdbb3ba394ae560190 202532 krb5-kdc_1.8.3+dfsg-4squeeze2_i386.deb
db372bbbe41cf9df2cebc9e154f792ec78df953b1865ea72f5b085e694ffd81d 112612 krb5-kdc-ldap_1.8.3+dfsg-4squeeze2_i386.deb
ca097d14fb8d8f8864e41658339c3aba02bc12b070c40437d76f77209a8bf5c0 106292 krb5-admin-server_1.8.3+dfsg-4squeeze2_i386.deb
aa65dbc54737c7e93b53eee8610d47d84c47ae9beb21b8b5c30bedbcc5ec34a9 104334 krb5-multidev_1.8.3+dfsg-4squeeze2_i386.deb
d66616f23fd9051ca0bf25bb10659720e894bb677ab68c543571ecf5b278c61e 36828 libkrb5-dev_1.8.3+dfsg-4squeeze2_i386.deb
2896dd7b6b26cb90ecc73992c054fe2edea30f1fd908a7dfef7983a230547569 1611474 libkrb5-dbg_1.8.3+dfsg-4squeeze2_i386.deb
e4f2c8f2d989c9c71e6a77afdf79604a0a879125b474419c4b0348685f2b5152 75332 krb5-pkinit_1.8.3+dfsg-4squeeze2_i386.deb
816e79f7c9c68424ad2cf3a1a66a1194b9ffefe96a7068be2d60bc645e88fae4 356844 libkrb5-3_1.8.3+dfsg-4squeeze2_i386.deb
7106d37c18168c565393b8189196f032703c27903b996ce4d5b279a489bdc897 123190 libgssapi-krb5-2_1.8.3+dfsg-4squeeze2_i386.deb
82ad3f0c357f4a9648b65af98547b7108c901808cf846d774f0db8581a19ece9 77640 libgssrpc4_1.8.3+dfsg-4squeeze2_i386.deb
b8b7c4475a0ed56ab1a3fcd04dc0020a32534d5e3be984246eecbfda2705e773 74740 libkadm5srv-mit7_1.8.3+dfsg-4squeeze2_i386.deb
7cf63c179e088516c10107755bc6a89ed355cb1eebca08180e2c3cd592f6d6d4 61350 libkadm5clnt-mit7_1.8.3+dfsg-4squeeze2_i386.deb
87e29e205d969270f36189da99a90087840f41fd00a8907ba44a7f37d29115d3 98486 libk5crypto3_1.8.3+dfsg-4squeeze2_i386.deb
4239abe513f91e50942bc0ca8fb4ebfddd1595130a2f2b3b5fb9ab29150c559c 61336 libkdb5-4_1.8.3+dfsg-4squeeze2_i386.deb
574ead58543def910a1f801839e161552ec2be7703e1f8f0e1b34a44805268a9 44030 libkrb5support0_1.8.3+dfsg-4squeeze2_i386.deb
Files:
1a793ea324460a474bd9e5066a692ef7 1610 net standard krb5_1.8.3+dfsg-4squeeze2.dsc
bfd3c4374f87e5e4447d193a3d0f5433 105232 net standard krb5_1.8.3+dfsg-4squeeze2.diff.gz
b7ebe4092f6482b742d4ef0b97955acd 2255782 doc optional krb5-doc_1.8.3+dfsg-4squeeze2_all.deb
ebe84f553135e6922ddbb9a77731fb1c 1373270 oldlibs extra libkrb53_1.8.3+dfsg-4squeeze2_all.deb
bed335fb31a1267f58ec9abd79508642 129904 net optional krb5-user_1.8.3+dfsg-4squeeze2_i386.deb
dbc072dec5214186e22cfa278146069e 202532 net optional krb5-kdc_1.8.3+dfsg-4squeeze2_i386.deb
edebbe86db96fe50fa6329e96ed1b80f 112612 net extra krb5-kdc-ldap_1.8.3+dfsg-4squeeze2_i386.deb
843350236384d9685be9e7b951b125e7 106292 net optional krb5-admin-server_1.8.3+dfsg-4squeeze2_i386.deb
1d8c2a1307e0fd0536772e1fff1d11e4 104334 libdevel optional krb5-multidev_1.8.3+dfsg-4squeeze2_i386.deb
fc49665a8dddb3b31eb6ebec076dcfe2 36828 libdevel extra libkrb5-dev_1.8.3+dfsg-4squeeze2_i386.deb
2e4a744cc3bdb191813781c1de52fbcd 1611474 debug extra libkrb5-dbg_1.8.3+dfsg-4squeeze2_i386.deb
9ce694b79ed1d259dbf838ad47758a6f 75332 net extra krb5-pkinit_1.8.3+dfsg-4squeeze2_i386.deb
72959dc99b16eacd76337cc63836f318 356844 libs standard libkrb5-3_1.8.3+dfsg-4squeeze2_i386.deb
5569da071412e2dd1f5609752621a0a4 123190 libs standard libgssapi-krb5-2_1.8.3+dfsg-4squeeze2_i386.deb
ba143a4c71c10978b5126f41121818b5 77640 libs standard libgssrpc4_1.8.3+dfsg-4squeeze2_i386.deb
7270bd787b3a70e3030d054e65aaa01e 74740 libs standard libkadm5srv-mit7_1.8.3+dfsg-4squeeze2_i386.deb
b6706ae978d8232247e39a4e173fff00 61350 libs standard libkadm5clnt-mit7_1.8.3+dfsg-4squeeze2_i386.deb
8694a65e3785c873f053ce9dbec8094c 98486 libs standard libk5crypto3_1.8.3+dfsg-4squeeze2_i386.deb
1393f6d0330bcd69d9318fe6a69df034 61336 libs standard libkdb5-4_1.8.3+dfsg-4squeeze2_i386.deb
8eec30157dd7dbc397396b0a3fb2561c 44030 libs standard libkrb5support0_1.8.3+dfsg-4squeeze2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk5BUfkACgkQ/I12czyGJg/1DwCfUa7+EnUNOGYyrC09JkgVMgh8
JBoAoIcCZx/pWGXs3fZKB1FwVY2Pz7bS
=++VF
-----END PGP SIGNATURE-----
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 05 Sep 2011 16:51:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Mon, 05 Sep 2011 16:51:05 GMT) (full text, mbox, link).
Message #184 received at 622146@bugs.debian.org (full text, mbox, reply):
>>>>> "Adam" == Adam D Barratt <adam@adam-barratt.org.uk> writes:
Adam> The krb5 package was uploaded and I've (somewhat belatedly)
Adam> marked it for acceptance at the next dinstall. What's the
Adam> status of the nfs-utils upload?
My guess is they were waiting for krb5.
Remember they have to increase build-depends for the krb5 you just
accepted.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 12 Sep 2011 18:27:09 GMT) (full text, mbox, link).
Acknowledgement sent
to "Adam D. Barratt" <adam@adam-barratt.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 12 Sep 2011 18:27:09 GMT) (full text, mbox, link).
Message #189 received at 622146@bugs.debian.org (full text, mbox, reply):
On Mon, 2011-09-05 at 12:46 -0400, Sam Hartman wrote: > >>>>> "Adam" == Adam D Barratt <adam@adam-barratt.org.uk> writes: > > > Adam> The krb5 package was uploaded and I've (somewhat belatedly) > Adam> marked it for acceptance at the next dinstall. What's the > Adam> status of the nfs-utils upload? > > My guess is they were waiting for krb5. > Remember they have to increase build-depends for the krb5 you just > accepted. If it requires a versioned build-dependency, then both packages could just have been uploaded at the same time. Even if we accepted them both from p-u-NEW together, the buildds would have put nfs-common in to the "build-deps uninstallable" state until the necessary version of krb5 was available. Regards, Adam
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 03 Oct 2011 17:24:13 GMT) (full text, mbox, link).
Message #192 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Mon, Sep 05, 2011 at 12:46:13PM -0400, Sam Hartman wrote: > >>>>> "Adam" == Adam D Barratt <adam@adam-barratt.org.uk> writes: > Adam> The krb5 package was uploaded and I've (somewhat belatedly) > Adam> marked it for acceptance at the next dinstall. What's the > Adam> status of the nfs-utils upload? > My guess is they were waiting for krb5. > Remember they have to increase build-depends for the krb5 you just > accepted. AFAICS this now missed the 6.0.3 point release. Kind regards, Philipp Kern -- .''`. Philipp Kern Debian Developer : :' : http://philkern.de Stable Release Manager `. `' xmpp:phil@0x539.de Wanna-Build Admin `- finger pkern/key@db.debian.org
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 03 Oct 2011 20:06:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 03 Oct 2011 20:06:06 GMT) (full text, mbox, link).
Message #197 received at 622146@bugs.debian.org (full text, mbox, reply):
On 10/03/2011 07:20 PM, Philipp Kern wrote: > On Mon, Sep 05, 2011 at 12:46:13PM -0400, Sam Hartman wrote: >>>>>>> "Adam" == Adam D Barratt <adam@adam-barratt.org.uk> writes: >> Adam> The krb5 package was uploaded and I've (somewhat belatedly) >> Adam> marked it for acceptance at the next dinstall. What's the >> Adam> status of the nfs-utils upload? >> My guess is they were waiting for krb5. >> Remember they have to increase build-depends for the krb5 you just >> accepted. > > AFAICS this now missed the 6.0.3 point release. Upstream did some changes related to this which should fix it in unstable for the squeeze -> 2.6.35 kernel range. Kernels afterwards should not have the problem. It would be good if someone could confirm that it is really fixed in unstable now. Cheers Luk
Message sent on
to Rico Rommel <rico@bierrommel.de>:
Bug#622146.
(Mon, 03 Oct 2011 20:06:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Wed, 05 Oct 2011 21:09:34 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Wed, 05 Oct 2011 21:12:18 GMT) (full text, mbox, link).
Message #205 received at 622146@bugs.debian.org (full text, mbox, reply):
It should be fixed in unstable by actually supporting the new enctypes. While ncice, that rather misses the point.
Message sent on
to Rico Rommel <rico@bierrommel.de>:
Bug#622146.
(Wed, 05 Oct 2011 21:14:27 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Sun, 23 Oct 2011 01:06:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Rob Naccarato <rob@naccy.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Sun, 23 Oct 2011 01:06:03 GMT) (full text, mbox, link).
Message #213 received at 622146@bugs.debian.org (full text, mbox, reply):
This doesn't appear to be fixed to me. I get the same problems. I have even installed backported kernel (2.6.39-bpo.2-amd64) and nfs-utils (1:1.2.4-1~bpo60+1) and I still get these: Oct 22 20:24:54 blackdog rpc.svcgssd[8502]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted I have turned off and on allow_weak_crypto in both clients and servers and I'm at a complete loss as to what to do now. Can someone advise?
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Sun, 23 Oct 2011 17:21:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 23 Oct 2011 17:21:07 GMT) (full text, mbox, link).
Message #218 received at 622146@bugs.debian.org (full text, mbox, reply):
>>>>> "Rob" == Rob Naccarato <rob@naccy.org> writes:
Rob> This doesn't appear to be fixed to me. I get the same
Rob> problems. I have even installed backported kernel
Rob> (2.6.39-bpo.2-amd64) and nfs-utils (1:1.2.4-1~bpo60+1) and I
Rob> still get these:
This requires fixes in krb5 and nfs-utils.
krb5 has been fixed, but nothing gets better until the nfs-utils fix.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Sun, 23 Oct 2011 18:27:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Rob Naccarato <rob@naccy.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Sun, 23 Oct 2011 18:27:05 GMT) (full text, mbox, link).
Message #223 received at 622146@bugs.debian.org (full text, mbox, reply):
On 11-10-23 01:18 PM, Sam Hartman wrote: >>>>>> "Rob" == Rob Naccarato<rob@naccy.org> writes: > > Rob> This doesn't appear to be fixed to me. I get the same > Rob> problems. I have even installed backported kernel > Rob> (2.6.39-bpo.2-amd64) and nfs-utils (1:1.2.4-1~bpo60+1) and I > Rob> still get these: > > This requires fixes in krb5 and nfs-utils. > krb5 has been fixed, but nothing gets better until the nfs-utils fix. So, nfs-utils 1.2.5, then? When's that suppose to be available? I imagine this is a pretty critical issue for people. It is for me, at least.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Sun, 23 Oct 2011 21:21:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Daniel Kahn Gillmor <dkg@fifthhorseman.net>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Sun, 23 Oct 2011 21:21:23 GMT) (full text, mbox, link).
Message #228 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On 10/23/2011 02:25 PM, Rob Naccarato wrote:
> On 11-10-23 01:18 PM, Sam Hartman wrote:
>>>>>>> "Rob" == Rob Naccarato<rob@naccy.org> writes:
>>
>> Rob> This doesn't appear to be fixed to me. I get the same
>> Rob> problems. I have even installed backported kernel
>> Rob> (2.6.39-bpo.2-amd64) and nfs-utils (1:1.2.4-1~bpo60+1) and I
>> Rob> still get these:
>>
>> This requires fixes in krb5 and nfs-utils.
>> krb5 has been fixed, but nothing gets better until the nfs-utils fix.
>
> So, nfs-utils 1.2.5, then? When's that suppose to be available?
>
> I imagine this is a pretty critical issue for people. It is for me, at
> least.
I'm the current backporter of nfs-utils. I use 1:1.2.4-1~bpo60+1 with
the squeeze-backports kernel (nfs server and nfs clients both use these
versions) and a squeeze kdc configured with:
supported_enctypes = aes128-cts:normal
I'm able to use kerberized (sec=krb5p) nfsv4 mounts in this arrangement.
Could you clarify how your configuration differs from what i've
described above so i could be sure what might need changing?
Regards,
--dkg
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 24 Oct 2011 13:45:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Rob Naccarato <rob@naccy.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 24 Oct 2011 13:45:03 GMT) (full text, mbox, link).
Message #233 received at 622146@bugs.debian.org (full text, mbox, reply):
On Sun, Oct 23, 2011 at 05:16:59PM -0400, Daniel Kahn Gillmor wrote:
> On 10/23/2011 02:25 PM, Rob Naccarato wrote:
> > On 11-10-23 01:18 PM, Sam Hartman wrote:
> >>>>>>> "Rob" == Rob Naccarato<rob@naccy.org> writes:
> >>
> >> Rob> This doesn't appear to be fixed to me. I get the same
> >> Rob> problems. I have even installed backported kernel
> >> Rob> (2.6.39-bpo.2-amd64) and nfs-utils (1:1.2.4-1~bpo60+1) and I
> >> Rob> still get these:
> >>
> >> This requires fixes in krb5 and nfs-utils.
> >> krb5 has been fixed, but nothing gets better until the nfs-utils fix.
> >
> > So, nfs-utils 1.2.5, then? When's that suppose to be available?
> >
> > I imagine this is a pretty critical issue for people. It is for me, at
> > least.
>
> I'm the current backporter of nfs-utils. I use 1:1.2.4-1~bpo60+1 with
> the squeeze-backports kernel (nfs server and nfs clients both use these
> versions) and a squeeze kdc configured with:
>
> supported_enctypes = aes128-cts:normal
>
> I'm able to use kerberized (sec=krb5p) nfsv4 mounts in this arrangement.
> Could you clarify how your configuration differs from what i've
> described above so i could be sure what might need changing?
Ok, here we go.
supported_enctypes = aes256-cts:normal arcfour-hmac:normal \
des3-hmac-sha1:normal des-cbc-crc:normal des:normal des:v4 des:norealm \
des:onlyrealm des:afs3 aes128-cts:normal
Client (khan) attempting to use sec=krb5.
root@khan:/# klist -e -k /etc/krb5.keytab
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
----
--------------------------------------------------------------------------
2 host/khan.some.domain.ca@NACCY.ORG (AES-256 CTS mode with 96-bit SHA-1
HMAC)
2 host/khan.some.domain.ca@NACCY.ORG (ArcFour with HMAC/md5)
2 host/khan.some.domain.ca@NACCY.ORG (Triple DES cbc mode with HMAC/sha1)
2 host/khan.some.domain.ca@NACCY.ORG (DES cbc mode with CRC-32)
2 nfs/khan.some.domain.ca@NACCY.ORG (AES-256 CTS mode with 96-bit SHA-1
HMAC)
2 nfs/khan.some.domain.ca@NACCY.ORG (ArcFour with HMAC/md5)
2 nfs/khan.some.domain.ca@NACCY.ORG (Triple DES cbc mode with HMAC/sha1)
2 nfs/khan.some.domain.ca@NACCY.ORG (DES cbc mode with CRC-32)
/etc/fstab:
blackdog:/ /shares nfs4 _netdev,auto,sec=krb5,acl 0 0
Server (blackdog), with kdc, exporting nfs4, when I attempt to mount the above:
Oct 24 09:32:36 blackdog rpc.svcgssd[22979]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - Encryption type not
permitted
Both machines, client and server have:
linux-image-2.6.39-bpo.2-amd64
nfs-kernel-server 1:1.2.4-1~bpo60+1
Both machines, client and server have in krb5.conf:
allow_weak_crypto = true
Thanks.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 24 Oct 2011 16:03:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Daniel Kahn Gillmor <dkg@fifthhorseman.net>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 24 Oct 2011 16:03:05 GMT) (full text, mbox, link).
Message #238 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On 10/24/2011 09:42 AM, Rob Naccarato wrote: > supported_enctypes = aes256-cts:normal arcfour-hmac:normal \ > des3-hmac-sha1:normal des-cbc-crc:normal des:normal des:v4 des:norealm \ > des:onlyrealm des:afs3 aes128-cts:normal > > Client (khan) attempting to use sec=krb5. > root@khan:/# klist -e -k /etc/krb5.keytab > Keytab name: WRFILE:/etc/krb5.keytab > KVNO Principal > ---- > -------------------------------------------------------------------------- > 2 host/khan.some.domain.ca@NACCY.ORG (AES-256 CTS mode with 96-bit SHA-1 > HMAC) > 2 host/khan.some.domain.ca@NACCY.ORG (ArcFour with HMAC/md5) > 2 host/khan.some.domain.ca@NACCY.ORG (Triple DES cbc mode with HMAC/sha1) > 2 host/khan.some.domain.ca@NACCY.ORG (DES cbc mode with CRC-32) > 2 nfs/khan.some.domain.ca@NACCY.ORG (AES-256 CTS mode with 96-bit SHA-1 > HMAC) > 2 nfs/khan.some.domain.ca@NACCY.ORG (ArcFour with HMAC/md5) > 2 nfs/khan.some.domain.ca@NACCY.ORG (Triple DES cbc mode with HMAC/sha1) > 2 nfs/khan.some.domain.ca@NACCY.ORG (DES cbc mode with CRC-32) this appears to have everything *but* aes128-cts:normal, fwiw. My example client has: 0 example:~# klist -e -k /etc/krb5.keytab Keytab name: WRFILE:/etc/krb5.keytab KVNO Principal ---- -------------------------------------------------------------------------- 2 host/example.example.org@EXAMPLE.ORG (AES-128 CTS mode with 96-bit SHA-1 HMAC) 0 example:~# > /etc/fstab: > blackdog:/ /shares nfs4 _netdev,auto,sec=krb5,acl 0 0 > 0 example:~# grep nfs /etc/fstab nfshost:/ /usr/local/data nfs4 sec=krb5p,fsc 0 0 0 example:~# i don't think the fsc is relevant to this discussion -- and i can't imagine that the difference between krb5 and krb5p is the issue. > Server (blackdog), with kdc, exporting nfs4, when I attempt to mount the above: > > Oct 24 09:32:36 blackdog rpc.svcgssd[22979]: ERROR: GSS-API: error in > handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS > failure. Minor code may provide more information) - Encryption type not > permitted can you show the same klist on blackdog? here's what i've got on my server: 0 nfshost:~# klist -e -k /etc/krb5.keytab Keytab name: WRFILE:/etc/krb5.keytab KVNO Principal ---- -------------------------------------------------------------------------- 8 nfs/nfshost.example.org@EXAMPLE.ORG (AES-128 CTS mode with 96-bit SHA-1 HMAC) 0 nfshost:~# > Both machines, client and server have: > > linux-image-2.6.39-bpo.2-amd64 > nfs-kernel-server 1:1.2.4-1~bpo60+1 you shouldn't need nfs-kernel-server on the client -- what version of nfs-common do you have on the client? > Both machines, client and server have in krb5.conf: > > allow_weak_crypto = true A useful test might be to *reduce* the number of supported_enctypes to a select one or two, then change the keys for the client and the server (and for any user account using krb5 authentication) and re-try. hth, --dkg
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 24 Oct 2011 19:12:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Rob Naccarato <rob@naccy.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 24 Oct 2011 19:12:03 GMT) (full text, mbox, link).
Message #243 received at 622146@bugs.debian.org (full text, mbox, reply):
On Mon, Oct 24, 2011 at 12:00:17PM -0400, Daniel Kahn Gillmor wrote: > On 10/24/2011 09:42 AM, Rob Naccarato wrote: > > > supported_enctypes = aes256-cts:normal arcfour-hmac:normal \ > > des3-hmac-sha1:normal des-cbc-crc:normal des:normal des:v4 des:norealm \ > > des:onlyrealm des:afs3 aes128-cts:normal > > > > Client (khan) attempting to use sec=krb5. > > root@khan:/# klist -e -k /etc/krb5.keytab > > Keytab name: WRFILE:/etc/krb5.keytab > > KVNO Principal > > ---- > > -------------------------------------------------------------------------- > > 2 host/khan.some.domain.ca@NACCY.ORG (AES-256 CTS mode with 96-bit SHA-1 > > HMAC) > > 2 host/khan.some.domain.ca@NACCY.ORG (ArcFour with HMAC/md5) > > 2 host/khan.some.domain.ca@NACCY.ORG (Triple DES cbc mode with HMAC/sha1) > > 2 host/khan.some.domain.ca@NACCY.ORG (DES cbc mode with CRC-32) > > 2 nfs/khan.some.domain.ca@NACCY.ORG (AES-256 CTS mode with 96-bit SHA-1 > > HMAC) > > 2 nfs/khan.some.domain.ca@NACCY.ORG (ArcFour with HMAC/md5) > > 2 nfs/khan.some.domain.ca@NACCY.ORG (Triple DES cbc mode with HMAC/sha1) > > 2 nfs/khan.some.domain.ca@NACCY.ORG (DES cbc mode with CRC-32) > > this appears to have everything *but* aes128-cts:normal, fwiw. > > My example client has: > > > 0 example:~# klist -e -k /etc/krb5.keytab > Keytab name: WRFILE:/etc/krb5.keytab > KVNO Principal > ---- > -------------------------------------------------------------------------- > 2 host/example.example.org@EXAMPLE.ORG (AES-128 CTS mode with 96-bit > SHA-1 HMAC) > 0 example:~# Fair enough, I now have this on the client: root@khan:/etc# klist -e -k /etc/krb5.keytab Keytab name: WRFILE:/etc/krb5.keytab KVNO Principal ---- -------------------------------------------------------------------------- 4 nfs/khan.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 HMAC) 4 host/khan.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 HMAC) I also have this on the server: blackdog:/etc# klist -e -k /etc/krb5.keytab Keytab name: WRFILE:/etc/krb5.keytab KVNO Principal ---- -------------------------------------------------------------------------- 8 host/blackdog.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 HMAC) 7 nfs/blackdog.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 HMAC) > > > /etc/fstab: > > blackdog:/ /shares nfs4 _netdev,auto,sec=krb5,acl 0 0 > > > > > 0 example:~# grep nfs /etc/fstab > nfshost:/ /usr/local/data nfs4 sec=krb5p,fsc 0 0 > 0 example:~# > > i don't think the fsc is relevant to this discussion -- and i can't > imagine that the difference between krb5 and krb5p is the issue. Yep, and I have no need for the encryption across the wire, either. > > > Server (blackdog), with kdc, exporting nfs4, when I attempt to mount the above: > > > > Oct 24 09:32:36 blackdog rpc.svcgssd[22979]: ERROR: GSS-API: error in > > handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS > > failure. Minor code may provide more information) - Encryption type not > > permitted > > can you show the same klist on blackdog? here's what i've got on my server: > > 0 nfshost:~# klist -e -k /etc/krb5.keytab > Keytab name: WRFILE:/etc/krb5.keytab > KVNO Principal > ---- > -------------------------------------------------------------------------- > 8 nfs/nfshost.example.org@EXAMPLE.ORG (AES-128 CTS mode with 96-bit > SHA-1 HMAC) > 0 nfshost:~# Yup, shown above. > > > Both machines, client and server have: > > > > linux-image-2.6.39-bpo.2-amd64 > > nfs-kernel-server 1:1.2.4-1~bpo60+1 > > you shouldn't need nfs-kernel-server on the client -- what version of > nfs-common do you have on the client? > nfs-common 1:1.2.4-1~bpo60+1 > > Both machines, client and server have in krb5.conf: > > > > allow_weak_crypto = true > > A useful test might be to *reduce* the number of supported_enctypes to a > select one or two, then change the keys for the client and the server > (and for any user account using krb5 authentication) and re-try. So, reduce the list to, say, just aes128-cts:normal? Should I also remove the allow_weak_crypto option?
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 24 Oct 2011 20:27:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Daniel Kahn Gillmor <dkg@fifthhorseman.net>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 24 Oct 2011 20:27:06 GMT) (full text, mbox, link).
Message #248 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On 10/24/2011 03:09 PM, Rob Naccarato wrote: > Fair enough, I now have this on the client: > root@khan:/etc# klist -e -k /etc/krb5.keytab > Keytab name: WRFILE:/etc/krb5.keytab > KVNO Principal > ---- > -------------------------------------------------------------------------- > 4 nfs/khan.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 > HMAC) > 4 host/khan.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 > HMAC) this looks reasonable to me (funnily, i also have a machine named khan!) > I also have this on the server: > > blackdog:/etc# klist -e -k /etc/krb5.keytab > Keytab name: WRFILE:/etc/krb5.keytab > KVNO Principal > ---- > -------------------------------------------------------------------------- > 8 host/blackdog.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit > SHA-1 HMAC) > 7 nfs/blackdog.some.domain.ca@NACCY.ORG (AES-128 CTS mode with 96-bit SHA-1 > HMAC) this also looks reasonable to me (there's no need for the kvno to match between the credentials for the two different principals) >> you shouldn't need nfs-kernel-server on the client -- what version of >> nfs-common do you have on the client? > > nfs-common 1:1.2.4-1~bpo60+1 ok, that matches my setup. >> A useful test might be to *reduce* the number of supported_enctypes to a >> select one or two, then change the keys for the client and the server >> (and for any user account using krb5 authentication) and re-try. > > So, reduce the list to, say, just aes128-cts:normal? Should I also remove the > allow_weak_crypto option? yes, that's what i would try -- it appears to be currently working for me. Perhaps someone more experienced with krb5 and nfs than i am can also weigh in with suggestions. Regards, --dkg
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 24 Oct 2011 21:45:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Rob Naccarato <rob@naccy.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 24 Oct 2011 21:45:04 GMT) (full text, mbox, link).
Message #253 received at 622146@bugs.debian.org (full text, mbox, reply):
On Mon, Oct 24, 2011 at 04:26:10PM -0400, Daniel Kahn Gillmor wrote: > On 10/24/2011 03:09 PM, Rob Naccarato wrote: > > > > nfs-common 1:1.2.4-1~bpo60+1 > > ok, that matches my setup. > > >> A useful test might be to *reduce* the number of supported_enctypes to a > >> select one or two, then change the keys for the client and the server > >> (and for any user account using krb5 authentication) and re-try. > > > > So, reduce the list to, say, just aes128-cts:normal? Should I also remove the > > allow_weak_crypto option? > > yes, that's what i would try -- it appears to be currently working for > me. Perhaps someone more experienced with krb5 and nfs than i am can > also weigh in with suggestions. Alright, my kdc.conf contains: supported_enctypes = aes128-cts:normal Both client and server krb5.conf's have allow_weak_crypto commented out. Now I get a different error on the nfs server: Oct 24 17:39:57 blackdog rpc.svcgssd[28694]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?)
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Wed, 26 Oct 2011 07:06:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Wed, 26 Oct 2011 07:06:03 GMT) (full text, mbox, link).
Message #258 received at 622146@bugs.debian.org (full text, mbox, reply):
On 09/12/2011 08:24 PM, Adam D. Barratt wrote: > On Mon, 2011-09-05 at 12:46 -0400, Sam Hartman wrote: >>>>>>> "Adam" == Adam D Barratt <adam@adam-barratt.org.uk> writes: >> >> >> Adam> The krb5 package was uploaded and I've (somewhat belatedly) >> Adam> marked it for acceptance at the next dinstall. What's the >> Adam> status of the nfs-utils upload? >> >> My guess is they were waiting for krb5. >> Remember they have to increase build-depends for the krb5 you just >> accepted. > > If it requires a versioned build-dependency, then both packages could > just have been uploaded at the same time. Even if we accepted them both > from p-u-NEW together, the buildds would have put nfs-common in to the > "build-deps uninstallable" state until the necessary version of krb5 was > available. Anyway, uploaded now. Cheers Luk
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Sat, 29 Oct 2011 14:30:07 GMT) (full text, mbox, link).
Acknowledgement sent
to "Adam D. Barratt" <adam@adam-barratt.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Sat, 29 Oct 2011 14:30:08 GMT) (full text, mbox, link).
Message #263 received at 622146@bugs.debian.org (full text, mbox, reply):
On Wed, 2011-10-26 at 09:05 +0200, Luk Claes wrote: [...] > >>>>>>> "Adam" == Adam D Barratt <adam@adam-barratt.org.uk> writes: > >> > >> > >> Adam> The krb5 package was uploaded and I've (somewhat belatedly) > >> Adam> marked it for acceptance at the next dinstall. What's the > >> Adam> status of the nfs-utils upload? [...] > Anyway, uploaded now. Flagged for acceptance at the next dinstall; thanks. Regards, Adam
Reply sent
to Luk Claes <luk@debian.org>:
You have taken responsibility.
(Sat, 29 Oct 2011 19:57:07 GMT) (full text, mbox, link).
Notification sent
to Rico Rommel <rico@bierrommel.de>:
Bug acknowledged by developer.
(Sat, 29 Oct 2011 19:57:07 GMT) (full text, mbox, link).
Message #268 received at 622146-close@bugs.debian.org (full text, mbox, reply):
Source: nfs-utils
Source-Version: 1:1.2.2-4squeeze1
We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:
nfs-common_1.2.2-4squeeze1_i386.deb
to main/n/nfs-utils/nfs-common_1.2.2-4squeeze1_i386.deb
nfs-kernel-server_1.2.2-4squeeze1_i386.deb
to main/n/nfs-utils/nfs-kernel-server_1.2.2-4squeeze1_i386.deb
nfs-utils_1.2.2-4squeeze1.debian.tar.bz2
to main/n/nfs-utils/nfs-utils_1.2.2-4squeeze1.debian.tar.bz2
nfs-utils_1.2.2-4squeeze1.dsc
to main/n/nfs-utils/nfs-utils_1.2.2-4squeeze1.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 622146@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Luk Claes <luk@debian.org> (supplier of updated nfs-utils package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 26 Oct 2011 08:47:44 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.2.2-4squeeze1
Distribution: stable
Urgency: low
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Luk Claes <luk@debian.org>
Description:
nfs-common - NFS support files common to client and server
nfs-kernel-server - support for NFS kernel server
Closes: 622146
Changes:
nfs-utils (1:1.2.2-4squeeze1) stable; urgency=low
.
* Build with patch d6c1b35c6b40243bfd6fba2591c9f8f2653078c0 from upstream
(Closes: #622146)
Checksums-Sha1:
1b00634039af06845c28abac67ef1095a57577db 1502 nfs-utils_1.2.2-4squeeze1.dsc
02674871e8011c4e4655c0c649af76dd3eadd0cd 38629 nfs-utils_1.2.2-4squeeze1.debian.tar.bz2
e4e0eb751a6ae961429a87704203ff9f74726c92 158738 nfs-kernel-server_1.2.2-4squeeze1_i386.deb
4d90873f029485c6cc494b641800577b35ec335d 227672 nfs-common_1.2.2-4squeeze1_i386.deb
Checksums-Sha256:
551fffdc6b4579a13e860800c8cd6a3c1ee5138060203d13d1943e748fde725b 1502 nfs-utils_1.2.2-4squeeze1.dsc
57679e4ce4d701d0dfa6cfce9d1993ecd4a3fe4ed810c70fa298cc54111d8e54 38629 nfs-utils_1.2.2-4squeeze1.debian.tar.bz2
8db5dd9908f877df2b5b2ddfd92bcca3e5a3c1e517b3a5ad8571f8da890638da 158738 nfs-kernel-server_1.2.2-4squeeze1_i386.deb
95739228ee45d713e401e2ec30bc26b333208b4ab7e8088c395a434565b60e78 227672 nfs-common_1.2.2-4squeeze1_i386.deb
Files:
1f78e72a2322b1e4bb4ec1da97a13ed7 1502 net standard nfs-utils_1.2.2-4squeeze1.dsc
72c2a76a81c1fda8ce89a7bae746baf0 38629 net standard nfs-utils_1.2.2-4squeeze1.debian.tar.bz2
ee8c536becd3e73fe20bf0a3cf09fc99 158738 net optional nfs-kernel-server_1.2.2-4squeeze1_i386.deb
ca2253f54c86c556daede3304c702c89 227672 net standard nfs-common_1.2.2-4squeeze1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk6nsNMACgkQ5UTeB5t8Mo22IwCgmRHMtuodK2w5TPyVJCjLaTEi
j6kAoIE769gET8WsrlntiUqB8zeNk7d3
=/004
-----END PGP SIGNATURE-----
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 15:00:04 GMT) (full text, mbox, link).
Acknowledgement sent
to "Mc.Sim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 15:00:04 GMT) (full text, mbox, link).
Message #273 received at 622146@bugs.debian.org (full text, mbox, reply):
Package: nfs-kernel-server
Version: 1:1.2.4-1~bpo60+1
Severity: normal
Hello!
I have Win2k8 R2 as a domain controller (as KDC for NFS).
There is an NFS client on Debian wheezy: hostname - debian:
root@debian:~# dpkg -l | grep nfs
ii libnfsidmap2 0.24-1 An nfs idmapping library
ii nfs-common 1:1.2.5-2 NFS support files common to client and server
ii nfs-kernel-server 1:1.2.5-2 support for NFS kernel server
There is an NFS server: host name - archiv:
ARCHIV ~ # dpkg -l | grep nfs
ii libnfsidmap2 0.23-2 An nfs idmapping library
ii nfs-common 1:1.2.4-1~bpo60+1 NFS support files common to client and server
ii nfs-kernel-server 1:1.2.4-1~bpo60+1 support for NFS kernel server
ARCHIV ~ # grep -v ^# /etc/exports
/nfs gss/krb5(rw,sync,no_subtree_check)
On both Debian:
ARCHIV ~ # cat /etc/krb5.conf
[libdefaults]
default_realm = SAG.LOCAL
# The following krb5.conf variables are only for MIT Kerberos.
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
allow_weak_crypto = true
default_tgs_enctypes = des-cbc-crc
default_tkt_enctypes = des-cbc-crc
permitted_enctypes = des-cbc-crc
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
# The following libdefaults parameters are only for Heimdal Kerberos.
v4_instance_resolve = false
v4_name_convert = {
host = {
rcmd = host
ftp = ftp
}
plain = {
something = something-else
}
}
fcc-mit-ticketflags = true
[realms]
SAG.LOCAL = {
kdc = dc.sag.local
admin_server = dc.sag.local
default_domain = SAG.LOCAL
}
[domain_realm]
.sag.local = SAG.LOCAL
sag.local = SAG.LOCAL
[login]
krb4_convert = true
krb4_get_tickets = false
===================================================
I tried to uncomment
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
and comment:
default_tgs_enctypes = des-cbc-crc
default_tkt_enctypes = des-cbc-crc
permitted_enctypes = des-cbc-crc
but always when trying to connect to the server,
root@debian:~# mount -vvv -t nfs4 -o sec=krb5 archiv:/nfs /mnt2
mount: fstab path: "/etc/fstab"
mount: mtab path: "/etc/mtab"
mount: lock path: "/etc/mtab~"
mount: temp path: "/etc/mtab.tmp"
mount: UID: 0
mount: eUID: 0
mount: spec: "archiv:/"
mount: node: "/mnt2"
mount: types: "nfs4"
mount: opts: "sec=krb5"
mount: external mount: argv[0] = "/sbin/mount.nfs4"
mount: external mount: argv[1] = "archiv:/"
mount: external mount: argv[2] = "/mnt2"
mount: external mount: argv[3] = "-v"
mount: external mount: argv[4] = "-o"
mount: external mount: argv[5] = "rw,sec=krb5"
mount.nfs4: timeout set for Mon Nov 14 18:40:42 2011
mount.nfs4: trying text-based options 'sec=krb5,addr=10.0.0.6,clientaddr=10.0.0.50'
mount.nfs4: mount(2): Permission denied
mount.nfs4: access denied by server while mounting archiv:/nfs
I get the error log on client:
Nov 14 18:38:42 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81f9bc data 0xbf81fa3c
Nov 14 18:38:42 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b21c data 0xbf81b29c
Nov 14 18:38:42 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b21c data 0xbf81b29c
Nov 14 18:38:47 debian rpc.gssd[696]: handling gssd upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt13)
Nov 14 18:38:47 debian rpc.gssd[696]: handle_gssd_upcall: 'mech=krb5 uid=0 enctypes=18,17,16,23,3,1,2 '
Nov 14 18:38:47 debian rpc.gssd[696]: handling krb5 upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt13)
Nov 14 18:38:47 debian rpc.gssd[696]: process_krb5_upcall: service is '<null>'
Nov 14 18:38:52 debian rpc.gssd[696]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local'
Nov 14 18:38:52 debian rpc.gssd[696]: Full hostname for 'debian.sag.local' is 'debian.sag.local'
Nov 14 18:38:52 debian rpc.gssd[696]: No key table entry found for DEBIAN$@SAG.LOCAL while getting keytab entry for 'DEBIAN$@SAG.LOCAL'
Nov 14 18:38:52 debian rpc.gssd[696]: No key table entry found for root/debian.sag.local@SAG.LOCAL while getting keytab entry for 'root/debian.sag.local@SAG.LOCAL'
Nov 14 18:38:52 debian rpc.gssd[696]: Success getting keytab entry for 'nfs/debian.sag.local@SAG.LOCAL'
Nov 14 18:38:52 debian rpc.gssd[696]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321295320
Nov 14 18:38:52 debian rpc.gssd[696]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321295320
Nov 14 18:38:52 debian rpc.gssd[696]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds
Nov 14 18:38:52 debian rpc.gssd[696]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL
Nov 14 18:38:52 debian rpc.gssd[696]: creating context using fsuid 0 (save_uid 0)
Nov 14 18:38:52 debian rpc.gssd[696]: creating tcp client for server archiv.sag.local
Nov 14 18:38:52 debian rpc.gssd[696]: DEBUG: port already set to 2049
Nov 14 18:38:52 debian rpc.gssd[696]: creating context with server nfs@archiv.sag.local
Nov 14 18:39:03 debian rpc.gssd[696]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.sag.local
Nov 14 18:39:03 debian rpc.gssd[696]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.sag.local
Nov 14 18:39:03 debian rpc.gssd[696]: WARNING: Machine cache is prematurely expired or corrupted trying to recreate cache for server archiv.sag.local
Nov 14 18:39:08 debian rpc.gssd[696]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local'
Nov 14 18:39:08 debian rpc.gssd[696]: Full hostname for 'debian.sag.local' is 'debian.sag.local'
Nov 14 18:39:08 debian rpc.gssd[696]: No key table entry found for DEBIAN$@SAG.LOCAL while getting keytab entry for 'DEBIAN$@SAG.LOCAL'
Nov 14 18:39:08 debian rpc.gssd[696]: No key table entry found for root/debian.sag.local@SAG.LOCAL while getting keytab entry for 'root/debian.sag.local@SAG.LOCAL'
Nov 14 18:39:08 debian rpc.gssd[696]: Success getting keytab entry for 'nfs/debian.sag.local@SAG.LOCAL'
Nov 14 18:39:08 debian rpc.gssd[696]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321295320
Nov 14 18:39:08 debian rpc.gssd[696]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321295320
Nov 14 18:39:08 debian rpc.gssd[696]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds
Nov 14 18:39:08 debian rpc.gssd[696]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL
Nov 14 18:39:08 debian rpc.gssd[696]: creating context using fsuid 0 (save_uid 0)
Nov 14 18:39:08 debian rpc.gssd[696]: creating tcp client for server archiv.sag.local
Nov 14 18:39:08 debian rpc.gssd[696]: DEBUG: port already set to 2049
Nov 14 18:39:08 debian rpc.gssd[696]: creating context with server nfs@archiv.sag.local
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:10 debian rpc.gssd[696]: dir_notify_handler: sig 37 si 0xbf81b07c data 0xbf81b0fc
Nov 14 18:39:18 debian rpc.gssd[696]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.sag.local
Nov 14 18:39:18 debian rpc.gssd[696]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.sag.local
Nov 14 18:39:18 debian rpc.gssd[696]: WARNING: Failed to create machine krb5 context with any credentials cache for server archiv.sag.local
Nov 14 18:39:18 debian rpc.gssd[696]: doing error downcall
Nov 14 18:39:18 debian rpc.gssd[696]: Failed to write error downcall!
Nov 14 18:39:18 debian rpc.gssd[696]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt14
Nov 14 18:39:18 debian rpc.gssd[696]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt13
And get the error in log on server:
ARCHIV ~ # tailf /var/log/daemon.log
Nov 14 18:26:42 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted
Nov 14 18:26:42 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted
Nov 14 18:29:30 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted
Nov 14 18:29:30 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted
Nov 14 18:39:05 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted
Nov 14 18:39:20 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted
==============================================
In this case, the second mount on the client only after a servise nfs-common restart, because mount hangs and stops due to a timeout.
When I comment on all the settings on the server and client:
# allow_weak_crypto = true
# default_tgs_enctypes = des-cbc-crc
# default_tkt_enctypes = des-cbc-crc
# permitted_enctypes = des-cbc-crc
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
# permitted_enctypes = des-cbc-crc
If you try to mount I get on the client-log:
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c
Nov 14 18:50:20 debian rpc.gssd[1730]: handling gssd upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt17)
Nov 14 18:50:20 debian rpc.gssd[1730]: handle_gssd_upcall: 'mech=krb5 uid=0 enctypes=18,17,16,23,3,1,2 '
Nov 14 18:50:20 debian rpc.gssd[1730]: handling krb5 upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt17)
Nov 14 18:50:20 debian rpc.gssd[1730]: process_krb5_upcall: service is '<null>'
Nov 14 18:50:20 debian rpc.gssd[1730]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local'
Nov 14 18:50:20 debian rpc.gssd[1730]: Full hostname for 'debian.sag.local' is 'debian.sag.local'
Nov 14 18:50:20 debian rpc.gssd[1730]: No key table entry found for DEBIAN$@SAG.LOCAL while getting keytab entry for 'DEBIAN$@SAG.LOCAL'
Nov 14 18:50:20 debian rpc.gssd[1730]: No key table entry found for root/debian.sag.local@SAG.LOCAL while getting keytab entry for 'root/debian.sag.local@SAG.LOCAL'
Nov 14 18:50:20 debian rpc.gssd[1730]: Success getting keytab entry for 'nfs/debian.sag.local@SAG.LOCAL'
Nov 14 18:50:20 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191
Nov 14 18:50:20 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191
Nov 14 18:50:20 debian rpc.gssd[1730]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds
Nov 14 18:50:20 debian rpc.gssd[1730]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL
Nov 14 18:50:20 debian rpc.gssd[1730]: creating context using fsuid 0 (save_uid 0)
Nov 14 18:50:20 debian rpc.gssd[1730]: creating tcp client for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: DEBUG: port already set to 2049
Nov 14 18:50:20 debian rpc.gssd[1730]: creating context with server nfs@archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: WARNING: Machine cache is prematurely expired or corrupted trying to recreate cache for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local'
Nov 14 18:50:20 debian rpc.gssd[1730]: Full hostname for 'debian.sag.local' is 'debian.sag.local'
Nov 14 18:50:20 debian rpc.gssd[1730]: No key table entry found for DEBIAN$@SAG.LOCAL while getting keytab entry for 'DEBIAN$@SAG.LOCAL'
Nov 14 18:50:20 debian rpc.gssd[1730]: No key table entry found for root/debian.sag.local@SAG.LOCAL while getting keytab entry for 'root/debian.sag.local@SAG.LOCAL'
Nov 14 18:50:20 debian rpc.gssd[1730]: Success getting keytab entry for 'nfs/debian.sag.local@SAG.LOCAL'
Nov 14 18:50:20 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191
Nov 14 18:50:20 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191
Nov 14 18:50:20 debian rpc.gssd[1730]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds
Nov 14 18:50:20 debian rpc.gssd[1730]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL
Nov 14 18:50:20 debian rpc.gssd[1730]: creating context using fsuid 0 (save_uid 0)
Nov 14 18:50:20 debian rpc.gssd[1730]: creating tcp client for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: DEBUG: port already set to 2049
Nov 14 18:50:20 debian rpc.gssd[1730]: creating context with server nfs@archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: WARNING: Failed to create machine krb5 context with any credentials cache for server archiv.sag.local
Nov 14 18:50:20 debian rpc.gssd[1730]: doing error downcall
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c
Nov 14 18:50:20 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c
Nov 14 18:50:20 debian rpc.gssd[1730]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt17
And I get message on server-log:
Nov 14 18:50:23 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?)
Nov 14 18:50:23 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?)
Help me, please for this problem.
p.s. On the client (hostname debian) as an NFS server is installed and if I run:
root@debian:~# grep -v ^# /etc/exports
/nfs gss/krb5(rw,sync,fsid=0,crossmnt,no_subtree_check)
root@debian:~# mount -v -t nfs4 -o sec=krb5 debian:/ /mnt
mount.nfs4: timeout set for Mon Nov 14 18:58:10 2011
mount.nfs4: trying text-based options 'sec=krb5,addr=10.0.0.50,clientaddr=10.0.0.50'
debian:/ on /mnt type nfs4 (rw,sec=krb5)
root@debian:~# mount | grep nfs
nfsd on /proc/fs/nfsd type nfsd (rw)
rpc_pipefs on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw)
debian:/ on /mnt type nfs4 (rw,sec=krb5,addr=10.0.0.50,clientaddr=10.0.0.50)
-- Package-specific info:
-- rpcinfo --
program vers proto port service
100000 4 tcp 111 portmapper
100000 3 tcp 111 portmapper
100000 2 tcp 111 portmapper
100000 4 udp 111 portmapper
100000 3 udp 111 portmapper
100000 2 udp 111 portmapper
100024 1 udp 56885 status
100024 1 tcp 42127 status
100021 1 udp 42119 nlockmgr
100021 3 udp 42119 nlockmgr
100021 4 udp 42119 nlockmgr
100021 1 tcp 38382 nlockmgr
100021 3 tcp 38382 nlockmgr
100021 4 tcp 38382 nlockmgr
100003 2 tcp 2049 nfs
100003 3 tcp 2049 nfs
100003 4 tcp 2049 nfs
100003 2 udp 2049 nfs
100003 3 udp 2049 nfs
100003 4 udp 2049 nfs
100005 1 udp 42843 mountd
100005 1 tcp 50330 mountd
100005 2 udp 55182 mountd
100005 2 tcp 44541 mountd
100005 3 udp 50955 mountd
100005 3 tcp 44805 mountd
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS=--manage-gids
NEED_SVCGSSD=yes
RPCSVCGSSDOPTS=yes
-- /etc/exports --
/nfs gss/krb5(rw,sync,no_subtree_check)
-- /proc/fs/nfs/exports --
# Version 1.1
# Path Client(Flags) # IPs
-- System Information:
Debian Release: 6.0.3
APT prefers stable
APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages nfs-kernel-server depends on:
ii libblkid1 2.17.2-9 block device id library
ii libc6 2.13-21 Embedded GNU C Library: Shared lib
ii libcomerr2 1.41.12-4stable1 common error description library
ii libgssapi-krb5-2 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - k
ii libgssglue1 0.1-4 mechanism-switch gssapi library
ii libk5crypto3 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - C
ii libkrb5-3 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries
ii libnfsidmap2 0.23-2 An nfs idmapping library
ii libtirpc1 0.2.2-5 transport-independent RPC library
ii libwrap0 7.6.q-19 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-23.2squeeze1 Linux Standard Base 3.2 init scrip
ii nfs-common 1:1.2.4-1~bpo60+1 NFS support files common to client
ii ucf 3.0025+nmu1 Update Configuration File: preserv
nfs-kernel-server recommends no packages.
nfs-kernel-server suggests no packages.
-- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 15:39:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Luk Claes <luk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 15:39:04 GMT) (full text, mbox, link).
Message #278 received at 622146@bugs.debian.org (full text, mbox, reply):
On 11/14/2011 04:57 PM, Mc.Sim wrote: > Hello! Hi > I have Win2k8 R2 as a domain controller (as KDC for NFS). > There is an NFS client on Debian wheezy: hostname - debian: > I tried to uncomment > # default_tgs_enctypes = des3-hmac-sha1 > # default_tkt_enctypes = des3-hmac-sha1 > # permitted_enctypes = des3-hmac-sha1 > and comment: > default_tgs_enctypes = des-cbc-crc > default_tkt_enctypes = des-cbc-crc > permitted_enctypes = des-cbc-crc Why would that work without changing anything in your Kerberos keytabs? > but always when trying to connect to the server, > root@debian:~# mount -vvv -t nfs4 -o sec=krb5 archiv:/nfs /mnt2 > And get the error in log on server: > ARCHIV ~ # tailf /var/log/daemon.log > Nov 14 18:26:42 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted > Nov 14 18:26:42 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted > Nov 14 18:29:30 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted > Nov 14 18:29:30 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted > Nov 14 18:39:05 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted > Nov 14 18:39:20 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - Encryption type not permitted Expected when des3-hmac-sha1 is not in keytab. > ============================================== > In this case, the second mount on the client only after a servise nfs-common restart, because mount hangs and stops due to a timeout. > When I comment on all the settings on the server and client: > > # allow_weak_crypto = true > # default_tgs_enctypes = des-cbc-crc > # default_tkt_enctypes = des-cbc-crc > # permitted_enctypes = des-cbc-crc > # default_tgs_enctypes = des3-hmac-sha1 > # default_tkt_enctypes = des3-hmac-sha1 > # permitted_enctypes = des3-hmac-sha1 > # permitted_enctypes = des-cbc-crc > And I get message on server-log: > > Nov 14 18:50:23 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?) > Nov 14 18:50:23 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?) > > Help me, please for this problem. This will only work if you have other possibilities in the Kerberos keytab. > p.s. On the client (hostname debian) as an NFS server is installed and if I run: > root@debian:~# grep -v ^# /etc/exports > /nfs gss/krb5(rw,sync,fsid=0,crossmnt,no_subtree_check) > root@debian:~# mount -v -t nfs4 -o sec=krb5 debian:/ /mnt > mount.nfs4: timeout set for Mon Nov 14 18:58:10 2011 > mount.nfs4: trying text-based options 'sec=krb5,addr=10.0.0.50,clientaddr=10.0.0.50' > debian:/ on /mnt type nfs4 (rw,sec=krb5) > root@debian:~# mount | grep nfs > nfsd on /proc/fs/nfsd type nfsd (rw) > rpc_pipefs on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw) > debian:/ on /mnt type nfs4 (rw,sec=krb5,addr=10.0.0.50,clientaddr=10.0.0.50) So it worked, I guess that's the initial scenario where you are using des-cbc-crc? I myself have little to no experience with Kerberos, but I would try klist to see what's in your keytabs (/etc/krb5.keytab) and related tools to add entries to the keytab when needed. This does not look like an NFS problem to me or am I mistaken? Cheers Luk
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 17:33:03 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 17:33:03 GMT) (full text, mbox, link).
Message #283 received at 622146@bugs.debian.org (full text, mbox, reply):
Luk Claes <luk@debian.org> писал(а) в своём письме Mon, 14 Nov 2011
19:36:41 +0400:
> On 11/14/2011 04:57 PM, Mc.Sim wrote:
>
>
> Why would that work without changing anything in your Kerberos keytabs?
keytab contains both types of encryption. (example below in the text)
>
>> Nov 14 18:39:20 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in
>> handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified
>> GSS failure. Minor code may provide more information) - Encryption
>> type not permitted
>
> Expected when des3-hmac-sha1 is not in keytab.
>
>> Nov 14 18:50:23 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in
>> handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified
>> GSS failure. Minor code may provide more information) - No supported
>> encryption types (config file error?)
>>
>> Help me, please for this problem.
>
> This will only work if you have other possibilities in the Kerberos
> keytab.
Yes, the other encryption types are present in keytab ...
>
>> p.s. On the client (hostname debian) as an NFS server is installed and
>> if I run:
>> root@debian:~# grep -v ^# /etc/exports
>> /nfs gss/krb5(rw,sync,fsid=0,crossmnt,no_subtree_check)
>> root@debian:~# mount -v -t nfs4 -o sec=krb5 debian:/ /mnt
>> root@debian:~# mount | grep nfs
>> debian:/ on /mnt type nfs4
>> (rw,sec=krb5,addr=10.0.0.50,clientaddr=10.0.0.50)
>
> So it worked, I guess that's the initial scenario where you are using
> des-cbc-crc?
>
> I myself have little to no experience with Kerberos, but I would try
> klist to see what's in your keytabs (/etc/krb5.keytab) and related tools
> to add entries to the keytab when needed. This does not look like an NFS
> problem to me or am I mistaken?
>
According to the documentation (
http://technet.microsoft.com/en-us/library/dd560670(v=ws.10).aspx ), Win
2k8 R2 does not support DES-CBC-MD5 & DES-CBC-CRC.
As I understand it, probably for this error when uncommented parameters
>> # default_tgs_enctypes = des-cbc-crc
>> # default_tkt_enctypes = des-cbc-crc
>> # permitted_enctypes = des-cbc-crc
or
>> # default_tgs_enctypes = des3-hmac-sha1
>> # default_tkt_enctypes = des3-hmac-sha1
>> # permitted_enctypes = des3-hmac-sha1
But in the keytab there are other types of encryption:
root@debian:~# klist -ke
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
----
--------------------------------------------------------------------------
3 nfs/debian.sag.local@SAG.LOCAL (des-cbc-crc)
3 nfs/debian.sag.local@SAG.LOCAL (des-cbc-md5)
3 nfs/debian.sag.local@SAG.LOCAL (arcfour-hmac)
3 nfs/debian.sag.local@SAG.LOCAL (aes256-cts-hmac-sha1-96)
3 nfs/debian.sag.local@SAG.LOCAL (aes128-cts-hmac-sha1-96)
===========================================
kinit gets the correct tickets from the KDC on client only commented
parameters:
==========================================
root@debian:~# vim /etc/krb5.conf
root@debian:~# grep des /etc/krb5.conf
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
default_tgs_enctypes = des-cbc-crc
default_tkt_enctypes = des-cbc-crc
permitted_enctypes = des-cbc-crc
root@debian:~# kinit -k nfs/debian.sag.local
kinit: KDC has no support for encryption type while getting initial
credentials
root@debian:~# vim /etc/krb5.conf
root@debian:~# grep des /etc/krb5.conf
default_tgs_enctypes = des3-hmac-sha1
default_tkt_enctypes = des3-hmac-sha1
permitted_enctypes = des3-hmac-sha1
# default_tgs_enctypes = des-cbc-crc
# default_tkt_enctypes = des-cbc-crc
# permitted_enctypes = des-cbc-crc
root@debian:~# kinit -k nfs/debian.sag.local
kinit: KDC has no support for encryption type while getting initial
credentials
root@debian:~# vim /etc/krb5.conf
root@debian:~# grep des /etc/krb5.conf
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
# default_tgs_enctypes = des-cbc-crc
# default_tkt_enctypes = des-cbc-crc
# permitted_enctypes = des-cbc-crc
root@debian:~# kinit -k nfs/debian.sag.local
root@debian:~# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nfs/debian.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/14/11 20:33:18 11/15/11 06:33:21 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/15/11 20:33:18
=======================
...and on server:
=======================
ARCHIV ~ # vim /etc/krb5.conf
ARCHIV ~ # grep des /etc/krb5.conf
default_tgs_enctypes = des-cbc-crc
default_tkt_enctypes = des-cbc-crc
permitted_enctypes = des-cbc-crc
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
ARCHIV ~ # kinit -k nfs/archiv.sag.local
kinit: KDC has no support for encryption type while getting initial
credentials
ARCHIV ~ # vim /etc/krb5.conf
ARCHIV ~ # grep des /etc/krb5.conf
# default_tgs_enctypes = des-cbc-crc
# default_tkt_enctypes = des-cbc-crc
# permitted_enctypes = des-cbc-crc
default_tgs_enctypes = des3-hmac-sha1
default_tkt_enctypes = des3-hmac-sha1
permitted_enctypes = des3-hmac-sha1
ARCHIV ~ # kinit -k nfs/archiv.sag.local
kinit: KDC has no support for encryption type while getting initial
credentials
ARCHIV ~ # vim /etc/krb5.conf
ARCHIV ~ # kinit -k nfs/archiv.sag.local
ARCHIV ~ # klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nfs/archiv.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/14/11 21:05:29 11/15/11 07:05:29 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/15/11 21:05:29
However, NFS does not work for any given parameters. :(
> Cheers
>
> Luk
>
>
>
P.s.
Luk Claes <luk@debian.org> писал(а) в своём письме Mon, 14 Nov 2011
19:39:06 +0400:
> On 11/14/2011 04:35 PM, "Крамаренко Максим" wrote:
>> Здравствуйте!
>> Ваше письмо получено.
>Unfortunately I don't understand Russian, can you please translate?
>Cheers
>Luk
Sorry! This e-mail answering service. I have it turned off.
Best Regards
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 18:21:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Russ Allbery <rra@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 18:21:06 GMT) (full text, mbox, link).
Message #288 received at 622146@bugs.debian.org (full text, mbox, reply):
I don't know what's going on with the NFS portion of this, since I don't use NFS at all, but I can tell you a few things about the Kerberos end. "Kramarenko A. Maxim" <mc-sim85@ya.ru> writes: > But in the keytab there are other types of encryption: > root@debian:~# klist -ke > Keytab name: WRFILE:/etc/krb5.keytab > KVNO Principal > ---- > -------------------------------------------------------------------------- > 3 nfs/debian.sag.local@SAG.LOCAL (des-cbc-crc) > 3 nfs/debian.sag.local@SAG.LOCAL (des-cbc-md5) > 3 nfs/debian.sag.local@SAG.LOCAL (arcfour-hmac) > 3 nfs/debian.sag.local@SAG.LOCAL (aes256-cts-hmac-sha1-96) > 3 nfs/debian.sag.local@SAG.LOCAL (aes128-cts-hmac-sha1-96) For a Windows 2008r2 Active Directory domain controller, the only enctypes there that are going to work are arcfour-hmac and aes128. (aes256 might as well in some situations, but I think you have to go to some extra work, or maybe it's that a lot of Windows clients don't support them.) > root@debian:~# grep des /etc/krb5.conf > # default_tgs_enctypes = des3-hmac-sha1 > # default_tkt_enctypes = des3-hmac-sha1 > # permitted_enctypes = des3-hmac-sha1 > default_tgs_enctypes = des-cbc-crc > default_tkt_enctypes = des-cbc-crc > permitted_enctypes = des-cbc-crc You generally don't want to set these parameters, although I realize that used to be the case for NFS. The NFS machinery is going to need to support either arcfour-hmac or aes128, since Windows never supported 3DES, and you don't want to use plain DES any more (and it has to be specifically enabled on the Windows side, if they haven't dropped it entirely now). I'm not sure what enctypes the kernel-level support currently implements. -- Russ Allbery (rra@debian.org) <http://www.eyrie.org/~eagle/>
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 19:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 19:03:03 GMT) (full text, mbox, link).
Message #293 received at 622146@bugs.debian.org (full text, mbox, reply):
Russ Allbery <rra@debian.org> писал(а) в своём письме Mon, 14 Nov 2011
22:19:04 +0400:
> I don't know what's going on with the NFS portion of this, since I don't
> use NFS at all, but I can tell you a few things about the Kerberos end.
>
> For a Windows 2008r2 Active Directory domain controller, the only
> enctypes
> there that are going to work are arcfour-hmac and aes128. (aes256 might
> as well in some situations, but I think you have to go to some extra
> work,
> or maybe it's that a lot of Windows clients don't support them.)
>
> You generally don't want to set these parameters, although I realize that
> used to be the case for NFS.
>
> The NFS machinery is going to need to support either arcfour-hmac or
> aes128, since Windows never supported 3DES, and you don't want to use
> plain DES any more (and it has to be specifically enabled on the Windows
> side, if they haven't dropped it entirely now). I'm not sure what
> enctypes the kernel-level support currently implements.
>
Thank you all for your answers.
Russ,
I absolutely agree with you. Win 2k8 works correctly with the arcfour-hmac
(RC4-HMAC) and AES 128 (not supported by WinXP and younger).
Therefore, the application settings allow_weak_crypto not helping me.
But how can I check the support RC4-HMAC, and AES128, to make sure that
reason the problem?
And how do we know up to what I need to upgrade the kernel to have a
stable system and running NFS?
P.S. But kinit gets the same ticket from KDC? Or kinit does not use the
kernel and uses the tools of userland-level?
P.P.S.:
I also tried to explicitly specify the type of encryption in krb5.conf:
=============
root@debian:~# grep -e rc4 -e des /etc/krb5.conf
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
default_tkt_enctypes = rc4-hmac
default_tgs_enctypes = rc4-hmac
permitted_enctypes = rc4-hmac
# default_tgs_enctypes = des-cbc-crc
# default_tkt_enctypes = des-cbc-crc
# permitted_enctypes = des-cbc-crc
root@debian:~# kinit -k nfs/debian.sag.local
root@debian:~# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nfs/debian.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/14/11 22:51:28 11/15/11 08:51:36 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/15/11 22:51:28
=============
and on server
=============
ARCHIV ~ # vim /etc/krb5.conf
ARCHIV ~ # kinit -k nfs/archiv.sag.local
ARCHIV ~ # klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nfs/archiv.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/14/11 22:53:45 11/15/11 08:53:45 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/15/11 22:53:45
====================
And once again got an error on the server:
===================
Nov 14 22:54:40 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - No supported
encryption types (config file error?)
Nov 14 22:54:40 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - No supported
encryption types (config file error?)
--
Best Regards
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 19:09:10 GMT) (full text, mbox, link).
Acknowledgement sent
to Daniel Kahn Gillmor <dkg@fifthhorseman.net>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 19:09:10 GMT) (full text, mbox, link).
Message #298 received at 622146@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On 11/14/2011 01:19 PM, Russ Allbery wrote: > The NFS machinery is going to need to support either arcfour-hmac or > aes128, since Windows never supported 3DES, and you don't want to use > plain DES any more (and it has to be specifically enabled on the Windows > side, if they haven't dropped it entirely now). I'm not sure what > enctypes the kernel-level support currently implements. You'll need the kernel from squeeze-backports or later to get enctypes other than des-cbc-crc. I can attest that 2.6.39-3~bpo60+1 works with aes128-cts with SHA-1 HMAC, as long as you're using the nfs-kernel-server from bpo or later. I haven't tried it against a win2k8 kdc, though. --dkg
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 20:21:05 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 20:21:05 GMT) (full text, mbox, link).
Message #303 received at 622146@bugs.debian.org (full text, mbox, reply):
Daniel Kahn Gillmor <dkg@fifthhorseman.net> писал(а) в своём письме Mon, 14 Nov 2011 23:05:36 +0400: > On 11/14/2011 01:19 PM, Russ Allbery wrote: > > > You'll need the kernel from squeeze-backports or later to get enctypes > other than des-cbc-crc. > > I can attest that 2.6.39-3~bpo60+1 works with aes128-cts with SHA-1 > HMAC, as long as you're using the nfs-kernel-server from bpo or later. > I haven't tried it against a win2k8 kdc, though. > > --dkg > > Thank you for your reply. Daniel, I updated the kernel to: ARCHIV ~ # uname -a Linux ARCHIV 2.6.39-bpo.2-686-pae #1 SMP Thu Aug 4 11:02:22 UTC 2011 i686 GNU/Linux But the error appears again and unable to mount. client: ============== Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd458c data 0xbfcd460c Nov 15 00:06:32 debian rpc.gssd[1730]: handling gssd upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt1f) Nov 15 00:06:32 debian rpc.gssd[1730]: handle_gssd_upcall: 'mech=krb5 uid=0 enctypes=18,17,16,23,3,1,2 ' Nov 15 00:06:32 debian rpc.gssd[1730]: handling krb5 upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt1f) Nov 15 00:06:32 debian rpc.gssd[1730]: process_krb5_upcall: service is '<null>' Nov 15 00:06:32 debian rpc.gssd[1730]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local' Nov 15 00:06:32 debian rpc.gssd[1730]: Full hostname for 'debian.sag.local' is 'debian.sag.local' Nov 15 00:06:32 debian rpc.gssd[1730]: No key table entry found for DEBIAN$@SAG.LOCAL while getting keytab entry for 'DEBIAN$@SAG.LOCAL' Nov 15 00:06:32 debian rpc.gssd[1730]: No key table entry found for root/debian.sag.local@SAG.LOCAL while getting keytab entry for 'root/debian.sag.local@SAG.LOCAL' Nov 15 00:06:32 debian rpc.gssd[1730]: Success getting keytab entry for 'nfs/debian.sag.local@SAG.LOCAL' Nov 15 00:06:32 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191 Nov 15 00:06:32 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191 Nov 15 00:06:32 debian rpc.gssd[1730]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds Nov 15 00:06:32 debian rpc.gssd[1730]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL Nov 15 00:06:32 debian rpc.gssd[1730]: creating context using fsuid 0 (save_uid 0) Nov 15 00:06:32 debian rpc.gssd[1730]: creating tcp client for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: DEBUG: port already set to 2049 Nov 15 00:06:32 debian rpc.gssd[1730]: creating context with server nfs@archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: WARNING: Machine cache is prematurely expired or corrupted trying to recreate cache for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local' Nov 15 00:06:32 debian rpc.gssd[1730]: Full hostname for 'debian.sag.local' is 'debian.sag.local' Nov 15 00:06:32 debian rpc.gssd[1730]: No key table entry found for DEBIAN$@SAG.LOCAL while getting keytab entry for 'DEBIAN$@SAG.LOCAL' Nov 15 00:06:32 debian rpc.gssd[1730]: No key table entry found for root/debian.sag.local@SAG.LOCAL while getting keytab entry for 'root/debian.sag.local@SAG.LOCAL' Nov 15 00:06:32 debian rpc.gssd[1730]: Success getting keytab entry for 'nfs/debian.sag.local@SAG.LOCAL' Nov 15 00:06:32 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191 Nov 15 00:06:32 debian rpc.gssd[1730]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321318191 Nov 15 00:06:32 debian rpc.gssd[1730]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds Nov 15 00:06:32 debian rpc.gssd[1730]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL Nov 15 00:06:32 debian rpc.gssd[1730]: creating context using fsuid 0 (save_uid 0) Nov 15 00:06:32 debian rpc.gssd[1730]: creating tcp client for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: DEBUG: port already set to 2049 Nov 15 00:06:32 debian rpc.gssd[1730]: creating context with server nfs@archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: WARNING: Failed to create machine krb5 context with any credentials cache for server archiv.sag.local Nov 15 00:06:32 debian rpc.gssd[1730]: doing error downcall Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: dir_notify_handler: sig 37 si 0xbfcd40bc data 0xbfcd413c Nov 15 00:06:32 debian rpc.gssd[1730]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt20 Nov 15 00:06:32 debian rpc.gssd[1730]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt1f =============== ... and server: =============== Nov 15 00:06:34 archiv rpc.svcgssd[1097]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?) Nov 15 00:06:34 archiv rpc.svcgssd[1097]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?) have any ideas? -- Best Rgards
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Mon, 14 Nov 2011 20:30:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Russ Allbery <rra@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Mon, 14 Nov 2011 20:30:03 GMT) (full text, mbox, link).
Message #308 received at 622146@bugs.debian.org (full text, mbox, reply):
"Kramarenko A. Maxim" <mc-sim85@ya.ru> writes: > P.S. But kinit gets the same ticket from KDC? Or kinit does not use the > kernel and uses the tools of userland-level? The NFS server, client, and KDC all have to agree on a single encryption type, and the encryption type of the service ticket issued by the KDC to the client has to be in an encryption type that the NFS server supports. > root@debian:~# klist > Ticket cache: FILE:/tmp/krb5cc_0 > Default principal: nfs/debian.sag.local@SAG.LOCAL > Valid starting Expires Service principal > 11/14/11 22:51:28 11/15/11 08:51:36 krbtgt/SAG.LOCAL@SAG.LOCAL > renew until 11/15/11 22:51:28 It would be more interesting to run klist -e after attempting to contact the server, so that you can see what the encryption type of the service ticket for the NFS server was. -- Russ Allbery (rra@debian.org) <http://www.eyrie.org/~eagle/>
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Tue, 15 Nov 2011 05:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Tue, 15 Nov 2011 05:39:03 GMT) (full text, mbox, link).
Message #313 received at 622146@bugs.debian.org (full text, mbox, reply):
Russ Allbery <rra@debian.org> писал(а) в своём письме Tue, 15 Nov 2011
00:27:01 +0400:
> "Kramarenko A. Maxim" <mc-sim85@ya.ru> writes:
>
>
> The NFS server, client, and KDC all have to agree on a single encryption
> type, and the encryption type of the service ticket issued by the KDC to
> the client has to be in an encryption type that the NFS server supports.
KDC supports the types of encryption
(http://technet.microsoft.com/en-us/library/dd560670(WS.10).aspx):
AES256-CTS-HMAC-SHA1-96
AES128-CTS-HMAC-SHA1-96
RC4-HMAC
The NFS server is the core:
ARCHIV ~ # uname -a
Linux ARCHIV 2.6.39-bpo.2-686-pae #1 SMP Thu Aug 4 11:02:22 UTC 2011 i686
GNU/Linux
As you said above, it supports:
AES256-CTS-HMAC-SHA1-96
AES128-CTS-HMAC-SHA1-96
RC4-HMAC
The NFS client has a core:
root@debian:~# uname -a
Linux debian 3.0.0-1-486 #1 Sat Aug 27 15:56:48 UTC 2011 i686 GNU/Linux
It is older than the server, respectively, should also support the above
types of encryption.
(If the server and client on the kernel Linux debian 3.0.0-1-486 # 1, then
there is no error ...)
I tried to tune in krb5.conf on the client and server NFS (last letter):
default_tkt_enctypes = rc4-hmac
default_tgs_enctypes = rc4-hmac
permitted_enctypes = rc4-hmac
But still there was an error on NFS server:
Nov 14 22:54:40 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - No supported
encryption types (config file error?)
Nov 14 22:54:40 archiv rpc.svcgssd[4812]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - No supported
encryption types (config file error?)
>
> It would be more interesting to run klist -e after attempting to contact
> the server, so that you can see what the encryption type of the service
> ticket for the NFS server was.
>
on client:
root@debian:~# kinit -k nfs/debian.sag.local
root@debian:~# klist -e
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nfs/debian.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/15/11 09:27:22 11/15/11 19:27:30 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/16/11 09:27:22, Etype (skey, tkt): arcfour-hmac,
arcfour-hmac
...and on server:
ARCHIV ~ # kinit -k nfs/archiv.sag.local
ARCHIV ~ # klist -e
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nfs/archiv.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/15/11 09:26:37 11/15/11 19:26:42 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/16/11 09:26:37, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
--
Best Regards
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Tue, 15 Nov 2011 05:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Russ Allbery <rra@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Tue, 15 Nov 2011 05:57:03 GMT) (full text, mbox, link).
Message #318 received at 622146@bugs.debian.org (full text, mbox, reply):
"Kramarenko A. Maxim" <mc-sim85@ya.ru> writes: >> It would be more interesting to run klist -e after attempting to contact >> the server, so that you can see what the encryption type of the service >> ticket for the NFS server was. > on client: > root@debian:~# kinit -k nfs/debian.sag.local > root@debian:~# klist -e > Ticket cache: FILE:/tmp/krb5cc_0 > Default principal: nfs/debian.sag.local@SAG.LOCAL > Valid starting Expires Service principal > 11/15/11 09:27:22 11/15/11 19:27:30 krbtgt/SAG.LOCAL@SAG.LOCAL > renew until 11/16/11 09:27:22, Etype (skey, tkt): arcfour-hmac, > arcfour-hmac No, this is the TGT for the client's principal. Rather than running klist -e immediately after obtaining credentials, run kinit and then try to access NFS (so that rpc.gssd will obtain a service ticket for the server) and *then* run klist -e and look at what encryption type the service ticket for nfs/archiv.sag.local@SAG.LOCAL has. -- Russ Allbery (rra@debian.org) <http://www.eyrie.org/~eagle/>
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Tue, 15 Nov 2011 07:15:04 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Tue, 15 Nov 2011 07:15:04 GMT) (full text, mbox, link).
Message #323 received at 622146@bugs.debian.org (full text, mbox, reply):
Russ Allbery <rra@debian.org> писал(а) в своём письме Tue, 15 Nov 2011
09:54:29 +0400:
> "Kramarenko A. Maxim" <mc-sim85@ya.ru> writes:
>
>>> It would be more interesting to run klist -e after attempting to
>>> contact
>>> the server, so that you can see what the encryption type of the service
>>> ticket for the NFS server was.
>
>> on client:
>
>> root@debian:~# kinit -k nfs/debian.sag.local
>> root@debian:~# klist -e
>> Ticket cache: FILE:/tmp/krb5cc_0
>> Default principal: nfs/debian.sag.local@SAG.LOCAL
>
>> Valid starting Expires Service principal
>> 11/15/11 09:27:22 11/15/11 19:27:30 krbtgt/SAG.LOCAL@SAG.LOCAL
>> renew until 11/16/11 09:27:22, Etype (skey, tkt): arcfour-hmac,
>> arcfour-hmac
>
> No, this is the TGT for the client's principal. Rather than running
> klist
> -e immediately after obtaining credentials, run kinit and then try to
> access NFS (so that rpc.gssd will obtain a service ticket for the server)
> and *then* run klist -e and look at what encryption type the service
> ticket for nfs/archiv.sag.local@SAG.LOCAL has.
>
It's done.
On client mount and klist:
root@debian:~# mount -vvv -t nfs4 -o sec=krb5 archiv:/nfs /mnt2
mount: fstab path: "/etc/fstab"
mount: mtab path: "/etc/mtab"
mount: lock path: "/etc/mtab~"
mount: temp path: "/etc/mtab.tmp"
mount: UID: 0
mount: eUID: 0
mount: spec: "archiv:/nfs"
mount: node: "/mnt2"
mount: types: "nfs4"
mount: opts: "sec=krb5"
mount: external mount: argv[0] = "/sbin/mount.nfs4"
mount: external mount: argv[1] = "archiv:/nfs"
mount: external mount: argv[2] = "/mnt2"
mount: external mount: argv[3] = "-v"
mount: external mount: argv[4] = "-o"
mount: external mount: argv[5] = "rw,sec=krb5"
mount.nfs4: timeout set for Tue Nov 15 11:09:25 2011
mount.nfs4: trying text-based options
'sec=krb5,addr=10.0.0.6,clientaddr=10.0.0.50'
mount.nfs4: mount(2): Permission denied
mount.nfs4: access denied by server while mounting archiv:/nfs
root@debian:~# ls -la /tmp/
итого 8
drwxrwxrwt 4 root root 100 Ноя 15 11:07 .
drwxr-xr-x 24 root root 4096 Ноя 14 16:55 ..
drwxrwxrwt 2 root root 40 Ноя 14 12:28 .ICE-unix
-rw------- 1 root root 2444 Ноя 15 11:07 krb5cc_machine_SAG.LOCAL
drwxrwxrwt 2 root root 40 Ноя 14 12:28 .X11-unix
root@debian:~# klist -e /tmp/krb5cc_machine_SAG.LOCAL
Ticket cache: FILE:/tmp/krb5cc_machine_SAG.LOCAL
Default principal: nfs/debian.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/15/11 11:07:25 11/15/11 21:07:28 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/16/11 11:07:25, Etype (skey, tkt): arcfour-hmac,
arcfour-hmac
11/15/11 11:07:28 11/15/11 21:07:28 nfs/archiv.sag.local@SAG.LOCAL
renew until 11/16/11 11:07:25, Etype (skey, tkt): arcfour-hmac,
arcfour-hmac
On NFS server:
ARCHIV ~ # ls -la /tmp/
итого 8
drwxrwxrwt 2 root root 4096 Ноя 15 10:41 .
drwxr-xr-x 24 root root 4096 Ноя 14 23:56 ..
ARCHIV ~ # ps aux | grep rpc
root 805 0.0 0.0 2308 920 ? Ss 00:03 0:00
/sbin/rpcbind -w
root 827 0.0 0.0 0 0 ? S< 00:03 0:00 [rpciod]
root 2089 0.0 0.0 3676 1556 ? Ss 11:04 0:00
/usr/sbin/rpc.svcgssd yes
root 2091 0.0 0.0 2668 636 ? Ss 11:04 0:00
/usr/sbin/rpc.mountd --manage-gids
statd 2132 0.0 0.0 2376 1056 ? Ss 11:05 0:00
/sbin/rpc.statd
root 2144 0.0 0.0 2612 392 ? Ss 11:05 0:00
/usr/sbin/rpc.idmapd
root 2148 0.0 0.0 3440 616 ? Ss 11:05 0:00
/usr/sbin/rpc.gssd -vvv
root 2158 0.0 0.0 3464 752 pts/0 S+ 11:09 0:00 grep
--colour=auto rpc
ARCHIV ~ # tail /var/log/daemon.log
Nov 15 11:04:51 archiv rpc.mountd[1962]: Caught signal 15, un-registering
and exiting.
Nov 15 11:04:52 archiv rpc.mountd[2091]: Version 1.2.4 starting
Nov 15 11:04:59 archiv rpc.gssd[2010]: exiting on signal 15
Nov 15 11:04:59 archiv rpc.statd[1994]: Caught signal 15, un-registering
and exiting
Nov 15 11:05:00 archiv rpc.statd[2132]: Version 1.2.4 starting
Nov 15 11:05:00 archiv sm-notify[2133]: Version 1.2.4 starting
Nov 15 11:05:00 archiv sm-notify[2133]: Already notifying clients; Exiting!
Nov 15 11:05:00 archiv rpc.gssd[2148]: beginning poll
Nov 15 11:07:28 archiv rpc.svcgssd[2089]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - No supported
encryption types (config file error?)
Nov 15 11:07:28 archiv rpc.svcgssd[2089]: ERROR: GSS-API: error in
handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS
failure. Minor code may provide more information) - No supported
encryption types (config file error?)
On the server /tmp/krb5cc_machine_REALM not been established.
When I tried to "locally" on the NFS server to mount the exported
directory, the file has been created:
ARCHIV ~ # mount -v -t nfs4 -o sec=krb5 archiv:/nfs /mnt
mount.nfs4: timeout set for Tue Nov 15 11:14:04 2011
mount.nfs4: trying text-based options
'sec=krb5,addr=10.0.0.6,clientaddr=10.0.0.6'
mount.nfs4: mount(2): Permission denied
mount.nfs4: access denied by server while mounting archiv:/nfs
ARCHIV ~ # ls -la /tmp/
итого 12
drwxrwxrwt 2 root root 4096 Ноя 15 11:12 .
drwxr-xr-x 24 root root 4096 Ноя 14 23:56 ..
-rw------- 1 root root 2444 Ноя 15 11:12 krb5cc_machine_SAG.LOCAL
ARCHIV ~ # klist -e /tmp/krb5cc_machine_SAG.LOCAL
Ticket cache: FILE:/tmp/krb5cc_machine_SAG.LOCAL
Default principal: nfs/archiv.sag.local@SAG.LOCAL
Valid starting Expires Service principal
11/15/11 11:12:04 11/15/11 21:12:09 krbtgt/SAG.LOCAL@SAG.LOCAL
renew until 11/16/11 11:12:04, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
11/15/11 11:12:09 11/15/11 21:12:09 nfs/archiv.sag.local@SAG.LOCAL
renew until 11/16/11 11:12:04, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
--
Best Regards
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Tue, 15 Nov 2011 07:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Russ Allbery <rra@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Tue, 15 Nov 2011 07:24:03 GMT) (full text, mbox, link).
Message #328 received at 622146@bugs.debian.org (full text, mbox, reply):
"Kramarenko A. Maxim" <mc-sim85@ya.ru> writes: > root@debian:~# klist -e /tmp/krb5cc_machine_SAG.LOCAL > Ticket cache: FILE:/tmp/krb5cc_machine_SAG.LOCAL > Default principal: nfs/debian.sag.local@SAG.LOCAL > Valid starting Expires Service principal > 11/15/11 11:07:25 11/15/11 21:07:28 krbtgt/SAG.LOCAL@SAG.LOCAL > renew until 11/16/11 11:07:25, Etype (skey, tkt): arcfour-hmac, > arcfour-hmac > 11/15/11 11:07:28 11/15/11 21:07:28 nfs/archiv.sag.local@SAG.LOCAL > renew until 11/16/11 11:07:25, Etype (skey, tkt): arcfour-hmac, > arcfour-hmac Okay, well, so much for that theory. I was hoping that for some reason you were getting service tickets that weren't arcfour-hmac for some reason, but you are, so I don't get why they wouldn't match. > Nov 15 11:07:28 archiv rpc.svcgssd[2089]: ERROR: GSS-API: error in > handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS > failure. Minor code may provide more information) - No supported > encryption types (config file error?) The only thing that I can think of at this point is that the underlying GSS-API implementation behind rpc.svcgssd isn't supporting arcfour-hmac for some reason. Maybe you don't have the backported version of everything and your daemon still only supports DES somehow? -- Russ Allbery (rra@debian.org) <http://www.eyrie.org/~eagle/>
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Tue, 15 Nov 2011 07:51:07 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Tue, 15 Nov 2011 07:51:08 GMT) (full text, mbox, link).
Message #333 received at 622146@bugs.debian.org (full text, mbox, reply):
Russ Allbery <rra@debian.org> писал(а) в своём письме Tue, 15 Nov 2011 11:21:05 +0400: > "Kramarenko A. Maxim" <mc-sim85@ya.ru> writes: > > The only thing that I can think of at this point is that the underlying > GSS-API implementation behind rpc.svcgssd isn't supporting arcfour-hmac > for some reason. Maybe you don't have the backported version of > everything and your daemon still only supports DES somehow? > These are versions of the software on the NFS server: ARCHIV ~ # dpkg -l | grep krb ii krb5-config 2.2 Configuration files for Kerberos Version 5 ii krb5-user 1.8.3+dfsg-4squeeze2 Basic programs to authenticate using MIT Kerberos ii libgssapi-krb5-2 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism ii libkrb5-3 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries ii libkrb5support0 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Support library ARCHIV ~ # dpkg -l | grep gss ii libgssapi-krb5-2 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism ii libgssglue1 0.1-4 mechanism-switch gssapi library ii libgssrpc4 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - GSS enabled ONCRPC ii librpcsecgss3 0.19-2 allows secure rpc communication using the rpcsec_gss protocol ARCHIV ~ # dpkg -l | grep -i mit ii krb5-user 1.8.3+dfsg-4squeeze2 Basic programs to authenticate using MIT Kerberos ii libgssapi-krb5-2 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism ii libgssrpc4 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - GSS enabled ONCRPC ii libk5crypto3 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Crypto Library ii libkadm5clnt-mit7 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Administration Clients rc libkadm5srv-mit7 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - KDC and Admin Server rc libkdb5-4 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Kerberos database ii libkrb5-3 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries ii libkrb5support0 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Support library ARCHIV ~ # dpkg -l | grep -i nfs ii liblockfile1 1.08-4 NFS-safe locking library, includes dotlockfile program ii libnfsidmap2 0.23-2 An nfs idmapping library ii nfs-common 1:1.2.4-1~bpo60+1 NFS support files common to client and server ii nfs-kernel-server 1:1.2.4-1~bpo60+1 support for NFS kernel server Can cost from backporting upgrade krb5-user? -- Best Regards, Mc.Sim. http://www.k-max.name/
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>:
Bug#622146; Package nfs-kernel-server,src:krb5.
(Thu, 17 Nov 2011 07:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to "Kramarenko A. Maxim" <mc-sim85@ya.ru>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>, Sam Hartman <hartmans@debian.org>.
(Thu, 17 Nov 2011 07:27:03 GMT) (full text, mbox, link).
Message #338 received at 622146@bugs.debian.org (full text, mbox, reply):
I upgraded krb5-user from the repository, backports, but the error remained the same: ARCHIV ~ # dpkg -l | grep -i mit ii krb5-user 1.9.1+dfsg-3 Basic programs to authenticate using MIT Ke ii libgssapi-krb5-2 1.9.1+dfsg-3 MIT Kerberos runtime libraries - krb5 GSS-A ii libgssrpc4 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - GSS enable ii libk5crypto3 1.9.1+dfsg-3 MIT Kerberos runtime libraries - Crypto Lib ii libkadm5clnt-mit7 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Administra ii libkadm5clnt-mit8 1.9.1+dfsg-3 MIT Kerberos runtime libraries - Administra rc libkadm5srv-mit7 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - KDC and Ad ii libkadm5srv-mit8 1.9.1+dfsg-3 MIT Kerberos runtime libraries - KDC and Ad rc libkdb5-4 1.8.3+dfsg-4squeeze2 MIT Kerberos runtime libraries - Kerberos d ii libkdb5-5 1.9.1+dfsg-3 MIT Kerberos runtime libraries - Kerberos d ii libkrb5-3 1.9.1+dfsg-3 MIT Kerberos runtime libraries ii libkrb5support0 1.9.1+dfsg-3 MIT Kerberos runtime libraries - Support li ARCHIV ~ # echo startingmount >> /var/log/daemon.log ARCHIV ~ # mount -v -t nfs4 -o sec=krb5 archiv:/nfs /mnt mount.nfs4: timeout set for Thu Nov 17 11:22:49 2011 mount.nfs4: trying text-based options 'sec=krb5,addr=10.0.0.6,clientaddr=10.0.0.6' mount.nfs4: mount(2): Permission denied mount.nfs4: access denied by server while mounting archiv:/nfs ARCHIV ~ # grep -A500 startingmount /var/log/daemon.log startingmount Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd3618c data 0xbfd3620c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd3809c data 0xbfd3811c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: handling gssd upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt6) Nov 17 11:20:49 archiv rpc.gssd[846]: handle_gssd_upcall: 'mech=krb5 uid=0 enctypes=18,17,16,23,3,1,2 ' Nov 17 11:20:49 archiv rpc.gssd[846]: handling krb5 upcall (/var/lib/nfs/rpc_pipefs/nfs/clnt6) Nov 17 11:20:49 archiv rpc.gssd[846]: process_krb5_upcall: service is '<null>' Nov 17 11:20:49 archiv rpc.gssd[846]: Full hostname for 'archiv.SAG.local' is 'archiv.sag.local' Nov 17 11:20:49 archiv rpc.gssd[846]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local' Nov 17 11:20:49 archiv rpc.gssd[846]: Key table entry not found while getting keytab entry for 'ARCHIV$@SAG.LOCAL' Nov 17 11:20:49 archiv rpc.gssd[846]: Key table entry not found while getting keytab entry for 'root/archiv.sag.local@SAG.LOCAL' Nov 17 11:20:49 archiv rpc.gssd[846]: Success getting keytab entry for 'nfs/archiv.sag.local@SAG.LOCAL' Nov 17 11:20:49 archiv rpc.gssd[846]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321546655 Nov 17 11:20:49 archiv rpc.gssd[846]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321546655 Nov 17 11:20:49 archiv rpc.gssd[846]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds Nov 17 11:20:49 archiv rpc.gssd[846]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL Nov 17 11:20:49 archiv rpc.gssd[846]: creating context using fsuid 0 (save_uid 0) Nov 17 11:20:49 archiv rpc.gssd[846]: creating tcp client for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: DEBUG: port already set to 2049 Nov 17 11:20:49 archiv rpc.gssd[846]: creating context with server nfs@archiv.SAG.local Nov 17 11:20:49 archiv rpc.svcgssd[13849]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?) Nov 17 11:20:49 archiv rpc.gssd[846]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: WARNING: Machine cache is prematurely expired or corrupted trying to recreate cache for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: Full hostname for 'archiv.SAG.local' is 'archiv.sag.local' Nov 17 11:20:49 archiv rpc.gssd[846]: Full hostname for 'archiv.sag.local' is 'archiv.sag.local' Nov 17 11:20:49 archiv rpc.gssd[846]: Key table entry not found while getting keytab entry for 'ARCHIV$@SAG.LOCAL' Nov 17 11:20:49 archiv rpc.gssd[846]: Key table entry not found while getting keytab entry for 'root/archiv.sag.local@SAG.LOCAL' Nov 17 11:20:49 archiv rpc.gssd[846]: Success getting keytab entry for 'nfs/archiv.sag.local@SAG.LOCAL' Nov 17 11:20:49 archiv rpc.gssd[846]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321546655 Nov 17 11:20:49 archiv rpc.gssd[846]: INFO: Credentials in CC 'FILE:/tmp/krb5cc_machine_SAG.LOCAL' are good until 1321546655 Nov 17 11:20:49 archiv rpc.gssd[846]: using FILE:/tmp/krb5cc_machine_SAG.LOCAL as credentials cache for machine creds Nov 17 11:20:49 archiv rpc.gssd[846]: using environment variable to select krb5 ccache FILE:/tmp/krb5cc_machine_SAG.LOCAL Nov 17 11:20:49 archiv rpc.gssd[846]: creating context using fsuid 0 (save_uid 0) Nov 17 11:20:49 archiv rpc.gssd[846]: creating tcp client for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: DEBUG: port already set to 2049 Nov 17 11:20:49 archiv rpc.gssd[846]: creating context with server nfs@archiv.SAG.local Nov 17 11:20:49 archiv rpc.svcgssd[13849]: ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context(): GSS_S_FAILURE (Unspecified GSS failure. Minor code may provide more information) - No supported encryption types (config file error?) Nov 17 11:20:49 archiv rpc.gssd[846]: WARNING: Failed to create krb5 context for user with uid 0 for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: WARNING: Failed to create machine krb5 context with credentials cache FILE:/tmp/krb5cc_machine_SAG.LOCAL for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: WARNING: Failed to create machine krb5 context with any credentials cache for server archiv.SAG.local Nov 17 11:20:49 archiv rpc.gssd[846]: doing error downcall Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: dir_notify_handler: sig 37 si 0xbfd397ec data 0xbfd3986c Nov 17 11:20:49 archiv rpc.gssd[846]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt7 Nov 17 11:20:49 archiv rpc.gssd[846]: destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt6 ARCHIV ~ # May have someone else any advice? -- Best Regards, Mc.Sim. http://www.k-max.name/
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 16 Dec 2011 07:34:52 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.