Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.kernel    |    Debian kernel discussions    |    2,884 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,431 of 2,884    |
|    Tyler W. Ross to All    |
|    Bug#1120598: nfs-common: ls input/output    |
|    12 Nov 25 22:50:01    |
      XPost: linux.debian.bugs.dist       From: twr+debbugs@tylerwross.com              Package: nfs-common       Version: 1:2.8.4-1+b1       Severity: important       X-Debbugs-Cc: twr+debbugs@tylerwross.com                     When the session key of a kerberos ticket uses a SHA2 cipher (ae       256-cts-hmac-sha384-192 and aes128-cts-hmac-sha256-128 tested), readdir       requests fail.              SHA1 ciphers (aes256-cts-hmac-sha1-96 and aes128-cts-hmac-sha1-96 tested) work       as expected.              ls reports the following:       ls: reading directory '/mnt/example/': Input/output error              stat and touch of files and directories is working, and cat'ing a file works       (see also: later note about cat with NFSv4.1 and 4.0).                            Example of a non-working ticket, as reported by klist -e:       11/12/25 18:37:30 11/13/25 17:49:03 nfs/nfssrv.ipa.twrlab.net@IPA.TWRLAB.NET        Etype (skey, tkt): aes256-cts-hmac-sha384-192, aes256-cts-hmac-sha384-192              Example of a working ticket:       11/12/25 19:01:46 11/13/25 18:27:33 nfs/nfssrv.ipa.twrlab.net@IPA.TWRLAB.NET        Etype (skey, tkt): aes256-cts-hmac-sha1-96, aes256-cts-hmac-sha384-192              If rpcdebug is enabled for nfs and rpc modules, the following is logged to       dmesg:       [332376.797836] NFS: nfs_weak_revalidate: inode 262146 is valid       [332376.798512] NFS: revalidating (0:58/262146)       [332376.799169] --> nfs41_call_sync_prepare data->seq_server 00000000e22b1bd9       [332376.799916] --> nfs4_alloc_slot used_slots=0000 highest_used=4294967295       max_slots=64       [332376.800764] <-- nfs4_alloc_slot used_slots=0001 highest_used=0 slotid=0       [332376.801507] RPC: gss_krb5_get_mic_v2       [332376.802009] encode_sequence: sessionid=1762048597:1479457708:22:0 seqid=27       slotid=0 max_slotid=0 cache_this=0       [332376.803204] RPC: gss_krb5_get_mic_v2       [332376.803726] RPC: xs_tcp_send_request(260) = 0       [332376.804536] RPC: gss_krb5_verify_mic_v2       [332376.805093] RPC: gss_krb5_verify_mic_v2       [332376.805643] decode_attr_type: type=040000       [332376.806149] decode_attr_change: change attribute=22       [332376.806866] decode_attr_size: file size=4096       [332376.807398] decode_attr_fsid: fsid=(0xfdcb5a40986843e0/0xa4fc6c44ad8345ad)       [332376.808154] decode_attr_fileid: fileid=262146       [332376.808742] decode_attr_fs_locations: fs_locations done, error = 0       [332376.809495] decode_attr_mode: file mode=0777       [332376.810042] decode_attr_nlink: nlink=3       [332376.810695] decode_attr_owner: uid=591200000       [332376.811229] decode_attr_group: gid=591200004       [332376.811761] decode_attr_rdev: rdev=(0x0:0x0)       [332376.812291] decode_attr_space_used: space used=4096       [332376.812878] decode_attr_time_access: atime=1762383044       [332376.813487] decode_attr_time_create: btime=1761952933       [332376.814098] decode_attr_time_metadata: ctime=1762055558       [332376.814895] decode_attr_time_modify: mtime=1762055558       [332376.815578] decode_attr_mounted_on_fileid: fileid=262146       [332376.816225] decode_getfattr_attrs: xdr returned 0       [332376.816796] decode_getfattr_generic: xdr returned 0       [332376.817374] --> nfs4_alloc_slot used_slots=0001 highest_used=0 max_slots=64       [332376.818135] <-- nfs4_alloc_slot used_slots=0003 highest_used=1 slotid=1       [332376.818873] nfs4_free_slot: slotid 1 highest_used_slotid 0       [332376.819604] nfs41_sequence_process: Error 0 free the slot       [332376.820228] nfs4_free_slot: slotid 0 highest_used_slotid 4294967295       [332376.820930] NFS: nfs_update_inode(0:58/262146 fh_crc=0xad8c294c ct=2       info=0x4427e7f)       [332376.821767] NFS: (0:58/262146) revalidation complete       [332376.822342] NFS: nfs_weak_revalidate: inode 262146 is valid       [332376.823056] NFS: permission(0:58/262146), mask=0x24, res=0       [332376.823684] NFS: open dir(/)       [332376.824087] NFS: readdir(/) starting at cookie 0       [332376.824641] _nfs4_proc_readdir: dentry = /, cookie = 0       [332376.825229] --> nfs41_call_sync_prepare data->seq_server 00000000e22b1bd9       [332376.825967] --> nfs4_alloc_slot used_slots=0000 highest_used=4294967295       max_slots=64       [332376.826814] <-- nfs4_alloc_slot used_slots=0001 highest_used=0 slotid=0       [332376.827616] RPC: gss_krb5_get_mic_v2       [332376.828114] encode_sequence: sessionid=1762048597:1479457708:22:0 seqid=28       slotid=0 max_slotid=0 cache_this=0       [332376.829146] encode_readdir: cookie = 0, verifier = 00000000:00000000,       bitmap = 0018091a:00b4a23a:00000000       [332376.830144] RPC: gss_krb5_get_mic_v2       [332376.830720] RPC: xs_tcp_send_request(284) = 0       [332376.831431] RPC: gss_krb5_verify_mic_v2       [332376.831967] RPC: gss_krb5_verify_mic_v2       [332376.832498] --> nfs4_alloc_slot used_slots=0001 highest_used=0 max_slots=64       [332376.833254] <-- nfs4_alloc_slot used_slots=0003 highest_used=1 slotid=1       [332376.833994] nfs4_free_slot: slotid 1 highest_used_slotid 0       [332376.834695] nfs41_sequence_process: Error 0 free the slot       [332376.835318] nfs4_free_slot: slotid 0 highest_used_slotid 4294967295       [332376.836016] _nfs4_proc_readdir: returns -5       [332376.836519] NFS: readdir(/) returns -5                            Environment/Supporting Systems:       - The NFS server is a fresh Debian 13 cloud image. freeipa-client, gssproxy,       nfs-kernel-server, and qemu-guest-agent have been installed. Joined to FreeIPA       via ipa-client-install.       - Kerberos is provided by a newly installed FreeIPA instance on Fedora 43.              Failing NFS client configurations:       1. Freshly deployed and updated Debian 13 official cloud image (       ebian-13-genericcloud-amd64). freeipa-client, gssproxy, nfs-common, and       qemu-guest-agent have been installed. Joined to FreeIPA via ipa-client-install.       2. Freshly installed Debian sid via mini ISO (2025-11-01). Same configuration       as 1/above.       3. Minimal replication config: freshly installed Debian 13 via d       bian-13.1.0-amd64-netinst.iso . Installed nfs-common, krb5-config and       krb5-user. Manually installed keytab: no additional krb5 configuration done       (realm was automatically configured from        hostname by krb5-config).              Working NFS client configuration:       - Fedora 43 installation configured via ipa-client-install .              This issue was escalated to me by someone with a matching production       environment (FreeIPA on Fedora 43, and Debian 13 NFS client(s) and server).       This original reporter also found that a Fedora 43 client worked as-expected       with SHA2.                                   [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca