home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   linux.debian.kernel      Debian kernel discussions      2,884 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,583 of 2,884   
   Tyler W. Ross to Scott Mayhew   
   Bug#1120598: ls input/output error ("NFS   
   18 Nov 25 05:40:01   
   
   XPost: linux.debian.bugs.dist, linux.kernel   
   From: TWR@tylerwross.com   
      
   On 11/17/25 4:05 PM, Scott Mayhew wrote:   
   > On Mon, 17 Nov 2025, Tyler W. Ross wrote:   
   >    
   >> Weird behavior I just discovered:   
   >>   
   >> Explicitly setting allowed-enctypes in the gssd section of /etc/nfs.conf   
   >> to exclude aes256-cts-hmac-sha1-96 makes both SHA2 ciphers work as   
   >> expected (assuming each is allowed).   
   >>   
   >> If allowed-enctypes is unset (letting gssd interrogate the kernel for   
   >> supported enctypes) or includes aes256-cts-hmac-sha1-96, then the XDR   
   >> overflow occurs.   
   >>   
   >> Non-working configurations (first is the commented-out default in nfs.conf):   
   >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-s   
   a256-128,camellia256-cts-cmac,camellia128-cts-cmac,aes256-cts-hm   
   c-sha1-96,aes128-cts-hmac-sha1-96   
   >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes256-cts-hmac-sha1-96   
   >> allowed-enctypes=aes128-cts-hmac-sha256-128,aes256-cts-hmac-sha1-96   
   >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-s   
   a256-128,aes256-cts-hmac-sha1-96   
   >>   
   >> Working configurations (first is default sans aes256-cts-hmac-sha1-96):   
   >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-s   
   a256-128,camellia256-cts-cmac,camellia128-cts-cmac,aes128-cts-hmac-sha1-96   
   >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-sha256-128   
   >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-sha1-96   
   >> allowed-enctypes=aes128-cts-hmac-sha256-128,aes128-cts-hmac-sha1-96   
   >>   
   >    
   > That doesn't really make sense.  You should only need to use the   
   > allowed-enctypes setting if you're talking to an NFS server that doesn't   
   > have support for the new encryption types.   
   >    
   > It basically works like the "permitted_enctypes" option in krb5.conf,   
   > except it only affects NFS rather than affecting your krb5 configuration   
   > as a whole.   
      
   Agreed. It really doesn't make sense. It may just be me being confounded    
   by some ancillary behavior I don't understand.   
      
   I find it especially strange that   
   allowed-enctypes=aes256-cts-hmac-sha384-192 works, but unset   
   allowed-enctypes with a manually acquired aes256-cts-hmac-sha384-192    
   ticket doesn't work.   
      
   allowed-enctypes=aes256-cts-hmac-sha384-192 works both with an    
   automatically acquired service ticket (kinit then ls) and a manually    
   acquired service ticket (via kvno -e).   
      
   > Can you go back and re-do the tracepoint capture, except this time   
   > umount your NFS filessytems before starting the capture (i.e. perform   
   > the mount command while trace-cmd is running).  I'm curious what values   
   > the rpcgss_update_slack tracepoint shows.   
      
   Here are the 2 rpcgss_update_slack occurrences, with a couple lines of    
   context. Let me know if you'd like the full report: it's ~1300 lines.   
      
   mount.nfs4-1043  [005] .....   190.746932: rpc_task_run_action:    
   task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI   
   EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=call_status   
   mount.nfs4-1043  [005] .....   190.746932: rpc_task_run_action:    
   task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI   
   EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=call_decode   
   mount.nfs4-1043  [005] .....   190.746933: rpc_xdr_recvfrom:       
   task:00000002@00000001 head=[0xffff8a61a2848fd4,4392] page=0(0) tail=[(nil),0]   
   len=312   
   mount.nfs4-1043  [005] .....   190.746938: rpcgss_update_slack:    
   task:00000002@00000001 xid=0xb28269cc auth=0xffff8a6189400798 rslack=19   
   ralign=11 verfsize=9   
   mount.nfs4-1043  [005] .....   190.746939: rpc_task_run_action:    
   task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI   
   EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=rpc_exit_task   
   mount.nfs4-1043  [005] .....   190.746939: rpc_task_end:           
   task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI   
   EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=rpc_exit_task   
   mount.nfs4-1043  [005] .....   190.746940: rpc_stats_latency:      
   task:00000002@00000001 xid=0xb28269cc nfsv4 EXCHANGE_ID backlog=12836 rtt=136   
   execute=12995 xprt_id=1   
   --   
   mount.nfs4-1043  [002] .....   190.755687: rpc_task_run_action:    
   task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF   
   runstate=RUNNING|0x4 status=0 action=call_status   
   mount.nfs4-1043  [002] .....   190.755687: rpc_task_run_action:    
   task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF   
   runstate=RUNNING|0x4 status=0 action=call_decode   
   mount.nfs4-1043  [002] .....   190.755688: rpc_xdr_recvfrom:       
   task:00000001@00000002 head=[0xffff8a6182b4e6ac,2920] page=0(0) tail=[(nil),0]   
   len=192   
   mount.nfs4-1043  [002] .....   190.755691: rpcgss_update_slack:    
   task:00000001@00000002 xid=0xb68269cc auth=0xffff8a6187759498 rslack=9   
   ralign=9 verfsize=9   
   mount.nfs4-1043  [002] .....   190.755694: rpc_task_run_action:    
   task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF   
   runstate=RUNNING|0x4 status=0 action=rpc_exit_task   
   mount.nfs4-1043  [002] .....   190.755694: rpc_task_end:           
   task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF   
   runstate=RUNNING|0x4 status=0 action=rpc_exit_task   
   mount.nfs4-1043  [002] .....   190.755694: rpc_stats_latency:      
   task:00000001@00000002 xid=0xb68269cc nfsv4 LOOKUP_ROOT backlog=7101 rtt=91   
   execute=7218 xprt_id=1   
      
      
   And here's with allowed-enctypes=aes256-cts-hmac-sha384-192   
      
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca