Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.kernel    |    Debian kernel discussions    |    2,884 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,583 of 2,884    |
|    Tyler W. Ross to Scott Mayhew    |
|    Bug#1120598: ls input/output error ("NFS    |
|    18 Nov 25 05:40:01    |
      XPost: linux.debian.bugs.dist, linux.kernel       From: TWR@tylerwross.com              On 11/17/25 4:05 PM, Scott Mayhew wrote:       > On Mon, 17 Nov 2025, Tyler W. Ross wrote:       >        >> Weird behavior I just discovered:       >>       >> Explicitly setting allowed-enctypes in the gssd section of /etc/nfs.conf       >> to exclude aes256-cts-hmac-sha1-96 makes both SHA2 ciphers work as       >> expected (assuming each is allowed).       >>       >> If allowed-enctypes is unset (letting gssd interrogate the kernel for       >> supported enctypes) or includes aes256-cts-hmac-sha1-96, then the XDR       >> overflow occurs.       >>       >> Non-working configurations (first is the commented-out default in nfs.conf):       >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-s       a256-128,camellia256-cts-cmac,camellia128-cts-cmac,aes256-cts-hm       c-sha1-96,aes128-cts-hmac-sha1-96       >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes256-cts-hmac-sha1-96       >> allowed-enctypes=aes128-cts-hmac-sha256-128,aes256-cts-hmac-sha1-96       >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-s       a256-128,aes256-cts-hmac-sha1-96       >>       >> Working configurations (first is default sans aes256-cts-hmac-sha1-96):       >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-s       a256-128,camellia256-cts-cmac,camellia128-cts-cmac,aes128-cts-hmac-sha1-96       >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-sha256-128       >> allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-sha1-96       >> allowed-enctypes=aes128-cts-hmac-sha256-128,aes128-cts-hmac-sha1-96       >>       >        > That doesn't really make sense. You should only need to use the       > allowed-enctypes setting if you're talking to an NFS server that doesn't       > have support for the new encryption types.       >        > It basically works like the "permitted_enctypes" option in krb5.conf,       > except it only affects NFS rather than affecting your krb5 configuration       > as a whole.              Agreed. It really doesn't make sense. It may just be me being confounded        by some ancillary behavior I don't understand.              I find it especially strange that       allowed-enctypes=aes256-cts-hmac-sha384-192 works, but unset       allowed-enctypes with a manually acquired aes256-cts-hmac-sha384-192        ticket doesn't work.              allowed-enctypes=aes256-cts-hmac-sha384-192 works both with an        automatically acquired service ticket (kinit then ls) and a manually        acquired service ticket (via kvno -e).              > Can you go back and re-do the tracepoint capture, except this time       > umount your NFS filessytems before starting the capture (i.e. perform       > the mount command while trace-cmd is running). I'm curious what values       > the rpcgss_update_slack tracepoint shows.              Here are the 2 rpcgss_update_slack occurrences, with a couple lines of        context. Let me know if you'd like the full report: it's ~1300 lines.              mount.nfs4-1043 [005] ..... 190.746932: rpc_task_run_action:        task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI       EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=call_status       mount.nfs4-1043 [005] ..... 190.746932: rpc_task_run_action:        task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI       EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=call_decode       mount.nfs4-1043 [005] ..... 190.746933: rpc_xdr_recvfrom:        task:00000002@00000001 head=[0xffff8a61a2848fd4,4392] page=0(0) tail=[(nil),0]       len=312       mount.nfs4-1043 [005] ..... 190.746938: rpcgss_update_slack:        task:00000002@00000001 xid=0xb28269cc auth=0xffff8a6189400798 rslack=19       ralign=11 verfsize=9       mount.nfs4-1043 [005] ..... 190.746939: rpc_task_run_action:        task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI       EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=rpc_exit_task       mount.nfs4-1043 [005] ..... 190.746939: rpc_task_end:        task:00000002@00000001 flags=DYNAMIC|NO_ROUND_ROBIN|SOFT|SENT|TI       EOUT|NORTO|CRED_NOREF runstate=RUNNING|0x4 status=0 action=rpc_exit_task       mount.nfs4-1043 [005] ..... 190.746940: rpc_stats_latency:        task:00000002@00000001 xid=0xb28269cc nfsv4 EXCHANGE_ID backlog=12836 rtt=136       execute=12995 xprt_id=1       --       mount.nfs4-1043 [002] ..... 190.755687: rpc_task_run_action:        task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF       runstate=RUNNING|0x4 status=0 action=call_status       mount.nfs4-1043 [002] ..... 190.755687: rpc_task_run_action:        task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF       runstate=RUNNING|0x4 status=0 action=call_decode       mount.nfs4-1043 [002] ..... 190.755688: rpc_xdr_recvfrom:        task:00000001@00000002 head=[0xffff8a6182b4e6ac,2920] page=0(0) tail=[(nil),0]       len=192       mount.nfs4-1043 [002] ..... 190.755691: rpcgss_update_slack:        task:00000001@00000002 xid=0xb68269cc auth=0xffff8a6187759498 rslack=9       ralign=9 verfsize=9       mount.nfs4-1043 [002] ..... 190.755694: rpc_task_run_action:        task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF       runstate=RUNNING|0x4 status=0 action=rpc_exit_task       mount.nfs4-1043 [002] ..... 190.755694: rpc_task_end:        task:00000001@00000002 flags=MOVEABLE|DYNAMIC|SENT|NORTO|CRED_NOREF       runstate=RUNNING|0x4 status=0 action=rpc_exit_task       mount.nfs4-1043 [002] ..... 190.755694: rpc_stats_latency:        task:00000001@00000002 xid=0xb68269cc nfsv4 LOOKUP_ROOT backlog=7101 rtt=91       execute=7218 xprt_id=1                     And here's with allowed-enctypes=aes256-cts-hmac-sha384-192                     [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca