Bug 133412 (IT_67292)
Summary: | rshd fails after multiple successive access attempts | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | David Roessler <david.roessler> |
Component: | rsh | Assignee: | Karel Zak <kzak> |
Status: | CLOSED WORKSFORME | QA Contact: | Ben Levenson <benl> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | laroche, tao, uthomas |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-03-17 17:35:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
David Roessler
2004-09-23 20:13:07 UTC
'Resource temporarily unavailable' is not a bug. It's result of rresvport() (errno EAGAIN). Your client hang up, because it's waiting for server stderr connection. This cannot be fixed too. It's bad client<->server protocol design and we cannot change it if we want to be compatible with all others rsh implementation in the others OS/distributions. Sorry of this, maybe you can use ssh that is really better. I get that. The issue is why is the server failing to provide the stderr connection? Our protocol is currently working with every other rshd implementation we have tried (including IBM's uss). The problem is that all ports at server are probably used. You can try "netstat -n --inet" on server and very probably you will see a lot of "TIME_WAIT" connections. There is already one simular report #129226. Durig the chrismas time I wrote simple program 'rsh-fifo' that is useful for users who need something like while (( 1 == 1 )); do rsh <node> date; done It uses one persistent connection, so it prevent problems with TIME_WAIT and limited number of privileged ports. For more information: http://people.redhat.com/kzak/rsh/rsh-fifo/ We have implemented a local workaround that simply delays rsh attempts against linux targets. This seems to give sufficient time for stderr to become available. Perhaps this is not optimal, but it has let us proceed. |