Bug 643528
Summary: | Invalid kerberos token error on EMC Celerra when trying 'mount -t nfs4 -o sec=krb5' | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | John Dickerson <jedicker> |
Component: | nfs-utils | Assignee: | Steve Dickson <steved> |
Status: | CLOSED DUPLICATE | QA Contact: | desktop-bugs <desktop-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 6.0 | CC: | bfields, elfed_lewis |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-11-23 21:01:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Attachments: |
Description
John Dickerson
2010-10-15 21:07:10 UTC
oops. Accidentally selected gssdp as the component. Should be nfs-utils. (In reply to comment #1) > oops. Accidentally selected gssdp as the component. Should be nfs-utils. You should also reset the owner... Created attachment 455635 [details]
wireshark capture of sec=krb5 nfs4 mount between rhel6 client and Solaris 10 server.
Created attachment 455636 [details]
wireshark caputure of sec=krb5 nfs4 mount from centos5.4 client and Solaris 10 NFS4 server
Not sure if this helps, But I recently had a problem hooking up a rhel6 client to my celerra. We were using active directory, but it was the kerberos component that was failing. We had to add the following lines to our krb5.conf file to get it to work: default_tgs_enctypes = des-cbc-crc des-cbc-md5 default_tkt_enctypes = des-cbc-crc des-cbc-md5 You may want to add other enctypes too, but those worked for us. Seems older versions of the Celerra dont support strong enctypes. you may also want to investigate this option: allow_weak_crypto In the bad case, the client sends a truncated init-sec-ctx null packet, the body of which is truncated immediately after the length field (0x0523 in this case). What version of libtirpc is installed, and does it include the patch referenced in https://bugzilla.redhat.com/show_bug.cgi?id=613682#c20 ? It appears that this bug was fixed in RHEL 6.0. Whatever the cause, it seems to be have been corrected between beta2 and the final release. # rpm -q libtirpc nfs-utils libtirpc-0.2.1-1.el6.x86_64 nfs-utils-1.2.2-7.el6.x86_64 I have tested this on a cleanly built RHEL 6.0 machine. I can mount nfs4 with sec=krb5 from our Celerra (Dart OS 5.6.50) as expected. Also, it appears that the "allow weak crypto = true" setting in /etc/krb5.conf is not needed if ArcFour with HMAC/md5 is used as the default kerberos encryption type. in /etc/krb5.conf: [libdefaults] # allow_weak_crypto = true default_tkt_enctypes = rc4-hmac default_tgs_enctypes = rc4-hmac permitted_enctypes = rc4-hmac According to an EMC engineer who investigated this problem, ArcFour with HMAC/md5 is the stronest encryption type supported by the Celerra. Apparently, this is strong enough encryption to obviate the need for the "weak crypto" setting. *** This bug has been marked as a duplicate of bug 613682 *** |