Red Hat Bugzilla – Bug 1087068
0006526: GSS api stopped working properly after krb5 update
Last modified: 2014-10-14 04:10:51 EDT
Description of problem: GSS-TSIG stopped working (it worked in the past) with MS Active Directory so Windows can not register/update DNS records. This bug is very sneaky - no log in the logfile, after debugging enabled: "failed gss_inquire_cred: GSSAPI error: Major = Unspecified GSS failure. Minor code may provide more information, Minor = Success." This could be GSSAPI library bug or bind bug (or both), because it works with ISC SPNEGO (after recompiling bind without "--disable-isc-spnego") but not with GSSAPI SPNEGO. WORKAROUND: Downgrading of kerberos packages to krb5-devel-1.9-33.el6_3.3.i686.rpm krb5-libs-1.9-33.el6_3.3.i686.rpm krb5-workstation-1.9-33.el6_3.3.i686.rpm This is an old bug, so downgrading of krb5 could cause some security issues. How reproducible: Every signed Active Directory dns update using gssapi. Affected OS versions: All versions of krb5 > 1.9-33.el6_3.3 in CentOS (see https://bugs.centos.org/view.php?id=6526). I am not using it in rhel, but it seems to be an rhel issue.
Hi. AFAIK this is not a bug in BIND's source. The "--disable-isc-spnego" is used to NOT use ISC own SPNEGO implementation, but to rather use the GSSAPI implementation. This has to be fixed in the krb5. The fix should be this: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7858 I'm moving this to krb5 component and CC-ing Simo, as he initiated a discussion about this recently.
This bug has recently been fixed in Fedora, see: https://bugzilla.redhat.com/show_bug.cgi?id=1066000 you may want to clone the bug for RHEL ?
This Fedora bug seems to be the same. Will be those fixed packages backported to the rhel?
Nalin, can we backport to RHEL 6.6 ?
I think the patch could be added, yes.
Can we get devel_ack then ?
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2014-1389.html