Based on the bug report, what seems to be happening is that the client
is managing to negotiate an AES context even though the code calls
set_allowable_enctypes to limit the context to only supporting des.
So you get a CFX context on the server, which doesn't actually support
CFX, so things lose.  As it turns out, the client doesn't support CFX
either, so things would have failed there in a few functions calls.

Now, there's a question about whether this is a bug in Kerberos or the
nfs-utils code.  Signs point to a kerberos bug.  The major thing that
has changed in this area is the addition of the mechglue layer in
1.6.1.
It's possible that even for a krb5 credential, this routine doesn't do
the right thing.  Alternatively' it's possible that nfs's expectations
about what a glue layer does are wrong and the bug is on the nfs side.

I think this will be fairly easy to walk through this in a debugger
and see what's going on.  I'll do that before unleashing 1.6.1 on
unstable.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to