Date: Wed, 2 Dec 2015 12:02:43 +0100 From: Joerg Sonnenberger <joerg@britannica.bec.de> To: freebsd-hackers@freebsd.org, hackers@freebsd.org Subject: Re: NFSv4 details and documentations Message-ID: <20151202110243.GA17480@britannica.bec.de> In-Reply-To: <20151202100708.GJ31314@zxy.spb.ru> References: <1162872124.114408327.1449007978859.JavaMail.zimbra@uoguelph.ca> <alpine.GSO.1.10.1512020158390.26829@multics.mit.edu> <20151202100708.GJ31314@zxy.spb.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Dec 02, 2015 at 01:07:08PM +0300, Slawa Olhovchenkov wrote: > FreeBSD ssh'd use thread emulations by fork, as result Kerberos token > got at pam_krb5:auth can't be accessed at pam_krb5:session (for > writing in /tmp/krb5cc_UID. Recompile with > -DUNSUPPORTED_POSIX_THREADS_HACK resove this issuse (and I can login > with kerberos password to host with kerberoized NFSv4 and w/o > additional kinit or password sshd to another host. Please try UsePrivilegeSeparation=no instead. The pthread hack should just die complete. Joerg
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20151202110243.GA17480>