Date: Sat, 09 Feb 2019 00:06:06 +0000 From: bugzilla-noreply@freebsd.org To: fs@FreeBSD.org Subject: [Bug 235582] rpc_svc_gss / nfsd kernel panic Message-ID: <bug-235582-3630-ZqC6bumF9P@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-235582-3630@https.bugs.freebsd.org/bugzilla/> References: <bug-235582-3630@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235582 --- Comment #6 from Rick Macklem <rmacklem@FreeBSD.org> --- Created attachment 201858 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D201858&action= =3Dedit fix srv side rpcsec_gss to handle NULL client principal name This patch modifies the server side RPCSEC_GSS so that it handles the case where gss_accept_sec_context() works for a client's token and returns GSS_S_COMPLETE but the client principal name is NULL. I have no idea what this means w.r.t. Kerberos, but since a principal name that cannot be found in the password database is authenticated as the user "nobody", this patch does the same for the case of "no prinicpal name". It is untested, but hopefully Peter can test it? (It assumes that the crash was caused by client->cl_cname =3D=3D NULL.) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-235582-3630-ZqC6bumF9P>