[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#637660: marked as done (nfs-kernel-server: gss_accept_sec_context failed - Encryption type not permitted)



Your message dated Sun, 02 Oct 2011 16:48:57 +0000
with message-id <E1RAPDl-0003vJ-Od@franck.debian.org>
and subject line Bug#637660: fixed in nfs-utils 1:1.2.5-1
has caused the Debian Bug report #637660,
regarding nfs-kernel-server: gss_accept_sec_context failed - Encryption type not permitted
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
637660: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637660
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1.2.4-1
Severity: normal


PROBLEM
=========
Unable to mount NFS4 on the client

SIMILAR ISSUE REPORTED
================
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=719776

ENVIROMENT
===========

NFS4 host= maverick
------------------------------
Debian Wheezy (Squeeze tested with same result)

maverick:~# klist -ke /etc/krb5.keytab
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
   4 nfs/maverick.firm.local@FIRM.LOCAL (des3-cbc-sha1)
   4 nfs/maverick.firm.local@FIRM.LOCAL (des-cbc-crc)



Client host = knightrider
-----------------------------------
Debian Sid

root@knightrider:~# klist -ke /etc/krb5.keytab
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
   6 nfs/knightrider.firm.local@FIRM.LOCAL (des-cbc-crc)




LOG
===========

knightrider
------------------------------------
root@knightrider:~# rpc.gssd -fvvv
beginning poll
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804330 data 0x7fff73804200
dir_notify_handler: sig 37 si 0x7fff738042f0 data 0x7fff738041c0
dir_notify_handler: sig 37 si 0x7fff737ffd70 data 0x7fff737ffc40
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
dir_notify_handler: sig 37 si 0x7fff73804430 data 0x7fff73804300
destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt34
destroying client /var/lib/nfs/rpc_pipefs/nfs/clnt33
^Cexiting on signal 2


maverick
------------------------------------------
maverick:/home/ganomi/# rpc.svcgssd -fvvv
entering poll
leaving poll
handling null request
WARNING: gss_accept_sec_context failed
ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context():
GSS_S_FAILURE (Unspecified GSS failure.  Minor code may provide more
information) - Encryption type not permitted
sending null reply
writing message: \x
\x608202b706092a864886f71201020201006e8202a6308202a2a003020105a10302010ea20703050020000000a382017c6182017830820174a003020105a10e1b0c414c4c535550502e434f5250a2273025a003020103a11e301c1b036e66731b156d6176657269636b2e616c6c737570702e636f7270a38201323082012ea003020110a103020104a28201200482011c1e4392a51ac11ba19ef2f26e9a07aebb3e717362547cd83896fd6a9e0e95296a392e3ef6284425dfb0389e1884d605d71971df90fb5205d4263aa2602fcae00c8cfa778c365aa593b9a79840a4cf04c68e134e28ca766b807e3ece3b3c656e36d60a53acae6785723977830cb8d5fd4c50f318596a0012744ae83c33c8a638d33285bf826b61436c823619cb03aff57e9bb1c21973df8dfb371e2d2965c78b052197c6b8dfdbe9c43b9b3e0e44aa3202dcfee0869ab082de2809c222c04f7e1bbf57fc99c414be4708ae435e95ac2aa2261b84c4b7e8af5a222c568658284e754e5882c75f8ec4bb8add0fe53b3430aa123c12b8ce99ed62ef24fd82bd0d319d5daa8d03c644825e1e6f806c05114d42e45f0e1040d1404c7ab4e5fea482010b30820107a003020110a281ff0481fcca1c6525128b80a4689240b6facea7c2c58f786a5898af7ca8e89c24e803548b11cd8dde1ce6fbdea1d9deae4bfe0c
 c6f316f2a4592c29f044f8cc27292beda4e83bd1c9ebc91d7ebb6ef5885b14a0a9628d185d36d24b56b691f5ff50731d0796713ebc04d6d88c84d8c8933066da0b9150cf6e60413bba9af0c2b9b00f435f92189763b257015d360c9a38d5011f542cafc5d2faf0fd23f0a6032c3dfbf1e74e7a06c8c58338b3c8c46b9229624e744258c3341e1f707544f0b5bfe20501bfbb5fa8a107d18c6d8d3697acc8020e6ccd268ec3d71b9d61d83375d02fd06f12444d56bf256d1c07f7af6948ca224efd1a3b498d680c4204da846cd7
1313243341 851968 2529639148 \x \x
finished handling null request
entering poll
leaving poll
handling null request
WARNING: gss_accept_sec_context failed
ERROR: GSS-API: error in handle_nullreq: gss_accept_sec_context():
GSS_S_FAILURE (Unspecified GSS failure.  Minor code may provide more
information) - Encryption type not permitted
sending null reply
writing message: \x
\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
 c6af5fe6eb7f750181bff12820ab063474bb62bc653e2e956987e44e1035962002af3eb6b86cf04324d206487b779d4bbfb64a0d1be01bce0fc6171eea0deae6f6cd40a28b8958d2f99e9f6246c68d7c7402ff4bc795cd5668749ab8bdaaa84c33d4a6778fe6a00e8b7c5b8c30744883a73867c83a77dcc24a3535c8255256bdfdbc10ed02f8238ef361499244098e3ad9ac5cc3b7963021d4845f555c625770e1ee158ced6b8f40cb6afde07217afdafc70657213fb89bd301eda76f50aac9ab1588a842c6a9d3ee0af9979a2
1313243341 851968 2529639148 \x \x
finished handling null request
entering poll




-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.2.5-1

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:

nfs-common_1.2.5-1_i386.deb
  to main/n/nfs-utils/nfs-common_1.2.5-1_i386.deb
nfs-kernel-server_1.2.5-1_i386.deb
  to main/n/nfs-utils/nfs-kernel-server_1.2.5-1_i386.deb
nfs-utils_1.2.5-1.debian.tar.bz2
  to main/n/nfs-utils/nfs-utils_1.2.5-1.debian.tar.bz2
nfs-utils_1.2.5-1.dsc
  to main/n/nfs-utils/nfs-utils_1.2.5-1.dsc
nfs-utils_1.2.5.orig.tar.bz2
  to main/n/nfs-utils/nfs-utils_1.2.5.orig.tar.bz2



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 637660@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luk Claes <luk@debian.org> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 02 Oct 2011 18:29:53 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.2.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Luk Claes <luk@debian.org>
Description: 
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 457095 632457 636278 637660 638607 639691 640105 642797
Changes: 
 nfs-utils (1:1.2.5-1) unstable; urgency=low
 .
   * New upstream version
     - deleted: 13-preserve-explicit-port-2049.patch
     - deleted: 17-Fix-statd.8-manpage-syntax-visible.patch
     - deleted: 18-Fix-nfsiostat.8-manpage-syntax-missing-.I.patch
     - deleted: 19-exports.man-Fix-comment-syntax.patch
     - deleted: 20-nfs.man-Fix-fstab-example.patch
     - deleted: 22-start-statd-Use-bash.patch
     - deleted: 23-nfs.man-escape-nroff-for-proper-rendering.patch
       (Closes: #636278).
     - support less components in version number (Closes: #632457).
     - idmapd: correctly convert ocal encoded fields (Closes: #640105).
     - svcgssd: use correct defaults in call to gss_set_allowable_enctypes
       (Closes: #637660).
     - rpc.statd: Bind downcall socket to loopback address (Closes: #457095).
   * Add version to build-dep on libnfsidmap-dev (Closes: #639691).
   * debian/idmapd.conf: Comment Domain (Closes: #638607).
   * debian/patches/17-multiarch-kerberos-paths.patch (Closes: #642797).
   * Add build dependency on libdevmapper-dev for blkmapd.
   * Use dh_autoreconf to make sure original files are restored.
   * Install blkmapd and its manpage.
Checksums-Sha1: 
 3adc4d7d2577df8e3025eb9c6d6bd1b619e237ab 1581 nfs-utils_1.2.5-1.dsc
 fc522fad2e0fb4a4541ba829417d8c757cb384ce 698148 nfs-utils_1.2.5.orig.tar.bz2
 0088347917716a1187c0ddc4707ceaa483f08651 34981 nfs-utils_1.2.5-1.debian.tar.bz2
 57f2ad48b216f6837b6c2948251415486c21fd4d 165082 nfs-kernel-server_1.2.5-1_i386.deb
 e6a36a3c290288c30d5cb88d36ba3ab9bd8d06c6 276758 nfs-common_1.2.5-1_i386.deb
Checksums-Sha256: 
 cc217e102de368a64a8e03ad310b26f48af1178246f3a51bcd6ac5c588350481 1581 nfs-utils_1.2.5-1.dsc
 3595ed4f6ee5c13514540861ad5e89907aa4fd6897bfa99577515233e4745a9b 698148 nfs-utils_1.2.5.orig.tar.bz2
 c2790ba21b80eb1e9eea5818f7ba0547ad49ed8b7f3b0dbdb2373027780f40c6 34981 nfs-utils_1.2.5-1.debian.tar.bz2
 6452ac51abc2cc8d570d9ac7ef972ada321b7aa8d0e1f1bae5f4f732b9681973 165082 nfs-kernel-server_1.2.5-1_i386.deb
 ebfb5ba09033b2b25e2340be33bc35ee34cc13e964ca0fec391d01680b56ae8d 276758 nfs-common_1.2.5-1_i386.deb
Files: 
 10da34252b652d366f4dfb09374a5f5f 1581 net standard nfs-utils_1.2.5-1.dsc
 8395ac770720b83c5c469f88306d7765 698148 net standard nfs-utils_1.2.5.orig.tar.bz2
 7789f667927cce467146bc7771fa4ded 34981 net standard nfs-utils_1.2.5-1.debian.tar.bz2
 09d75a5b548c6e11d19b065da372fed6 165082 net optional nfs-kernel-server_1.2.5-1_i386.deb
 cf24e278f0ded32523acb09595f8f513 276758 net standard nfs-common_1.2.5-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6IlTcACgkQ5UTeB5t8Mo2odQCdFAOF2WRn8H972hdk26CQpGIM
8JUAn0iyyhkEYSDhJva33NSjNQBtdjst
=IHJv
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: