Return-Path: Received: from fieldses.org ([174.143.236.118]:57340 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756580Ab1GMRff (ORCPT ); Wed, 13 Jul 2011 13:35:35 -0400 Date: Wed, 13 Jul 2011 13:35:34 -0400 To: Benjamin Coddington Cc: linux-nfs@vger.kernel.org Subject: Re: multiple service identities for svcgssd Message-ID: <20110713173534.GA11665@fieldses.org> References: <3EA8A380-460C-4CDC-9591-7034D2E38D93@uvm.edu> Content-Type: text/plain; charset=us-ascii In-Reply-To: <3EA8A380-460C-4CDC-9591-7034D2E38D93@uvm.edu> From: "J. Bruce Fields" Sender: linux-nfs-owner@vger.kernel.org List-ID: MIME-Version: 1.0 On Wed, Jul 13, 2011 at 12:03:03PM -0400, Benjamin Coddington wrote: > I am working on a linux NFS cluster that requires a single svcgssd to establish contexts under multiple service names. > > In this scenario, svcgssd can be called with "-n" so that it acquires creds at context creation. After running this way I found svcgssd opens a file to the kerberos replay cache for every context/cred, eventually reaching ulimit. For a busy cluster with many different client-user pairs that becomes a problem. I am lost in the gss_krb5 code, but suspect that the kerberos code leaks credentials in this configuration. > > Ondrej Palkovsky submitted a patch to specify multiple identities and acquire creds up-front using multiples of "-h": http://marc.info/?l=linux-nfsv4&m=123685185324902&w=2 > > I've updated that work to be current to nfs-utils-1.2.3 which solves our immediate problem, and it works well -- but running svcgssd with '-n' is still going to leak file handles to the replay cache. What's the best way to fix this? Can the created-on-the-fly cred can be re-used for subsequent contexts? Sounds like a likely kerberos bug as well--may be use asking the kerberos folks? --b.