[Midnightbsd-cvs] src [8288] trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c: take out name/url
laffer1 at midnightbsd.org
laffer1 at midnightbsd.org
Sat Sep 17 18:07:57 EDT 2016
Revision: 8288
http://svnweb.midnightbsd.org/src/?rev=8288
Author: laffer1
Date: 2016-09-17 18:07:57 -0400 (Sat, 17 Sep 2016)
Log Message:
-----------
take out name/url
Modified Paths:
--------------
trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
Modified: trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
===================================================================
--- trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c 2016-09-17 22:07:35 UTC (rev 8287)
+++ trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c 2016-09-17 22:07:57 UTC (rev 8288)
@@ -1025,12 +1025,9 @@
rpc_gss_log_status("gss_verify_mic", client->cl_mech,
maj_stat, min_stat);
/*
- * Attila Bogar and Herbert Poeckl reported similar problems
- * w.r.t. a Linux NFS client doing a krb5 NFS mount against the
- * FreeBSD server. We determined this was a Linux bug:
- * http://www.spinics.net/lists/linux-nfs/msg32466.html, where
- * the mount failed to work because a Destroy operation with a
- * bogus encrypted checksum destroyed the authenticator handle.
+ * A bug in some versions of the Linux client generates a
+ * Destroy operation with a bogus encrypted checksum. Deleting
+ * the credential handle for that case causes the mount to fail.
* Since the checksum is bogus (gss_verify_mic() failed), it
* doesn't make sense to destroy the handle and not doing so
* fixes the Linux mount.
More information about the Midnightbsd-cvs
mailing list