[Midnightbsd-cvs] src [8288] trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c: take out name/url

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Sat Sep 17 18:07:57 EDT 2016


Revision: 8288
          http://svnweb.midnightbsd.org/src/?rev=8288
Author:   laffer1
Date:     2016-09-17 18:07:57 -0400 (Sat, 17 Sep 2016)
Log Message:
-----------
take out name/url

Modified Paths:
--------------
    trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c

Modified: trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
===================================================================
--- trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c	2016-09-17 22:07:35 UTC (rev 8287)
+++ trunk/sys/rpc/rpcsec_gss/svc_rpcsec_gss.c	2016-09-17 22:07:57 UTC (rev 8288)
@@ -1025,12 +1025,9 @@
 		rpc_gss_log_status("gss_verify_mic", client->cl_mech,
 		    maj_stat, min_stat);
 		/*
-		 * Attila Bogar and Herbert Poeckl reported similar problems
-		 * w.r.t. a Linux NFS client doing a krb5 NFS mount against the
-		 * FreeBSD server. We determined this was a Linux bug:
-		 * http://www.spinics.net/lists/linux-nfs/msg32466.html, where
-		 * the mount failed to work because a Destroy operation with a
-		 * bogus encrypted checksum destroyed the authenticator handle.
+		 * A bug in some versions of the Linux client generates a
+		 * Destroy operation with a bogus encrypted checksum. Deleting
+		 * the credential handle for that case causes the mount to fail.
 		 * Since the checksum is bogus (gss_verify_mic() failed), it
 		 * doesn't make sense to destroy the handle and not doing so
 		 * fixes the Linux mount.



More information about the Midnightbsd-cvs mailing list