KRB5_CCNAME is not set in the environment of the user for whom the
automount is failing.
In /etc/krb5.conf the default is set to:
default_ccache_name = KEYRING:persistent:%{uid}
The calls to keyctl() in the strace for cifs.upcall indicate that it's
successfully locating the user's keyring in the kernel and that it is
able to read key data from that keying
I haven't gone through and tried unpacking and decoding the contents of
those reads, but the reads aren't failing outright like it couldn't find
the credentials cache or the contents that it's looking for
On 07/21/2020 1:36 PM, Steve French wrote:
That is plausible but I also wonder about other whether other parts of
krb5 configuration are changed/broken eg KRB5_CCNAME environment variable
See https://web.mit.edu/kerberos/krb5-1.12/doc/basic/ccache_def.html
On Tue, Jul 21, 2020, 12:24 Michael Keane, K1MK <mkeane@xxxxxxxx
<mailto:mkeane@xxxxxxxx>> wrote:
Thanks
In trying to further debug this problem, I've stood up a separate
Fedora 31 instance for testing with the result that the same
configuration that is failing on Fedora 32 is working under Fedora 31
Using strace it would appear the deviation occurs at the point of
"handle_krb5_mech" where the Fedora 31 instance proceeds though
several keyctl() calls to a successful return while the Fedora 32
instance goes through a similar sequence of keyctl() calls but
rather than finishing up with a final call to keyctl() to
instantiate the key it appears that the krb5 library and/or sssd
is going through a series of steps to locate the KDC (and failing)
even though the KDCs have always been explicitly configured in
/etc/krb5.conf
So the root cause of this issue may not be anything in cifs.upcall
but rather something in the sssd or kerberos that got changed as a
result of moving from Fedora 31 to Fedora 32
On 07/18/2020 8:40 PM, Steve French wrote:
Looks like error obtaining the key (either keyutils package not
installed or no Kerberos ticket found).
This page has debug instructions for cifs.upcall. see of that
information is helpful.
http://sprabhu.blogspot.com/2014/12/debugging-calls-to-cifsupcall.html?m=1
Also try kinit as a local user and then mount with cruid mount
option pointing to their uid to see if that helps.
On Fri, Jul 17, 2020, 09:04 Michael Keane, K1MK <mkeane@xxxxxxxx
<mailto:mkeane@xxxxxxxx>> wrote:
CIFS automounts to local NAS devices have stopped working
recently
Fedora 32
kernel 5.7.8-200.fc32.x86_64
mount.cifs version: 6.9
auto.misc: it-share
-fstype=cifs,multiuser,cruid=${UID},rw,vers=default,sec=krb5
://filer5/IT_Share
dmesg:
[ 3428.883661] fs/cifs/cifsfs.c: Devname:
//filer5.arrlhq.org/IT_Share
<http://filer5.arrlhq.org/IT_Share> flags: 0
[ 3428.883702] fs/cifs/connect.c: Username: root
[ 3428.883706] fs/cifs/connect.c: file mode: 0755 dir
mode: 0755
[ 3428.883709] fs/cifs/connect.c: CIFS VFS: in
mount_get_conns as
Xid: 12 with uid: 0
[ 3428.883710] fs/cifs/connect.c: UNC:
\\filer5.arrlhq.org <http://filer5.arrlhq.org>\IT_Share
[ 3428.883721] fs/cifs/connect.c: Socket created
[ 3428.883723] fs/cifs/connect.c: sndbuf 16384 rcvbuf 131072
rcvtimeo 0x1b58
[ 3428.884126] fs/cifs/fscache.c:
cifs_fscache_get_client_cookie:
(0x000000006d2b3226/0x0000000090edec3a)
[ 3428.884130] fs/cifs/connect.c: CIFS VFS: in
cifs_get_smb_ses as
Xid: 13 with uid: 0
[ 3428.884131] fs/cifs/connect.c: Existing smb sess not found
[ 3428.884135] fs/cifs/smb2pdu.c: Negotiate protocol
[ 3428.884141] fs/cifs/connect.c: Demultiplex PID: 5778
[ 3428.884156] fs/cifs/transport.c: Sending smb: smb_len=252
[ 3429.010818] fs/cifs/connect.c: RFC1002 header 0x11c
[ 3429.010830] fs/cifs/smb2misc.c: SMB2 data length 96
offset 128
[ 3429.010832] fs/cifs/smb2misc.c: SMB2 len 224
[ 3429.010835] fs/cifs/smb2misc.c: length of negcontexts
60 pad 0
[ 3429.010871] fs/cifs/transport.c: cifs_sync_mid_result:
cmd=0
mid=0 state=4
[ 3429.010885] fs/cifs/misc.c: Null buffer passed to
cifs_small_buf_release
[ 3429.010891] fs/cifs/smb2pdu.c: mode 0x1
[ 3429.010893] fs/cifs/smb2pdu.c: negotiated smb3.1.1 dialect
[ 3429.010903] fs/cifs/asn1.c: OID len = 7 oid = 0x1 0x2
0x348 0xbb92
[ 3429.010907] fs/cifs/asn1.c: OID len = 7 oid = 0x1 0x2
0x348 0x1bb92
[ 3429.010910] fs/cifs/asn1.c: OID len = 10 oid = 0x1 0x3
0x6 0x1
[ 3429.010912] fs/cifs/smb2pdu.c: decoding 2 negotiate
contexts
[ 3429.010914] fs/cifs/smb2pdu.c: decode SMB3.11
encryption neg
context of len 4
[ 3429.010916] fs/cifs/smb2pdu.c: SMB311 cipher type:1
[ 3429.010921] fs/cifs/connect.c: Security Mode: 0x1
Capabilities:
0x300046 TimeAdjust: 0
[ 3429.010923] fs/cifs/smb2pdu.c: Session Setup
[ 3429.010926] fs/cifs/smb2pdu.c: sess setup type 5
[ 3429.010949] fs/cifs/cifs_spnego.c: key description =
ver=0x2;host=filer5.arrlhq.org
<http://filer5.arrlhq.org>;ip4=10.1.123.38;sec=krb5;uid=0x0;creduid=0x3e8;user=root;pid=0x1690
[ 3429.025053] CIFS VFS: \\filer5.arrlhq.org
<http://filer5.arrlhq.org> Send error in SessSetup
= -126
[ 3429.025056] fs/cifs/connect.c: CIFS VFS: leaving
cifs_get_smb_ses
(xid = 13) rc = -126
[ 3429.025059] fs/cifs/connect.c: build_unc_path_to_root:
full_path=\\filer5.arrlhq.org
<http://filer5.arrlhq.org>\IT_Share
[ 3429.025059] fs/cifs/connect.c: build_unc_path_to_root:
full_path=\\filer5.arrlhq.org
<http://filer5.arrlhq.org>\IT_Share
[ 3429.025060] fs/cifs/connect.c: build_unc_path_to_root:
full_path=\\filer5.arrlhq.org
<http://filer5.arrlhq.org>\IT_Share
[ 3429.025062] fs/cifs/dfs_cache.c: __dfs_cache_find:
search path:
\filer5.arrlhq.org <http://filer5.arrlhq.org>\IT_Share
[ 3429.025063] fs/cifs/dfs_cache.c: get_dfs_referral: get
an DFS
referral for \filer5.arrlhq.org
<http://filer5.arrlhq.org>\IT_Share
[ 3429.025065] fs/cifs/dfs_cache.c: dfs_cache_noreq_find:
path:
\filer5.arrlhq.org <http://filer5.arrlhq.org>\IT_Share
[ 3429.025071] fs/cifs/fscache.c:
cifs_fscache_release_client_cookie:
(0x000000006d2b3226/0x0000000090edec3a)
[ 3429.025076] fs/cifs/connect.c: CIFS VFS: leaving
mount_put_conns
(xid = 12) rc = 0
[ 3429.025077] CIFS VFS: cifs_mount failed w/return code = -2
journalctl:
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: key
description:
cifs.spnego;0;0;39010000;ver=0x2;host=filer5.arrlhq.org
<http://filer5.arrlhq.org>;ip4=10.1.123.38;sec=krb5;uid=0x0;creduid=0x3e8;user=root;pid=0x1690
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: ver=2
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]:
host=filer5.arrlhq.org <http://filer5.arrlhq.org>
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: ip=10.1.123.38
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: sec=1
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: uid=0
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: creduid=1000
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: user=root
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: pid=5776
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]:
get_cachename_from_process_env: pathname=/proc/5776/environ
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]:
get_existing_cc: default ccache is
KEYRING:persistent:1000:1000
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]:
handle_krb5_mech: getting service ticket for
filer5.arrlhq.org <http://filer5.arrlhq.org>
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]:
cifs_krb5_get_req: unable to get credentials for
filer5.arrlhq.org <http://filer5.arrlhq.org>
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]:
handle_krb5_mech: failed to obtain service ticket
(-1765328370)
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: Unable to
obtain service ticket
Jul 17 09:43:13 mkZ230.ARRLHQ.ORG
<http://mkZ230.ARRLHQ.ORG> cifs.upcall[5779]: Exit status
-1765328370
$ klist
Ticket cache: KEYRING:persistent:1000:1000
Default principal: mkeane@xxxxxxxxxx <mailto:mkeane@xxxxxxxxxx>
Valid starting Expires Service principal
07/17/2020 09:43:06 07/17/2020 19:43:06
krbtgt/ARRLHQ.ORG@xxxxxxxxxx <mailto:ARRLHQ.ORG@xxxxxxxxxx>
renew until 07/24/2020 09:42:57
Filer5 is a QNAP TS-870U-RP Version 4.3.6.1070 (2019/09/10)
NAS device
but having this issue with other NAS device on LAN
--
Michael Keane, K1MK
IT Manager
ARRL, The National Association for Amateur Radio™
225 Main Street, Newington, CT 06111-1494 USA
Telephone: (860) 594-0285
email: mkeane@xxxxxxxx <mailto:mkeane@xxxxxxxx>
--
Michael Keane, K1MK
IT Manager
ARRL, The National Association for Amateur Radio™
225 Main Street, Newington, CT 06111-1494 USA
Telephone: (860) 594-0285
email:mkeane@xxxxxxxx <mailto:mkeane@xxxxxxxx>
--
Michael Keane, K1MK
IT Manager
ARRL, The National Association for Amateur Radio™
225 Main Street, Newington, CT 06111-1494 USA
Telephone: (860) 594-0285
email: mkeane@xxxxxxxx