>>>>> "JBF" == J Bruce Fields <bfields@xxxxxxxxxxxx> writes: JBF> Argh, it's all encrypted, so we all we have to go on is the size of JBF> the request and reply: Yeah, I'm not sure how to get around that. I know tshark can take a keytab, but the user's key is in the kernel keyring and I'm not at all sure how to dig it out (assuming I even can). But if there's something I can do, I can try. I could switch to krb5i or plain krb for a while if that would be useful, except that the clients would prefer krb5p if it's exported, and if I stop exporting it then existing mounts break.... I'd have to schedule downtime and kick everyone off, which I could do if it would help. JBF> The best you could do is capture all traffic and throw away all but JBF> the last few seconds (see the ring buffer stuff in tshark) and JBF> write a script that kills the capture as soon as it notices you've JBF> hit this condition. If I knew how to detect the condition, though, I have a feeling that would be enough information to track down the bug anyway. Also, I'd have to do this for a couple of hundred clients. Ugh. - J< -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html