Re: NFS troubles

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On Apr 6, 2018, at 12:07 PM, Orion Poplawski <orion@xxxxxxxx> wrote:
> 
> On 04/03/2018 09:44 AM, Orion Poplawski wrote:
>> Kernel is 3.10.0-693.21.1.el7.x86_64  I don't have Red Hat support for these
>> systems.
>> 
>> I discovered that I'd been forcing vers=4.0 mounts in order to work around a
>> mounting issue.  
> 
> And I'm back to seeing the mount issue at boot.  Here's the situation - we're
> forcing kerberos on the public network, but allowing sec=sys on some private
> networks:
> 
> /etc/exports:
> /               -ro,async,fsid=0 192.168.1.0/24(sec=sys)
> 192.168.2.0/24(sec=sys) *.nwra.com(sec=krb5)
> /export/home    -rw,async,nohide 192.168.1.0/24(sec=sys)
> 192.168.2.0/24(sec=sys) *.nwra.com(sec=krb5)
> 
> So for a while after boot, attempts to mount with sec=sys fail:
> 
> # mount -t nfs4 -s -o
> sec=sys,intr,rsize=262144,wsize=262144,noatime,lookupcache=positive,actimeo=1
> earthib.cora.nwra.com:/export/home/greg /mnt
> mount.nfs4: Operation not permitted
> 
> But then later they work:
> 
> # mount -t nfs4 -s -o
> sec=sys,intr,rsize=262144,wsize=262144,noatime,lookupcache=positive,actimeo=1
> earthib.cora.nwra.com:/export/home/greg /mnt
> # umount /mnt
> 
> This can cycle back and forth.
> 
> I've attached a packet capture of some failed mount attempts.  It seems that
> even with specifying sec=sys, some kerberos stuff is going on.

> It appears to be related to mounting a different sec=krb5 mount over the
> public network from the same server.  While that mount is active, the sec=sys
> mounts fail.  When it is unmounted, they work.  At least now I think I can
> work around this...

Bruce-

I examined the attached network capture. There are two attempts to do an
EXCHANGE_ID operation. Both times:

- a fresh GSS context is established successfully
- a fresh TCP connection is established by the client
- EXCHANGE_ID is sent using krb5i and the previously established GSS context
-- client owner verifier is 0x5ac794e81d0a1d81
-- client owner is "Linux NFSv4.1 qcomp1.cora.nwra.com"
-- state protection is SP4_MACH_CRED
- the server responds NFS4_OK; the CONFIRMED_R, PNFS_MDS, and MOVED_REFER flags are set
- the client destroys the GSS context
- the client closes the TCP connection


--
Chuck Lever



--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux