[Bug 1347147] Re: krb5 database operations enter infinite loop

2014-10-02 Thread Tom Yu
Confirmed that 1.12+dfsg-2ubuntu5 from trusty-proposed fixes the bug on amd64. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in Ubuntu.

[Bug 1347147] Re: krb5 database propagation enters infinite loop

2014-07-31 Thread Tom Yu
This problem is broader than slave KDCs; it can potentially affect any write operation on a KDC with sufficiently many (more than a few hundred) principals, causing database corruption or denial of service. Altering the test case to create one principal per invocation of kadmin.local shows that

[Bug 1347147] Re: krb5 database operations enter infinite loop

2014-07-31 Thread Tom Yu
** Summary changed: - krb5 database propagation enters infinite loop + krb5 database operations enter infinite loop -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1347147 Title: krb5

[Bug 1347147] Re: krb5 database operations enter infinite loop

2014-07-31 Thread Tom Yu
** Description changed: - In some conditions, propagating a kerberos database to a slave KDC server or performing other database operations can stall. As we've investigated the issue, it looks like a database with more than a few hundred principals is very likely to run into this issue. +

[Bug 1347147] Re: krb5 database operations enter infinite loop

2014-07-31 Thread Tom Yu
Edited description to include text from Sam that was omitted when we crossed edits. ** Description changed: [Impact] On krb5 KDC databases with more than a few hundred principals, operations can enter an infinite loop in the database library. This affects both read and write

[Bug 1347147] Re: krb5 database propagation enters infinite loop

2014-07-30 Thread Tom Yu
I confirm that the packages at https://launchpad.net/~hartmans/+archive/ubuntu/ubuntu-fixes appear to fix the problem for Trusty amd64, based on the test case in comment #1. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in

[Bug 1347147] Re: krb5 database propagation enters infinite loop

2014-07-29 Thread Tom Yu
Test case: On Ubuntu 14.04 on amd64, install krb5-admin-server and krb5-kdc. kdb5_util -W -r T create -s awk 'BEGIN{ for (i = 0; i 1024; i++) { printf(ank -randkey a%06d\n, i) } }' /dev/null | kadmin.local -r T For me, kadmin.local begins consuming nearly 100% CPU starting at a000762. This

[Bug 1260845] Re: libkrb5-dev version 1.10-beta1 has broken RDNS support

2013-12-13 Thread Tom Yu
This is probably the same as bug 571572. Technically the upstream patch is a workaround for a glibc bug. This is probably deserving of an SRU for Precise. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in Ubuntu.

[Bug 571572] Re: krb5 prefers the reverse pointer no matter what for locating service tickets.

2013-03-15 Thread Tom Yu
Additional experimentation indicates that Raring has a partial fix to glibc that results in the observed libkrb5 behavior of rdns=false working as intended. SRUs are still a good idea for earlier Ubuntu releases. See also bug 1057526 for the underlying glibc bug. -- You received this bug

[Bug 571572] Re: krb5 prefers the reverse pointer no matter what for locating service tickets.

2013-02-28 Thread Tom Yu
I can see no obvious source code changes to the krb5 packages between Quantal and Raring that would result in the observed behavior of rdns=false functioning on stock Raring libkrb5-3 but not on Quantal. It's possible that the underlying bug in glibc got fixed in the meanwhile. I haven't

[Bug 571572] Re: krb5 prefers the reverse pointer no matter what for locating service tickets.

2013-01-11 Thread Tom Yu
I would strongly recommend SRUs for all supported releases, because this is a high-impact bug for people who are deploying krb5 in environments where they do not have tight control over their reverse DNS information. Experience has shown that this type of hard-to-debug DNS interaction leads to a

[Bug 1095757] Re: krb5 packages should be updated to v. =1.10.2 to workaround bug with gssapi kerberos authentication

2013-01-04 Thread Tom Yu
There is some additional information and history in launchpad bug 571572, which this bug report might be considered a duplicate of. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1095757

[Bug 571572] Re: krb5 prefers the reverse pointer no matter what for locating service tickets.

2012-06-22 Thread Tom Yu
Our fix in #6922 appears to itself have a bug; we believe that http://krbdev.mit.edu/rt/Ticket/Display.html?id=7124 resolves it. If you need a back port, http://krbdev.mit.edu/rt/Ticket/Display.html?id=7164 is for krb5-1.9.x, and http://krbdev.mit.edu/rt/Ticket/Display.html?id=7184 is for

[Bug 985727] Re: krb5-admin-server falsely claiming clock skew errors

2012-04-25 Thread Tom Yu
As I mentioned in the upstream bug tracker (http://krbdev.mit.edu/rt/Ticket/Display.html?id=7118), I suspect this is an entropy shortage issue. (kadmind -W should force the use of weak random data) ** Bug watch added: krbdev.mit.edu/rt/ #7118

Re: [Bug 900447] [NEW] Man 5 page for kdc.conf does not mention acceptable encryption types

2011-12-05 Thread Tom Yu
Sam Hartman hartm...@debian.org writes: Russ, I thought that they were listed in the admin info pages too. however, while I see a bunch of examples, searching for the string hmac in the sources to the admin guide, I don't actually find a complete list of the encryption types anywhere. Am I

[Bug 801718] Re: kpropd -S -P port fails to use specified port

2011-06-24 Thread Tom Yu
** Bug watch added: Debian Bug tracker #631557 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631557 ** Also affects: krb5 (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631557 Importance: Unknown Status: Unknown -- You received this bug notification because you

[Bug 801718] Re: kpropd -S -P port fails to use specified port

2011-06-24 Thread Tom Yu
This bug originates from a Debian patch to krb5-1.8 that adds IPv6 support to kpropd. The Debian version of krb5-1.9 doesn't have this problem. It is probably not difficult to fix Debian's krb5-1.8 patch, but this should probably be coordinated with the Debian maintainers. -- You received this

Re: [Bug 567188] Re: krb5 and ADS error using 10.04, not 9.04

2010-04-26 Thread Tom Yu
jean-yves chateaux jean-yves.chate...@sagemcom.com writes: The errors are the results of MIT resolution to exclude DES/DES3 from the supported enctypes (security reasons). DES3 was not marked as weak. Neither was rc4-hmac (enctype 23). The export-grade rc4-hmac-exp is enctype 24 and was marked

[Bug 512271] Re: kinit crash

2010-02-14 Thread Tom Yu
** Bug watch added: Debian Bug tracker #566223 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566223 ** Also affects: krb5 (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566223 Importance: Unknown Status: Unknown -- kinit crash

[Bug 512459] Re: Winbind failed to connect to AD: Program lacks support for encryption type

2010-02-12 Thread Tom Yu
** Changed in: krb5 (Debian) Importance: Unknown = Undecided ** Changed in: krb5 (Debian) Status: Confirmed = New ** Changed in: krb5 (Debian) Remote watch: Debian Bug tracker #566977 = None ** Changed in: krb5 (Debian) Status: New = Fix Committed -- Winbind failed to