Package: krb5-admin-server
Version: 1.4.4-7etch1

  Hi all --

  I have a distributed system with a few servers and several
clients, using Kerboros for user authentication and LDAP for
accounts.  All servers are Debian "etch", and the clients are
a mix of "etch" and "sarge".  
 
  The problem described here may not occur with all clients,
but does occur with at least one client of each of the two
types.

  The symptoms are:

  A user on a client invokes "kpasswd" or "kpasswd <username>" to 
change their password.  Kpasswd prompts for their existing 
password, accepts the input, then prompts twice for the new password.
It then appears to hang.

  Coincident with the hang, kadmind on the server segfaults,
logging the following in /var/log/messages:  ("shadrach" is
the server hostname).

> Jun 13 14:16:11 shadrach kernel: kadmind[31779]: segfault at ffffffffd653bbc0 
> rip 00002b5fd63745d0 rsp 00007fffd52f7f58 error 4

  The kpasswd process reports a time-out:
> kpasswd: Connection timed out changing password
 .. and the user password is not changed.


  The location of the segfault appears to vary, an immediate second
attempt got a slightly different log message:

> Jun 13 14:18:38 shadrach kernel: kadmind[1358]: segfault at 0000000020035bc0 
> rip 00002ac21fe6e5d0 rsp 00007fff8b7fe468 error 4

  Issuing /etc/init.d/krb5-admin-server restarts the daemon with
no apparent additional errors.

  
  Behavior is not 100% consistent, I am sure I have seen 
instances where a convenience script named "passwd", which just
wraps a call to "exec kpasswd $(whoami)", did not crash the kadmind,
but I am unable to reproduce this desirable behavior just now, 
re-running the identical script is crashing the server's kadmind.

  I have never seen a direct call to kpasswd fail to crash the
kadmind, but may have always done those second in the testing
sequence.

  The bad behavior is correlated with a high frequency of 
password changes for a particular principal (one every 60 
300 seconds or so).  The initial pathology involved a user
whose (new) account was misconfigured, and whose password 
was reset within a few minutes of the initial Kerberos principal 
creation to facilitate account configuration testing (directly
via kadmin), and then re-reset by the user once the account 
configuration was corrected, using kpasswd.  This kpasswd operation
crashed the kadmin daemon.  

  Subsequent experiments on other accounts may have worked 
initially, and then begun to fail, consistent with the difficulty 
being triggered by multiple password changes within a 
few-minute window.  Since I have just done this testing, I cannot
immediately test this.

  Kernels are stock Debian.  Server is 2.6.18-4-amd64,
representative client is 2.6.18-4-k7, libc is 2.3.6.ds1-13 
on client and server.

                                -- A.
-- 
Dr. Andrew C. E. Reid, Guest Researcher 
Center for Theoretical and Computational Materials Science
National Institute of Standards and Technology, Mail Stop 8910
Gaithersburg MD 20899 USA
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to