1. 24 1月, 2013 2 次提交
  2. 18 12月, 2012 3 次提交
  3. 16 12月, 2012 2 次提交
  4. 13 12月, 2012 2 次提交
    • A
      SUNRPC handle EKEYEXPIRED in call_refreshresult · eb96d5c9
      Andy Adamson 提交于
      Currently, when an RPCSEC_GSS context has expired or is non-existent
      and the users (Kerberos) credentials have also expired or are non-existent,
      the client receives the -EKEYEXPIRED error and tries to refresh the context
      forever.  If an application is performing I/O, or other work against the share,
      the application hangs, and the user is not prompted to refresh/establish their
      credentials. This can result in a denial of service for other users.
      
      Users are expected to manage their Kerberos credential lifetimes to mitigate
      this issue.
      
      Move the -EKEYEXPIRED handling into the RPC layer. Try tk_cred_retry number
      of times to refresh the gss_context, and then return -EACCES to the application.
      Signed-off-by: NAndy Adamson <andros@netapp.com>
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      eb96d5c9
    • A
      SUNRPC set gss gc_expiry to full lifetime · 620038f6
      Andy Adamson 提交于
      Only use the default GSSD_MIN_TIMEOUT if the gss downcall timeout is zero.
      Store the full lifetime in gc_expiry (not 3/4 of the lifetime) as subsequent
      patches will use the gc_expiry to determine buffered WRITE behavior in the
      face of expired or soon to be expired gss credentials.
      Signed-off-by: NAndy Adamson <andros@netapp.com>
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      620038f6
  5. 11 12月, 2012 1 次提交
  6. 06 12月, 2012 2 次提交
  7. 04 12月, 2012 5 次提交
  8. 09 11月, 2012 1 次提交
  9. 08 11月, 2012 1 次提交
  10. 05 11月, 2012 21 次提交