Return-Path: X-Original-To: krb5-send-pr-nospam1@krbdev.mit.edu Received: from pch.mit.edu (PCH.MIT.EDU [18.7.21.90]) by krbdev.mit.edu (Postfix) with ESMTP id 17061CCE6D; Wed, 13 May 2009 21:32:22 +0000 (UTC) Received: from pch.mit.edu (pch.mit.edu [127.0.0.1]) by pch.mit.edu (8.13.6/8.12.8) with ESMTP id n4DLWL0S031172; Wed, 13 May 2009 17:32:21 -0400 Received: from pacific-carrier-annex.mit.edu (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.7.21.83]) by pch.mit.edu (8.13.6/8.12.8) with ESMTP id n4DLWKnM031166 for ; Wed, 13 May 2009 17:32:20 -0400 Received: from mit.edu (M24-004-BARRACUDA-3.MIT.EDU [18.7.7.114]) by pacific-carrier-annex.mit.edu (8.13.6/8.9.2) with ESMTP id n4DLWDU9002433 for ; Wed, 13 May 2009 17:32:13 -0400 (EDT) Received: from carter-zimmerman.suchdamage.org (localhost [127.0.0.1]) by mit.edu (Spam Firewall) with ESMTP id 60D6C1BDE2C4 for ; Wed, 13 May 2009 17:32:13 -0400 (EDT) Received: from carter-zimmerman.suchdamage.org (carter-zimmerman.suchdamage.org [69.25.196.178]) by mit.edu with ESMTP id GGzefsdiih517WVa (version=TLSv1 cipher=AES256-SHA bits=256 verify=NO) for ; Wed, 13 May 2009 17:32:13 -0400 (EDT) Received-SPF: softfail (mit.edu: domain of transitioning hartmans@mit.edu does not designate 69.25.196.178 as permitted sender) receiver=mit.edu; client_ip=69.25.196.178; envelope-from=hartmans@mit.edu; Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id 557014245; Wed, 13 May 2009 17:32:10 -0400 (EDT) To: krb5-bugs@MIT.EDU Subject: NFS fails to work with KRB5 1.7 From: Sam Hartman Date: Wed, 13 May 2009 17:32:10 -0400 Message-ID: User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Spam-Score: 5.14 X-Spam-Level: ***** (5.14) X-Spam-Flag: NO X-Scanned-BY: MIMEDefang 2.42 X-Beenthere: krb5-bugs-incoming@mailman.mit.edu X-Mailman-Version: 2.1.6 Precedence: list Sender: krb5-bugs-incoming-bounces@PCH.mit.edu Errors-To: krb5-bugs-incoming-bounces@PCH.mit.edu X-RT-Original-Encoding: us-ascii Content-Length: 277 I didn't make much progress on this today and may not have additional time to work on it, so I wanted to at least open the bug. See http://bugs.debian.org/528514 Apparently, gss_export_lucid_sec_context creates a returned context that segfaults when accessed by rpc.gssd.