[krbdev.mit.edu #5593] kadmind crash on Debian AMD64

rra@debian.org via RT rt-comment at krbdev.mit.edu
Fri Jul 6 17:03:34 EDT 2007


See also http://bugs.debian.org/428732

Date: Wed, 13 Jun 2007 15:07:03 -0400
From: Andrew Reid <Andrew.Reid at nist.gov>
To: submit at bugs.debian.org
Subject: Bug#428732: kadmin crashes during password changes

Package: krb5-admin-server
Version: 1.4.4-7etch1

  Hi all --

  I have a distributed system with a few servers and several
clients, using Kerboros for user authentication and LDAP for
accounts.  All servers are Debian "etch", and the clients are
a mix of "etch" and "sarge".  
 
  The problem described here may not occur with all clients,
but does occur with at least one client of each of the two
types.

  The symptoms are:

  A user on a client invokes "kpasswd" or "kpasswd <username>" to 
change their password.  Kpasswd prompts for their existing 
password, accepts the input, then prompts twice for the new password.
It then appears to hang.

  Coincident with the hang, kadmind on the server segfaults,
logging the following in /var/log/messages:  ("shadrach" is
the server hostname).

> Jun 13 14:16:11 shadrach kernel: kadmind[31779]: segfault at ffffffffd653bbc0 rip 00002b5fd63745d0 rsp 00007fffd52f7f58 error 4

  The kpasswd process reports a time-out:
> kpasswd: Connection timed out changing password
 .. and the user password is not changed.


  The location of the segfault appears to vary, an immediate second
attempt got a slightly different log message:

> Jun 13 14:18:38 shadrach kernel: kadmind[1358]: segfault at 0000000020035bc0 rip 00002ac21fe6e5d0 rsp 00007fff8b7fe468 error 4

  Issuing /etc/init.d/krb5-admin-server restarts the daemon with
no apparent additional errors.

  
  Behavior is not 100% consistent, I am sure I have seen 
instances where a convenience script named "passwd", which just
wraps a call to "exec kpasswd $(whoami)", did not crash the kadmind,
but I am unable to reproduce this desirable behavior just now, 
re-running the identical script is crashing the server's kadmind.

  I have never seen a direct call to kpasswd fail to crash the
kadmind, but may have always done those second in the testing
sequence.

  The bad behavior is correlated with a high frequency of 
password changes for a particular principal (one every 60 
300 seconds or so).  The initial pathology involved a user
whose (new) account was misconfigured, and whose password 
was reset within a few minutes of the initial Kerberos principal 
creation to facilitate account configuration testing (directly
via kadmin), and then re-reset by the user once the account 
configuration was corrected, using kpasswd.  This kpasswd operation
crashed the kadmin daemon.  

  Subsequent experiments on other accounts may have worked 
initially, and then begun to fail, consistent with the difficulty 
being triggered by multiple password changes within a 
few-minute window.  Since I have just done this testing, I cannot
immediately test this.

  Kernels are stock Debian.  Server is 2.6.18-4-amd64,
representative client is 2.6.18-4-k7, libc is 2.3.6.ds1-13 
on client and server.

  				-- A.
-- 
Dr. Andrew C. E. Reid, Guest Researcher 
Center for Theoretical and Computational Materials Science
National Institute of Standards and Technology, Mail Stop 8910
Gaithersburg MD 20899 USA
andrew.reid at nist.gov


Date: Thu, 14 Jun 2007 10:54:18 -0400
From: Andrew Reid <Andrew.Reid at nist.gov>
To: 428732 at bugs.debian.org
Subject: Bug#428732: Kadmin crash, additional info

  I've had a chance to experiment a little more, and it's
clear that what is crashing the kadmind is a second or
subsequent kpasswd attempt for a given principal a short
time after a (successful) first change.

  It's as though there's some time window after a kpasswd
invocation on a principal during which additional kpasswd
invocations will crash the server's admin daemon.  It
seems to be independent of the particular principal or
client machine.

			-- A.
-- 
Dr. Andrew C. E. Reid, Guest Researcher 
Center for Theoretical and Computational Materials Science
National Institute of Standards and Technology, Mail Stop 8910
Gaithersburg MD 20899 USA
andrew.reid at nist.gov




More information about the krb5-bugs mailing list