How to prevent very very large ccaches?

Nicolas.Williams@ubsw.com Nicolas.Williams at ubsw.com
Thu Jun 13 17:14:47 EDT 2002


Er, rather, the fix might be to clear KRB5_TC_OPENCLOSE in krb5_get_credentials().

This should improve SSH/KRSH/FTP performance when multiple instances startup simultaneously. Instead of multiple processes contending for the ccache lock as they read each ccache entry (with all the context switching that that implies) each process would get a lock for the ccache once and otherwise running the ccache sequencing to completion before giving up the lock.

Is there any reason not to clear KRB5_TC_OPENCLOSE in krb5_get_credentials()?

I'll test this and see. Expect results next week. If it works I'll submit a bug report.

Cheers,

Nico
--  

> -----Original Message-----
> From: Williams, Nicolas 
> Sent: Thursday, June 13, 2002 5:03 PM
> To: Sam Hartman
> Cc: kerberos at mit.edu
> Subject: Re: How to prevent very very large ccaches?
> 
> 
> Looking through the source, it seems that clearing the 
> KRB5_TC_OPENCLOSE
> ccache flag while sequencing the ccache, in krb5_cc_retrieve_cred()
> *might* help.
> 
> Nico
> -- 
> -DISCLAIMER: an automatically appended disclaimer may follow. 
> By posting-
> -to a public e-mail mailing list I hereby grant permission to 
> distribute-
> -and copy this message.-
> 

Visit our website at http://www.ubswarburg.com

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.




More information about the Kerberos mailing list