From owner-freebsd-security@freebsd.org Wed Sep 30 19:22:14 2015 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EC3E5A0C98B for ; Wed, 30 Sep 2015 19:22:14 +0000 (UTC) (envelope-from prvs=071588ecfe=rblayzor.bulk@inoc.net) Received: from mta2.alb.inoc.net (mta2.alb.inoc.net [IPv6:2607:f058:110:2::1:2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B40241889 for ; Wed, 30 Sep 2015 19:22:14 +0000 (UTC) (envelope-from prvs=071588ecfe=rblayzor.bulk@inoc.net) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=inoc.net; s=201501; h=To:References:Message-Id:Content-Transfer-Encoding:Cc:Date: In-Reply-To:From:Subject:Mime-Version:Content-Type; bh=jnKQQL6NoYLmKmbmQDG8Bn2XT9FuvK766v06jvAC9f8=; b=UY1PrG3B0F21Ct0lhdGSF9UYt/ 68ewuK7fRZoBueOdnrMZN6OouUjBXbrqL8wfTVsgO4/KSDEt2BR2B1Fa3c5tsAWT/r9faTUprP0Zu hM4KTwm0A0YLlIY4AJtoyiQ6fGs0baMHmwI+W23sbmONsGPqASByrA2jkpOn5LmbpRNWL2FSMrtDF EodDMa0EaT0q6q/KcsgC9GBW0Q7xO/6QTdWXvWa71z3WadttYSirrpgPH/AwHoUjRqb1bCuUheN6w NPs75Y+DiCSMP9EDTCKJrpvf5HHnDLtaFm2eE1Uap9n/GjI7xP7bepQgBY5RbxZeTz8o8UTJUGpRL F/h5bUQg==; Received: from [64.246.135.7] (helo=void.ops.inoc.net) by mail.inoc.net with ESMTPA (Exim 4.86) (envelope-from ) id 1ZhMxB-000J8m-O8 by authid ; Wed, 30 Sep 2015 19:22:13 +0000 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\)) Subject: Re: FreeBSD Security Advisory FreeBSD-SA-15:24.rpcbind From: Robert Blayzor In-Reply-To: <560C33B7.70100@delphij.net> Date: Wed, 30 Sep 2015 15:22:08 -0400 Cc: freebsd-security@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20150929183942.569F311FD@freefall.freebsd.org> <560C33B7.70100@delphij.net> To: d@delphij.net X-Mailer: Apple Mail (2.2104) X-Auth-Info: cmJsYXl6b3JAaW5vYy5uZXQ= X-Virus-Scanned: ClamAV 0.98.7/20949/Wed Sep 30 14:30:18 2015 X-Anti-Abuse: Please report to abuse@inoc.net X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2015 19:22:15 -0000 On Sep 30, 2015, at 3:10 PM, Xin Li wrote: >> Was this regression tested or missing more info? After updating and = rebooting seeing a ton of problems with rpcbind core dumping at start.. = lock manager fails to start, etc. >=20 > Yes, this was tested specifically with NFS scenario for some time and > was reviewed by several developers. I appear to have traced this back to when ypserv starts. rpcbind starts first, when ypserv starts, rpcbind core dumps. -- Robert inoc.net!rblayzor Jabber: rblayzor.AT.inoc.net PGP Key: 78BEDCE1 @ pgp.mit.edu