Hi everyone,

we have a setup with 10000+ users, using kerberos mostly for ssh 
authentication. This works fine for several years now, but we recently 
ran into a problem with pam_krb5.

We upgraded our terminal server to debian wheezy (was squeeze before), 
and since then sshd sometimes consumes 100% of the CPU when invoking 
pam_krb5. This seems to happen if some bot or something tries to log in 
as a user who is not found in the LDAP user database but still has a 
principle kicking around (this is the case for disabled users).
The process polls a udp socket pointing at the kerberos master's port 
88, thus generating this load. Regular, active users get their TGT from 
the slaves - this still works fine.
Does anyone have any insights on this?

Thanks,
Chris
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to