[OpenAFS] OpenAFS 1.8.7 available

Benjamin Kaduk kaduk@mit.edu
Thu, 14 Jan 2021 15:40:52 -0800


--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

The OpenAFS Guardians are happy to announce the availability of OpenAFS 1.8.7.
Source files can be accessed via the web at:

       https://www.openafs.org/release/openafs-1.8.7.html

or via AFS at:

       UNIX: /afs/grand.central.org/software/openafs/1.8.7/
       UNC: \\afs\grand.central.org\software\openafs\1.8.7\

This release fixes a critical issue with the generation of Rx connection IDs
(CIDs) for Rx clients started after 14 Jan 2021 08:25:36 AM UTC (Unix epoch
time 0x60000000).  Unpatched systems will always use the fixed value of
0x80000002 as the CID, which causes connections to fail for multiple reasons.
Client commands such as `vos examine` will time out if run after that
time, cache managers started after that time will be unable to access files,
fileservers started after that time will be unable to access the Ubik databases,
and database servers started after that time will be unable to participate
in a quorum or Ubik elections.  In particular, fileservers that restart,
including due to a scheduled weekly restart, will not be able to register
with the volume location service or verify group membership with the
protection service.

The fix causes the initial CID to be randomly generated (without dependence
on the current time) and removes the faulty logic intended to detect signed
integer overflow (which is not needed since the field in question is now
an unsigned integer).

Thanks to Jeffrey Altman of Auristor Inc. for tracking down the key issue.

Bug reports should be filed to openafs-bugs@openafs.org.

Benjamin Kaduk
for the OpenAFS Guardians


--vtzGhvizbBRQ85DL
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=VduU
-----END PGP SIGNATURE-----

--vtzGhvizbBRQ85DL--