mirror of
https://github.com/s3fs-fuse/s3fs-fuse.git
synced 2026-04-24 21:06:02 +03:00
[GH-ISSUE #2776] enable_content_md5 generates invalid MD5 hash on Rocky Linux 10.1 #1294
Labels
No labels
bug
bug
dataloss
duplicate
enhancement
feature request
help wanted
invalid
need info
performance
pull-request
question
question
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/s3fs-fuse#1294
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @zvanderbilt on GitHub (Dec 17, 2025).
Original GitHub issue: https://github.com/s3fs-fuse/s3fs-fuse/issues/2776
Environment:
s3fs version: 1.95-2.el10_1 (epel)
OS: Rocky Linux 10.1
OpenSSL version: 3.5.1 1
libcurl version: 8.12.1
fusermount version: 2.9.9
fips mode enabled
Description:
When using the enable_content_md5 mount option on Rocky Linux 10, s3fs generates an invalid Content-MD5 header that appears to contain a memory address rather than the actual MD5 hash of the file content. This causes S3 to reject all PUT requests with a BadDigest error.
Steps to Reproduce:
Mount an S3 bucket with enable_content_md5 option on Rocky Linux 10
Attempt to upload any file
Expected Behavior:
File uploads successfully with a valid Content-MD5 header.
Actual Behavior:
S3 returns HTTP 400 with BadDigest error. The Content-MD5 header contains what appears to be a memory address rather than a valid base64-encoded MD5 hash.
Example from debug logs:
> Content-MD5: EAAAAAAAAABA239b9H8AAA==S3 response:
Workaround:
Removing enable_content_md5 from mount options resolves the issue.
Additional Context:
Maybe not helpful but this same configuration works correctly on Rocky Linux 8 with the same s3fs version. The issue appears to be related to the newer toolchain (OpenSSL/libcurl/glibc) on RHEL 10-based distributions.
@gaul commented on GitHub (Dec 17, 2025):
I wonder if you have a more a more restrictive crypto policy than the default? Can you run
update-crypto-policies --showand share the result?s3fs definitely lacks error-propagation and logging which might help reveal the underlying cause. Let me experiment with this.
@gaul commented on GitHub (Dec 17, 2025):
You might try testing with the referenced PR to help us understand this issue.