Your message dated Wed, 11 May 2005 14:17:39 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#300720: fixed in shadow 1:4.0.3-31sarge4
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 21 Mar 2005 12:30:18 +0000
>From [EMAIL PROTECTED] Mon Mar 21 04:30:18 2005
Return-path: <[EMAIL PROTECTED]>
Received: from tornado.dat.etsit.upm.es (dat.etsit.upm.es) [138.100.17.73]
by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
id 1DDM30-0005U0-00; Mon, 21 Mar 2005 04:30:18 -0800
Received: (qmail 6249 invoked by uid 1013); 21 Mar 2005 12:30:15 -0000
Date: Mon, 21 Mar 2005 13:30:15 +0100
From: Javier =?iso-8859-1?Q?Fern=E1ndez-Sanguino_Pe=F1a?= <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Login: Configuration does not load limits.so while others do
Message-ID: <[EMAIL PROTECTED]>
Reply-To: Javier =?iso-8859-1?Q?Fern=E1ndez-Sanguino_Pe=F1a?= <[EMAIL
PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="Qxx1br4bt0+wmkIi"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
--Qxx1br4bt0+wmkIi
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Package: login
Version: 1:4.0.3-31sarge1
Priority: important
/etc/pam.d/login does not have the pam_limit module enabled:
# Sets up user limits, please uncomment and read /etc/security/limits.conf
# to enable this functionality.
# (Replaces the use of /etc/limits in old login)
# session required pam_limits.so
However other pam.d configuration files for common stuff (gdm, ssh, xdm and=
=20
suexec) enable it by default.
Is there any reason why that pam module is not enabled by default. That=20
seems to be another hurdle in admin's way when he wants to configure=20
user limits as he needs to modify both /etc/security/limits.conf and then=
=20
/etc/pam.d/login with no indication in either limits.conf nor=20
/etc/security/limits.conf that this module is not enabled per default in=20
'login'.
Regards
Javier
--Qxx1br4bt0+wmkIi
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFCPr5Vi4sehJTrj0oRAmi9AJ9+NhHrJg9h7NpUqwyqTo8deaRsCACggxqB
PDR3ETDt5y6Qj90PUuaf+ns=
=SK6E
-----END PGP SIGNATURE-----
--Qxx1br4bt0+wmkIi--
---------------------------------------
Received: (at 300720-close) by bugs.debian.org; 11 May 2005 18:20:13 +0000
>From [EMAIL PROTECTED] Wed May 11 11:20:13 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DVvob-0003aV-00; Wed, 11 May 2005 11:20:13 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DVvm7-0000Cr-00; Wed, 11 May 2005 14:17:39 -0400
From: Christian Perrier <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#300720: fixed in shadow 1:4.0.3-31sarge4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 11 May 2005 14:17:39 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Source: shadow
Source-Version: 1:4.0.3-31sarge4
We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive:
login_4.0.3-31sarge4_i386.deb
to pool/main/s/shadow/login_4.0.3-31sarge4_i386.deb
passwd_4.0.3-31sarge4_i386.deb
to pool/main/s/shadow/passwd_4.0.3-31sarge4_i386.deb
shadow_4.0.3-31sarge4.diff.gz
to pool/main/s/shadow/shadow_4.0.3-31sarge4.diff.gz
shadow_4.0.3-31sarge4.dsc
to pool/main/s/shadow/shadow_4.0.3-31sarge4.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Christian Perrier <[EMAIL PROTECTED]> (supplier of updated shadow package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 9 May 2005 18:18:55 +0200
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.3-31sarge4
Distribution: testing-proposed-updates
Urgency: low
Maintainer: Shadow package maintainers <[EMAIL PROTECTED]>
Changed-By: Christian Perrier <[EMAIL PROTECTED]>
Description:
login - system login tools
passwd - change and administer password and group data
Closes: 300720
Changes:
shadow (1:4.0.3-31sarge4) testing-proposed-updates; urgency=low
.
* The "Improve security release"
* Make login and su use limits.so PAM module by default
Closes: #300720
Files:
f16e8fb10274c5141320a6187a97ec8e 839 base required shadow_4.0.3-31sarge4.dsc
be3db7fbd12d7a2d63b53e2ea0422216 1217710 base required
shadow_4.0.3-31sarge4.diff.gz
b960408433588a7a757bba58505b4943 529600 base required
passwd_4.0.3-31sarge4_i386.deb
e403cfe11fe0916c32cef68a63359829 576048 base required
login_4.0.3-31sarge4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)
iD8DBQFCf5sJ1OXtrMAUPS0RAneGAJ9jNbfS2eNYPj/+CrhZKGrUF7HboQCffizo
R6PxbcKRur7p4DQvcNJ+aAw=
=ZWka
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]