Your message dated Wed, 14 Apr 2010 00:50:25 -0400
with message-id <[email protected]>
and subject line fixed in upstream krb5-1.8
has caused the Debian Bug report #468227,
regarding krb5-admin-server: provides incorrect authentication times
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
468227: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468227
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: krb5-admin-server
Version: 1.6.dfsg.3~beta1-3
Severity: minor

When running kadmin, I get the following results:

kadmin:  getprinc bmc
Principal: [email protected]
Expiration date: [never]
Last password change: Sun Jun 10 20:01:25 UTC 2007
Password expiration date: [none]
Maximum ticket life: 0 days 10:00:00
Maximum renewable life: 7 days 00:00:00
Last modified: Sun Jun 10 20:01:25 UTC 2007 ([email protected])
Last successful authentication: [never]
Last failed authentication: [never]
Failed password attempts: 0
Number of keys: 6
Key: vno 3, Triple DES cbc mode with HMAC/sha1, no salt
Key: vno 3, DES cbc mode with CRC-32, no salt
Key: vno 3, DES cbc mode with RSA-MD5, Version 4
Key: vno 3, DES cbc mode with RSA-MD5, Version 5 - No Realm
Key: vno 3, DES cbc mode with RSA-MD5, Version 5 - Realm Only
Key: vno 3, DES cbc mode with RSA-MD5, AFS version 3
Attributes: REQUIRES_PRE_AUTH
Policy: default
kadmin: Note that "Last successful authentication" and "Last failed authentication" are not filled in. This is incorrect; I have logged in at least a thousand times since the Kerberos database was created. I'm also pretty sure that I've mistyped my password a couple times, too.

This is purely a cosmetic issue, but it would be nice to have fixed. Thank you for considering it.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25-rc2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash

--
brian m. carlson / brian with sandals: Houston, Texas, US
+1 713 440 7475 | http://crustytoothpaste.ath.cx/~bmc | My opinion only
troff on top of XML: http://crustytoothpaste.ath.cx/~bmc/code/thwack
OpenPGP: RSA v4 4096b 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: krb5
Source-Version: 1.8+dfsg~alpha1-7

tags -wontfix +fixed-upstream
thanks

Fixed upstream in krb5-1.8 as a side effect of account lockout
implementation.


--- End Message ---

Reply via email to