Your message dated Thu, 30 Dec 2010 02:33:02 +0000
with message-id <[email protected]>
and subject line Bug#516864: fixed in libpam-afs-session 2.0-1
has caused the Debian Bug report #516864,
regarding document requirement for kernel keyring support
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
516864: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=516864
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libpam-afs-session
Version: 1.7-1
Severity: important

When logging in via SSH, a user does not get AFS tokens or a PAG, but
they do get kerberos tickets.

This works correctly via the console, but not SSH.

-- System Information:
Debian Release: 5.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.16.29-xenU (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam-afs-session depends on:
ii  libc6                 2.7-18             GNU C Library: Shared libraries
ii  libkrb53              1.6.dfsg.4~beta1-6 MIT Kerberos runtime libraries
ii  libpam0g              1.0.1-5            Pluggable Authentication Modules l

Versions of packages libpam-afs-session recommends:
ii  libpam-krb5                3.11-4        PAM module for MIT Kerberos
ii  openafs-client             1.4.7.dfsg1-6 AFS distributed filesystem client 
ii  openafs-krb5               1.4.7.dfsg1-6 AFS distributed filesystem Kerbero

libpam-afs-session suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: libpam-afs-session
Source-Version: 2.0-1

We believe that the bug you reported is fixed in the latest version of
libpam-afs-session, which is due to be installed in the Debian FTP archive:

libpam-afs-session_2.0-1.debian.tar.gz
  to main/libp/libpam-afs-session/libpam-afs-session_2.0-1.debian.tar.gz
libpam-afs-session_2.0-1.dsc
  to main/libp/libpam-afs-session/libpam-afs-session_2.0-1.dsc
libpam-afs-session_2.0-1_i386.deb
  to main/libp/libpam-afs-session/libpam-afs-session_2.0-1_i386.deb
libpam-afs-session_2.0.orig.tar.gz
  to main/libp/libpam-afs-session/libpam-afs-session_2.0.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Russ Allbery <[email protected]> (supplier of updated libpam-afs-session package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 29 Dec 2010 16:28:44 -0800
Source: libpam-afs-session
Binary: libpam-afs-session
Architecture: source i386
Version: 2.0-1
Distribution: experimental
Urgency: low
Maintainer: Russ Allbery <[email protected]>
Changed-By: Russ Allbery <[email protected]>
Description: 
 libpam-afs-session - PAM module to set up a PAG and obtain AFS tokens
Closes: 485049 516864
Changes: 
 libpam-afs-session (2.0-1) experimental; urgency=low
 .
   * New upstream release.
     - If there is no PAG, create a new one and obtain tokens even if the
       module has already run.  Works around destruction of the PAG on
       Linux by keyring initialization PAM modules.
     - pam_close_session now removes module-specific data indicating that
       the module has already run, for better behavior in the rare case of
       opening multiple sessions using the same PAM handle.
     - Log an ignore status properly when debugging is enabled.
   * Add libtest-pod-perl to build dependencies for documentation tests.
   * Document the Linux kernel requirement for keyring support to use AFS
     PAGs properly in README.Debian.  (Closes: #516864)
   * Document the requirement for vserver guests to have access to the
     /proc file used by the OpenAFS cache manager for AFS system calls in
     README.Debian.  (Closes: #485049)
   * Update to debhelper compatibility level V8.
     - Use debhelper rule minimization.
   * Switch to 3.0 (quilt) source format.  Force a single Debian patch and
     include a custom patch header explaining that it is a rollup of any
     fixes cherry-picked from upstream and breaking those patches out
     separately would be work for no gain.
Checksums-Sha1: 
 d7941597a6f8beaca4838009d88dc5033cc3072e 1638 libpam-afs-session_2.0-1.dsc
 307f1a1c71a0f184172a11a173a96fa397104eac 405138 
libpam-afs-session_2.0.orig.tar.gz
 cc9f53fb77355f23dabcf34d743b1d830abcb4fb 8202 
libpam-afs-session_2.0-1.debian.tar.gz
 c03b321ffdf0d67cd2db35ee580c8962e3c1d646 38892 
libpam-afs-session_2.0-1_i386.deb
Checksums-Sha256: 
 c9b921bbfc8c9dd6c1536a5ea50ce72ece78991d594f07cc3619a543236858f6 1638 
libpam-afs-session_2.0-1.dsc
 445ce1b3ce98ac407ac5275d2c3ebeb44b027a823098203f8718eba5d698f3a9 405138 
libpam-afs-session_2.0.orig.tar.gz
 32d1d4e370c28ac394a98e84a5d7a7c6edb4ac2665db6a6101828d7561015dab 8202 
libpam-afs-session_2.0-1.debian.tar.gz
 c9aa4a07c510da68716fc2708bbba64a991383917c43ab43b3538218b668fca2 38892 
libpam-afs-session_2.0-1_i386.deb
Files: 
 70a2736b6eff5559d10e6fe46004c394 1638 admin optional 
libpam-afs-session_2.0-1.dsc
 1fa933ae0388516b9a983a39ee27b930 405138 admin optional 
libpam-afs-session_2.0.orig.tar.gz
 4e0ca25ddbacd79971955b4269a5ba43 8202 admin optional 
libpam-afs-session_2.0-1.debian.tar.gz
 dabf0ac7fb1c8adf5b86aeb4981e4bb8 38892 admin optional 
libpam-afs-session_2.0-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBCAAGBQJNG9KKAAoJEH2AMVxXNt510LkH/0WfmjTdAEALc6o6C+4/kdJh
g1n2x/UJIjSngbEbFwEVbOBTXLltPmVV/xRJO3yT4hRGyuamdq0A+Vl7F8URW68C
70e4dinL2Ds4lGEKAwbKvCmF15Nx+zJWhklCmGwj4T1ckTupdOtpaKuxGRbnpsOs
LXz7n19/mjqr/fHcP6SH4wnEKu0uwcvkddmQzlWTJMPVgr8xI1o0l66luZVW9XS8
K4Af4yWARqx+utl6J3BGBvgclPkb4suztoOV8weoA/+9A2Vd8m66Ok4Ky6u/WXZJ
owNc/aHWW3vIXarRLsbACVVhTKB/3ZXi7vz9LJJvjZ3rBV8iyEdE3nDlM5ZIVNs=
=aEFH
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to