Conrol: tags 992430 moreinfo

Sergey Vlasov wrote...

> When doing schroot into a buster chroot environment, sudo
> commands fail due to password not matching the current user password.
> There is no such problem for bullseye chroot environment.
> 
> To reproduce:
> 
> 0. make sure your current user belongs to sudo group
> 
> 1. create buster chroot environment:
> 
> $ sudo debootstrap buster /schroot-bug/buster
>
> 2. create schroot configuration file:
> 
> $ cat << EOF | sudo tee /etc/schroot/chroot.d/buster
> [buster]
> type=directory
> directory=/schroot-bug/buster
> users=$USER
> profile=desktop
> personality=linux
> preserve-environment=false
> EOF

Unless I misunderstood, also install sudo in the chroot.

> 3. enter chroot:
> 
> $ schroot -c buster
> 
> 4. test sudo with your current password:
> 
> $ sudo true
(...)

The following changes made the check pass:

1. On the *host*, change "yescrypt" to "sha512" in
   /etc/pam.d/common-password
2. Change the password of that user (feel free to re-use the old one,
   but we need the right hash).
3. Reboot (possibly not needed if you do the right things).

Can you confirm? Then this is stuff for README.Debian but otherwise
little schroot can do.

Regards,

    Christoph

Attachment: signature.asc
Description: PGP signature

Reply via email to