--On Thursday, April 29, 2010 10:36 PM +0900 Ansgar Burchardt <ans...@43-1.org> wrote:

Package: libnss-ldap,libldap-2.4-2
Version: libnss-ldap/264-2.1
Version: libldap-2.4-2/2.4.17-2.1

Hi,

libgcrypt11 has the "feature" of changing the real uid if it differs
from the effective user id and the effective user id is 0 [1].  This
comes from a time when programs had to be setuid root in order to use
mlock() to protect memory containing private keys.

This means that setuid applications using nss-ldap with a SSL connection
will lose their elevated privileges (unless a daemon such as nscd is
used).  Thus applications like su, sudo, at, ... do longer work
correctly.  Sadly upstream seems to consider this side effect in
libgcrypt a feature and seems not willing to change it.

One way to solve this problem would having a separate libldap package
that links against OpenSSL [2] and could be used by libraries such as
libnss-ldap.

Or Debian could use nss-ldapd with nslcd, and not have to introduce OpenSSL at all. Long term, it would of course be best to use the slapo-nssov overlay.

--Quanah

--

Quanah Gibson-Mount
Principal Software Engineer
Zimbra, Inc
--------------------
Zimbra ::  the leader in open source messaging and collaboration



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to