On 01/18/2010 02:14 PM, Hilco Wijbenga wrote:
2010/1/18 walt<w41...@gmail.com>:
Can I trouble you folks to do this ten-second test and report your
results?

As an ordinary user, type 'su' at a bash prompt.  Now, where you
would normally type your root password, just type Ctrl-d instead.

What do you see? (I'm ruling out evil spirits here, so please bear
with me ;)

su: Authentication information cannot be recovered

Thanks for your help.

What did I win? :-)

Congratulations, you just won my evil spirits.  Please come pick them
up ASAP, as they're getting hungry.

The evil spirits in my x86 and ~amd64 machines seem to be outvoted by
4:1 (so far).

Here is what I see on both machines:

$su
Password:         <===== I type Ctrl-d here
Segmentation fault

I've traced this problem to the pam_ssh package, which is supposed
to return a charstring containing the typed password, but it instead
returns a null pointer when I type Ctrl-d.  Calamity ensues.

I've filed a gentoo bug report that has generated only puzzlement so
far, and I guess your responses explain why.  I have evil spirits in
my two machines, and you don't.


Reply via email to