On 01/18/2010 02:14 PM, Hilco Wijbenga wrote:
2010/1/18 walt<w41...@gmail.com>:
Can I trouble you folks to do this ten-second test and report your
results?
As an ordinary user, type 'su' at a bash prompt. Now, where you
would normally type your root password, just type Ctrl-d instead.
What do you see? (I'm ruling out evil spirits here, so please bear
with me ;)
su: Authentication information cannot be recovered
Thanks for your help.
What did I win? :-)
Congratulations, you just won my evil spirits. Please come pick them
up ASAP, as they're getting hungry.
The evil spirits in my x86 and ~amd64 machines seem to be outvoted by
4:1 (so far).
Here is what I see on both machines:
$su
Password: <===== I type Ctrl-d here
Segmentation fault
I've traced this problem to the pam_ssh package, which is supposed
to return a charstring containing the typed password, but it instead
returns a null pointer when I type Ctrl-d. Calamity ensues.
I've filed a gentoo bug report that has generated only puzzlement so
far, and I guess your responses explain why. I have evil spirits in
my two machines, and you don't.