[Bug 1486146] Re: recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU (MSG_PEEK|MSG_WAITALL)

2015-08-19 Thread Dan Searle
Hi Joseph,

I re-created the issue on a new install of Ubuntu 14.04.3 (amd64)
running the linux-image-3.19.0-26-generic kernel using the following
code:

#include stdlib.h
#include netinet/ip.h

int main(void)
{
struct sockaddr_in   addr = {
.sin_family  = AF_INET,
.sin_port  = htons(1234),   
   
.sin_addr = { INADDR_ANY }
};
int   conn;
char   buf[16];

int   s =
socket(AF_INET, SOCK_STREAM, 0);

bind(s, (void *)addr, sizeof addr);
listen(s, 1);

conn = accept(s, NULL, 0);

recv(conn, buf, sizeof buf, MSG_PEEK|MSG_WAITALL);
}

$ gcc x.c
$ ./a.out 

$ nc 127.0.0.1 1234
1234enter

-- 'a.out' consumes 100% CPU



After downloading and installing kernel packages from
http://kernel.ubuntu.com/~jsalisbury/lp1486146/ I rebooted, and re-ran
the test as above, this time 'a.out' does not consume 100% CPU any more,
so the bug seems fixed at least in this simple test case using the
replacement kernel.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1486146

Title:
  recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU
  (MSG_PEEK|MSG_WAITALL)

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1486146/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1324438] [NEW] libvrb0 libvrb0-dev needs-packaging Trusty

2014-05-29 Thread Dan Searle
Public bug reported:

Trusty 14.04 does not contain libvrb0 or libvrb0-dev, which were
available in previous releases of Ubuntu, please needs-packaging.

** Affects: vrb (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: libvrb0-dev needs-packaging trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1324438

Title:
  libvrb0 libvrb0-dev needs-packaging Trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/vrb/+bug/1324438/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached

2012-10-22 Thread Dan Searle
I have tested the proposed postgresql-9.1 packages and can confirm that
the fix works in my test case, and in my real case which initially
triggered by bug report.

Basically: tested, fix confirmed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1063613

Title:
  array type handling bug in libecpg.so.6.3, confirmed, patch attached

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached

2012-10-19 Thread Dan Searle
I'm trying to test the proposed postgresql-9.1 package, however, I'm
finding it impossible to get apt to download the correct achive.

I have followed all the instructions below, and here's a quick grep from
apt-get update:

root@ubuntu:/home/dan# apt-get update | grep proposed
Ign http://gb.archive.ubuntu.com precise-proposed InRelease
Hit http://gb.archive.ubuntu.com precise-proposed Release.gpg
Hit http://gb.archive.ubuntu.com precise-proposed Release
Hit http://gb.archive.ubuntu.com precise-proposed/main Sources
Hit http://gb.archive.ubuntu.com precise-proposed/multiverse Sources
Hit http://gb.archive.ubuntu.com precise-proposed/universe Sources
Hit http://gb.archive.ubuntu.com precise-proposed/main amd64 Packages
Hit http://gb.archive.ubuntu.com precise-proposed/multiverse amd64 Packages
Hit http://gb.archive.ubuntu.com precise-proposed/universe amd64 Packages
Hit http://gb.archive.ubuntu.com precise-proposed/main i386 Packages
Hit http://gb.archive.ubuntu.com precise-proposed/multiverse i386 Packages
Hit http://gb.archive.ubuntu.com precise-proposed/universe i386 Packages
Hit http://gb.archive.ubuntu.com precise-proposed/main TranslationIndex
Hit http://gb.archive.ubuntu.com precise-proposed/multiverse TranslationIndex
Hit http://gb.archive.ubuntu.com precise-proposed/universe TranslationIndex
Hit http://gb.archive.ubuntu.com precise-proposed/main Translation-en_GB
Hit http://gb.archive.ubuntu.com precise-proposed/main Translation-en
Hit http://gb.archive.ubuntu.com precise-proposed/multiverse Translation-en_GB
Hit http://gb.archive.ubuntu.com precise-proposed/multiverse Translation-en
Hit http://gb.archive.ubuntu.com precise-proposed/universe Translation-en_GB
Hit http://gb.archive.ubuntu.com precise-proposed/universe Translation-en

root@ubuntu:/home/dan# apt-get install postgresql-9.1/precise-proposed 
libecpg6/precise-proposed
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Release âprecise-proposedâ for âpostgresql-9.1â was not found
E: Release âprecise-proposedâ for âlibecpg6â was not found

Is the gb.archive.ubuntu.com repository not suitable? What am I doing
wrong here?

Dan...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1063613

Title:
  array type handling bug in libecpg.so.6.3, confirmed, patch attached

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1063613] [NEW] array type handling bug in libecpg.so.6.3, confirmed, patch attached

2012-10-08 Thread Dan Searle
Public bug reported:

I found a bug in libecpg.so.6.3, which according to Michael Meskes was
introduced in the postgresql 9.0 source tree.

I have included a test application which works fine on Postgresql 8.4
(libecpg.so.6.1), but fails using Postgresql 9.1 (libecpg.so.6.3).

After confirming the bug with Michael, he came up with this patch. Can
it be added to the Ubuntu package sources please?...

commit 4f6469e55c8bf8b015fe571313c5922a869b4636
Author: Michael Meskes mes...@debian.org
Date:   Fri Oct 5 16:37:45 2012 +0200

Fixed test for array boundary.

Instead of continuing if the next character is not an array boundary 
get_data()
used to continue only on finding a boundary so it was not able to read any
element after the first.

diff --git a/src/interfaces/ecpg/ecpglib/data.c 
b/src/interfaces/ecpg/ecpglib/data.c
index db97503..dcccd92 100644
--- a/src/interfaces/ecpg/ecpglib/data.c
+++ b/src/interfaces/ecpg/ecpglib/data.c
@@ -422,6 +422,7 @@ ecpg_get_data(const PGresult *results, int act_tuple, int 
act_field, int lineno,
ecpg_raise(lineno, 
ECPG_CONVERT_BOOL,
   
ECPG_SQLSTATE_DATATYPE_MISMATCH,
   
NULL);
+   pval++;
break;
}
else if (pval[0] == 't'  pval[1] == 
'\0')
@@ -434,6 +435,7 @@ ecpg_get_data(const PGresult *results, int act_tuple, int 
act_field, int lineno,
ecpg_raise(lineno, 
ECPG_CONVERT_BOOL,
   
ECPG_SQLSTATE_DATATYPE_MISMATCH,
   
NULL);
+   pval++;
break;
}
else if (pval[0] == '\0'  
PQgetisnull(results, act_tuple, act_field))
@@ -777,7 +779,7 @@ ecpg_get_data(const PGresult *results, int act_tuple, int 
act_field, int lineno,
++pval;
}
}
-   } while (*pval != '\0'  array_boundary(isarray, *pval));
+   } while (*pval != '\0'  !array_boundary(isarray, *pval));
 
return (true);
 }

** Affects: postgresql-9.1 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: array ecpg

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1063613

Title:
  array type handling bug in libecpg.so.6.3, confirmed, patch attached

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached

2012-10-08 Thread Dan Searle
** Attachment added: test case to reproduce bug
   
https://bugs.launchpad.net/bugs/1063613/+attachment/3385281/+files/ecpg_array_test.tar.gz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1063613

Title:
  array type handling bug in libecpg.so.6.3, confirmed, patch attached

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached

2012-10-08 Thread Dan Searle
Just got his response from Michael...

 Does this fix have a tracking number or code of some sort
 which I can inform the Ubuntu package maintainers? I want to get the

It was git commit 856ce0fb563a630ddd07dfad8cb4d8eb1d601b77 in the 9.1
branch.

 fix into the Ubuntu 12.04 postgressql-9.1 amd64 package as soon as
 possible.

Feel free to point Martin to me, if there are questions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1063613

Title:
  array type handling bug in libecpg.so.6.3, confirmed, patch attached

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1040588] [NEW] squid3.HEAD (20120823-r12295) WARNING: ICAP Max-Connections limit exceeded bug

2012-08-23 Thread Dan Searle
Public bug reported:

Not sure if this is the right place. I've been trying to find the
correct bug tracker for hours. This was the only place I could see that
was at all relevant.

I configured squid3.HEAD-20120823-r12295 on an up to date Ubuntu 12.04.1
LTS (64 bit) machine like so:

./configure --build=x86_64-linux-gnu --prefix=/usr --includedir=/include
--mandir=/share/man --infodir=/share/info --sysconfdir=/etc
--localstatedir=/var --libexecdir=/lib/squid3 --disable-maintainer-mode
--disable-dependency-tracking --disable-silent-rules --srcdir=.
--datadir=/usr/share/squid3 --sysconfdir=/etc/squid3
--mandir=/usr/share/man --with-cppunit-basedir=/usr --enable-inline
--enable-async-io=8 --enable-storeio=ufs,aufs,diskd --enable-removal-
policies=lru,heap --enable-delay-pools --enable-cache-digests --enable-
underscores --enable-icap-client --enable-ssl --enable-ssl-crtd
--enable-follow-x-forwarded-for --enable-basic-auth-
helpers=LDAP,MSNT,NCSA,PAM,SASL,SMB,YP,DB,POP3,getpwnam,squid_radius_auth
,multi-domain-NTLM --enable-ntlm-auth-helpers=smb_lm, --enable-digest-
auth-helpers=ldap,password --enable-negotiate-auth-
helpers=squid_kerb_auth --enable-external-acl-
helpers=ip_user,ldap_group,session,unix_group,wbinfo_group --enable-arp-
acl --enable-esi --enable-zph-qos --disable-translation --with-
logdir=/var/log/squid3 --with-pidfile=/var/run/squid3.pid --with-
filedescriptors=65536 --with-large-files --with-default-user=proxy
--enable-linux-netfilter build_alias=x86_64-linux-gnu

I configured the squid.conf like so:

acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12  # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7   # RFC 4193 local private network range
acl localnet src fe80::/10  # RFC 4291 link-local (directly plugged) 
machines
acl SSL_ports port 443
acl Safe_ports port 80  # http
acl Safe_ports port 21  # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70  # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
http_access deny manager
http_access allow localnet
http_access allow localhost
http_access deny all
http_port 0.0.0.0:8080
host_verify_strict off
cache_mem 64 MB
memory_cache_shared off
coredump_dir /var/cache/squid
refresh_pattern ^ftp:   144020% 10080
refresh_pattern ^gopher:14400%  1440
refresh_pattern -i (/cgi-bin/|\?) 0 0%  0
refresh_pattern .   0   20% 4320
shutdown_lifetime 1 seconds
always_direct allow all
icap_enable on
icap_connect_timeout 10 seconds
icap_io_timeout 10 seconds
icap_service_failure_limit 100 in 1 seconds
icap_service_revival_delay 20
icap_preview_enable on
icap_206_enable on
icap_persistent_connections on
adaptation_send_client_ip on
adaptation_send_username on
icap_client_username_header X-Client-Username
icap_client_username_encode off
icap_service service_blocker reqmod_precache icap://myicapserver:1344/reqmod 
bypass=off ipv6=off
adaptation_access service_blocker allow all
icap_retry allow all
icap_retry_limit 1
allow_underscore on
dns_defnames on
hosts_file /etc/hosts
dns_v4_first on
memory_pools_limit 32 MB
forwarded_for off
connect_retries 3
workers 1
unlinkd_program /usr/lib/squid3/unlinkd
logfile_daemon /usr/lib/squid3/log_file_daemon

I need this version as it has new features I require and quickly ran
into a problem with the ICAP support. Running tcpdump, I can see regular
OPTIONS request and responses from squid to the ICAP server, but squid
never attempts to issue a REQMOD request, I get ICAP protocol error in
the browser or it simply hangs there, and the cache.log shows

2012/08/23 11:35:08 kid1| essential ICAP service is down after an options fetch 
failure: icap://myicapserver:1344/reqmod [down,!opt]
2012/08/23 11:35:09 kid1| suspending ICAP service for too many failures
2012/08/23 11:35:38 kid1| essential ICAP service is up: 
icap://myicapserver:1344/reqmod [up]
2012/08/23 11:35:52 kid1| WARNING: ICAP Max-Connections limit exceeded for 
service icap://myicapserver:1344/reqmod. Open connections now: 1, including 
0 idle persistent connections.

There are only a maximum of 2 or 3 connections open to the ICAP server
at any given time, so the message Open connections now: 1, is
simply wrong.

This problem renders the ICAP adaption support useless.

If this is the wrong place to report the bug, please advise.

** Affects: squid3 (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  Not sure if this is the right place. I've been trying to find the
  correct bug tracker for hours. This was the only place I could see that
  was at 

[Bug 1040588] [NEW] squid3.HEAD (20120823-r12295) WARNING: ICAP Max-Connections limit exceeded bug

2012-08-23 Thread Dan Searle
Public bug reported:

Not sure if this is the right place. I've been trying to find the
correct bug tracker for hours. This was the only place I could see that
was at all relevant.

I configured squid3.HEAD-20120823-r12295 on an up to date Ubuntu 12.04.1
LTS (64 bit) machine like so:

./configure --build=x86_64-linux-gnu --prefix=/usr --includedir=/include
--mandir=/share/man --infodir=/share/info --sysconfdir=/etc
--localstatedir=/var --libexecdir=/lib/squid3 --disable-maintainer-mode
--disable-dependency-tracking --disable-silent-rules --srcdir=.
--datadir=/usr/share/squid3 --sysconfdir=/etc/squid3
--mandir=/usr/share/man --with-cppunit-basedir=/usr --enable-inline
--enable-async-io=8 --enable-storeio=ufs,aufs,diskd --enable-removal-
policies=lru,heap --enable-delay-pools --enable-cache-digests --enable-
underscores --enable-icap-client --enable-ssl --enable-ssl-crtd
--enable-follow-x-forwarded-for --enable-basic-auth-
helpers=LDAP,MSNT,NCSA,PAM,SASL,SMB,YP,DB,POP3,getpwnam,squid_radius_auth
,multi-domain-NTLM --enable-ntlm-auth-helpers=smb_lm, --enable-digest-
auth-helpers=ldap,password --enable-negotiate-auth-
helpers=squid_kerb_auth --enable-external-acl-
helpers=ip_user,ldap_group,session,unix_group,wbinfo_group --enable-arp-
acl --enable-esi --enable-zph-qos --disable-translation --with-
logdir=/var/log/squid3 --with-pidfile=/var/run/squid3.pid --with-
filedescriptors=65536 --with-large-files --with-default-user=proxy
--enable-linux-netfilter build_alias=x86_64-linux-gnu

I configured the squid.conf like so:

acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12  # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7   # RFC 4193 local private network range
acl localnet src fe80::/10  # RFC 4291 link-local (directly plugged) 
machines
acl SSL_ports port 443
acl Safe_ports port 80  # http
acl Safe_ports port 21  # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70  # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
http_access deny manager
http_access allow localnet
http_access allow localhost
http_access deny all
http_port 0.0.0.0:8080
host_verify_strict off
cache_mem 64 MB
memory_cache_shared off
coredump_dir /var/cache/squid
refresh_pattern ^ftp:   144020% 10080
refresh_pattern ^gopher:14400%  1440
refresh_pattern -i (/cgi-bin/|\?) 0 0%  0
refresh_pattern .   0   20% 4320
shutdown_lifetime 1 seconds
always_direct allow all
icap_enable on
icap_connect_timeout 10 seconds
icap_io_timeout 10 seconds
icap_service_failure_limit 100 in 1 seconds
icap_service_revival_delay 20
icap_preview_enable on
icap_206_enable on
icap_persistent_connections on
adaptation_send_client_ip on
adaptation_send_username on
icap_client_username_header X-Client-Username
icap_client_username_encode off
icap_service service_blocker reqmod_precache icap://myicapserver:1344/reqmod 
bypass=off ipv6=off
adaptation_access service_blocker allow all
icap_retry allow all
icap_retry_limit 1
allow_underscore on
dns_defnames on
hosts_file /etc/hosts
dns_v4_first on
memory_pools_limit 32 MB
forwarded_for off
connect_retries 3
workers 1
unlinkd_program /usr/lib/squid3/unlinkd
logfile_daemon /usr/lib/squid3/log_file_daemon

I need this version as it has new features I require and quickly ran
into a problem with the ICAP support. Running tcpdump, I can see regular
OPTIONS request and responses from squid to the ICAP server, but squid
never attempts to issue a REQMOD request, I get ICAP protocol error in
the browser or it simply hangs there, and the cache.log shows

2012/08/23 11:35:08 kid1| essential ICAP service is down after an options fetch 
failure: icap://myicapserver:1344/reqmod [down,!opt]
2012/08/23 11:35:09 kid1| suspending ICAP service for too many failures
2012/08/23 11:35:38 kid1| essential ICAP service is up: 
icap://myicapserver:1344/reqmod [up]
2012/08/23 11:35:52 kid1| WARNING: ICAP Max-Connections limit exceeded for 
service icap://myicapserver:1344/reqmod. Open connections now: 1, including 
0 idle persistent connections.

There are only a maximum of 2 or 3 connections open to the ICAP server
at any given time, so the message Open connections now: 1, is
simply wrong.

This problem renders the ICAP adaption support useless.

If this is the wrong place to report the bug, please advise.

** Affects: squid3 (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  Not sure if this is the right place. I've been trying to find the
  correct bug tracker for hours. This was the only place I could see that
  was at 

[Bug 723840] Re: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

2011-02-24 Thread Dan Searle
I can confirm that compiling and using the new MIT Kerberos 1.8.3 libs
fixes the problem I described.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.
https://bugs.launchpad.net/bugs/723840

Title:
  krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 723840] Re: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

2011-02-24 Thread Dan Searle
I can confirm that compiling and using the new MIT Kerberos 1.8.3 libs
fixes the problem I described.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/723840

Title:
  krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 723840] [NEW] krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

2011-02-23 Thread Dan Searle
Public bug reported:

Binary package hint: libkrb5-3

libkrb5-3 in Lucid does not work properly when mediating between a
Windows 7 client and a 2008R2 KDC after applying MS hotfix KB2425227.

The bug has been reported previously here:
http://mailman.mit.edu/pipermail/krbdev/2010-July/009148.html

And here:
http://www.mail-archive.com/squid-users@squid-cache.org/msg75789.html

However, it's only since the MS hotfix that it has become a problem for
us.

Basically, the bug has been fixed in libkrb5-3 version 1.8.3, so all you
have to do is update the package.

I'm guessing you're going to get a lot more bug reports on this, trust
MS to keep changing the goal posts and making our jobs harder.

** Affects: krb5 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.
https://bugs.launchpad.net/bugs/723840

Title:
  krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 723840] [NEW] krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

2011-02-23 Thread Dan Searle
Public bug reported:

Binary package hint: libkrb5-3

libkrb5-3 in Lucid does not work properly when mediating between a
Windows 7 client and a 2008R2 KDC after applying MS hotfix KB2425227.

The bug has been reported previously here:
http://mailman.mit.edu/pipermail/krbdev/2010-July/009148.html

And here:
http://www.mail-archive.com/squid-users@squid-cache.org/msg75789.html

However, it's only since the MS hotfix that it has become a problem for
us.

Basically, the bug has been fixed in libkrb5-3 version 1.8.3, so all you
have to do is update the package.

I'm guessing you're going to get a lot more bug reports on this, trust
MS to keep changing the goal posts and making our jobs harder.

** Affects: krb5 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/723840

Title:
  krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2010-03-01 Thread Dan Searle
Erm nobody doing anything to get these fixes merged into the upstream?
Anything? Anybody? :-/

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2010-03-01 Thread Dan Searle
Erm nobody doing anything to get these fixes merged into the upstream?
Anything? Anybody? :-/

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2010-02-11 Thread Dan Searle
Still low priproty? I'm having to use custom build libs which override
the libkrb53 package, which is not optimal. Any idea when these bug
fixes will be merged?

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2010-02-11 Thread Dan Searle
Still low priproty? I'm having to use custom build libs which override
the libkrb53 package, which is not optimal. Any idea when these bug
fixes will be merged?

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 519781] [NEW] Strange SEGVs all over the place after upgrade to 2.6.24-27-server (Hardy)

2010-02-10 Thread Dan Searle
Public bug reported:

After dist-upgrading some of our customers servers which run Hardy 8.04
LTS server 32 bit, we have had sporadic SEGVs in random services (cron,
sshd etc). I'm pretty sure it's something to do with the kernel
because:

a) we've run memtest and they came up clean
b) otherwise they have been running fine for months
c) There seems no pattern to which services die with segv's.

Here's a snippit from dmesg from one of the servers:

[3013754.735517] cron[16609]: segfault at fef6403a eip fef6403a esp bfd0e0ec 
error 14
[3013754.768912] cron[16610]: segfault at fef6403a eip fef6403a esp bfd0e0ec 
error 14
[3013754.768969] cron[16612]: segfault at fef6403a eip fef6403a esp bfd0e0ec 
error 14
[3013754.810724] cron[16611]: segfault at fef6403a eip fef6403a esp bfd0e0ec 
error 14
[3013754.810851] cron[16615]: segfault at fef6403a eip fef6403a esp bfd0e0ec 
error 14
[3013763.766067] postgres[17048]: segfault at 400c eip b7a2dbc6 esp 
bfd5eaa0 error 4
[3013763.766479] postgres[21889]: segfault at 400c eip b7a2dbc6 esp 
bfd5e5b0 error 4
[3013763.766496] postgres[21890]: segfault at 400c eip b7a2dbc6 esp 
bfd5e5f0 error 4
[3013763.766906] postgres[21892]: segfault at 400c eip b7a2dbc6 esp 
bfd5e670 error 4
[3013763.767015] postgres[21891]: segfault at 400c eip b7a2dbc6 esp 
bfd5e680 error 4
[3013763.770930] postgres[17049]: segfault at 400c eip b7a2dbc6 esp 
bfd5ea50 error 4
[3014526.736920] printk: 1 messages suppressed.
[3014526.736925] sshd[4923]: segfault at 400c eip b7a4fbc6 esp bfca7d80 
error 4

Looks like maybe some upstream changes have gone seriously wrong.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
Strange SEGVs all over the place after upgrade to 2.6.24-27-server (Hardy)
https://bugs.launchpad.net/bugs/519781
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2009-11-12 Thread Dan Searle
I've found and attempted a fix for more memory leaks in libkrb53, here's
a patch (attached) that fixes them for me when patched against the
krb5-1.6.4-beta1 relase available from MIT.

I urge you to test this patch (it may have undesirable side effects I'm
unaware of) and if it's good then merge it into the Ubuntu release of
MIT kerberos.

Reards, Dan...


** Attachment added: krb5-1.6.4-beta1.patch
   http://launchpadlibrarian.net/35578086/krb5-1.6.4-beta1.patch

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2009-11-12 Thread Dan Searle
I've found and attempted a fix for more memory leaks in libkrb53, here's
a patch (attached) that fixes them for me when patched against the
krb5-1.6.4-beta1 relase available from MIT.

I urge you to test this patch (it may have undesirable side effects I'm
unaware of) and if it's good then merge it into the Ubuntu release of
MIT kerberos.

Reards, Dan...


** Attachment added: krb5-1.6.4-beta1.patch
   http://launchpadlibrarian.net/35578086/krb5-1.6.4-beta1.patch

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2009-11-10 Thread Dan Searle
Why is this seen as low priotiry, it's causing no end of problems for
some of our servers running out of memory, I have to restart the
effected daemons twice a day, which is a pretty ugly, I have confirmed
the patch I submitted from the krb5...@mit.edu mailing list does work.
All you have to do is apply this patch:

--- ./src/lib/krb5/rcache/rc_none.c 2004-08-04 07:58:17.0 +0100
+++ ./src/lib/krb5/rcache/rc_none.c 2009-11-09 09:14:43.0 +
@@ -43,11 +43,17 @@
return 0;
}
#define krb5_rc_none_recover   krb5_rc_none_noargs
-#define krb5_rc_none_destroy   krb5_rc_none_noargs
-#define krb5_rc_none_close krb5_rc_none_noargs
#define krb5_rc_none_expunge   krb5_rc_none_noargs

static krb5_error_code KRB5_CALLCONV
+krb5_rc_none_close(krb5_context ctx, krb5_rcache rc)
+{
+free (rc);
+return 0;
+}
+#define krb5_rc_none_destroykrb5_rc_none_close
+
+static krb5_error_code KRB5_CALLCONV
krb5_rc_none_store(krb5_context ctx, krb5_rcache rc, krb5_donot_replay *r)
{
return 0; 

I tried to make a new libkrb53 package myself, but there are lots of
interdependencies which mean I would have to remake lots of other
packages. Please apply this patch and update the official Hardy
repository ASAP.

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

2009-11-10 Thread Dan Searle
Why is this seen as low priotiry, it's causing no end of problems for
some of our servers running out of memory, I have to restart the
effected daemons twice a day, which is a pretty ugly, I have confirmed
the patch I submitted from the krb5...@mit.edu mailing list does work.
All you have to do is apply this patch:

--- ./src/lib/krb5/rcache/rc_none.c 2004-08-04 07:58:17.0 +0100
+++ ./src/lib/krb5/rcache/rc_none.c 2009-11-09 09:14:43.0 +
@@ -43,11 +43,17 @@
return 0;
}
#define krb5_rc_none_recover   krb5_rc_none_noargs
-#define krb5_rc_none_destroy   krb5_rc_none_noargs
-#define krb5_rc_none_close krb5_rc_none_noargs
#define krb5_rc_none_expunge   krb5_rc_none_noargs

static krb5_error_code KRB5_CALLCONV
+krb5_rc_none_close(krb5_context ctx, krb5_rcache rc)
+{
+free (rc);
+return 0;
+}
+#define krb5_rc_none_destroykrb5_rc_none_close
+
+static krb5_error_code KRB5_CALLCONV
krb5_rc_none_store(krb5_context ctx, krb5_rcache rc, krb5_donot_replay *r)
{
return 0; 

I tried to make a new libkrb53 package myself, but there are lots of
interdependencies which mean I would have to remake lots of other
packages. Please apply this patch and update the official Hardy
repository ASAP.

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 434536] [NEW] ca-certificates_20090701_all.deb does not have all Entrust root CA's

2009-09-22 Thread Dan Searle
Public bug reported:

Binary package hint: ca-certificates

ca-certificates_20090701_all.deb does not have all Entrust root CA's

For example, the following sites are not able to be validated:

https://www.savingsbondsdirect.gov
https://fire.irs.gov

Regards, Dan...

** Affects: ca-certificates (Ubuntu)
 Importance: Undecided
 Status: New

-- 
ca-certificates_20090701_all.deb does not have all Entrust root CA's
https://bugs.launchpad.net/bugs/434536
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 430644] Re: Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer

2009-09-16 Thread Dan Searle

** Attachment added: SVRSecureG2.crt
   http://launchpadlibrarian.net/31896801/SVRSecureG2.crt

-- 
Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer
https://bugs.launchpad.net/bugs/430644
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 430644] [NEW] Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer

2009-09-16 Thread Dan Searle
Public bug reported:

Binary package hint: ca-certificates

The ca-certificates package is a bit of a problem. It doesn't conain
many trusted ca's that it should, for instance, here's a Verisign cert
that should be included:

http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer

(have to convert it to a .crt from a .cer which I've attached.)

Also, you need to sync the latest package with all Ubuntu distro's, e.g.
Hardy, and not just keep updating the Jaunty/Karmic distros.

Dan...

** Affects: ca-certificates (Ubuntu)
 Importance: Undecided
 Status: New

-- 
Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer
https://bugs.launchpad.net/bugs/430644
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs