@Marc Thomas: A not particular work around is to install sshfs* and
mount the file systems manually. I found that IntelliJ (netbeans)
stopped overwriting permissions when mounted this way.
*See: http://shellspells.org/sshfs/
--
You received this bug notification because you are a member of Ubun
** Changed in: pam (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/297408
Title:
pam_group does not support NSS groups
--
ubuntu-bugs mailing list
ubuntu-
The patch was rolled up into Pam 1.1.2 as per the link below. Credit
would have been nice though. :(
http://sourceforge.net/mailarchive/forum.php?thread_name=1280924965.5791.770.camel%40vespa.frost.loc&forum_name
=pam-patches
--
pam_group does not support NSS groups
https://bugs.launchpad.net/bu
I really need to have a chat to the PAM maintainers about having this
implemented in mainline pam. In any case, the patch at the top compiles
cleanly with 10.4 packages. I've built a bunch of packages, which are
listed below - only the first one should actually matter;
http://tin.murrell.co.nz/~ed
The above fix I have written does what it is coded to, but does NOT
create the required behaviour. If a user has a process that starts
eating memory, then the entire session will be terminated, and the user
will be booted back to the login screen.
--
Please set memory limits by default
https://bu
** Summary changed:
- pam_group does support NSS groups
+ pam_group does not support NSS groups
--
pam_group does not support NSS groups
https://bugs.launchpad.net/bugs/297408
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-b
The patch itself doesn't support LDAP directly, but through the NSS
library, so the query will be determined by the configuration of if
libnss-ldap or libnss-ldapd packages.
So, to answer your query, it only supports POSIX/unix groups that it is
a member. In most circumstances this will be where m
I have the percentage based memory limits working fine. Currently, if
the char suffixing the value in security.conf is a %, it will calculate
the max virtual memory size based on the physical memory size. I'm
tweaking it, and bug testing it at the moment.
Do any of the other memory limiting option
A plausible solution would to be enable pam_limits by default, and add
support for setting virtual memory limits with a percentage.
In that vein, it would be also handy to be able to set the max number of
processes based on the number of cores.
--
Please set memory limits by default
https://bugs
** Attachment added: "Allows NSS groups to be used in pam_group"
http://launchpadlibrarian.net/19604707/099_pam_group_nss_groups
--
pam_group does support NSS groups
https://bugs.launchpad.net/bugs/297408
You received this bug notification because you are a member of Ubuntu
Bugs, which is sub
Public bug reported:
Binary package hint: libpam-modules
The pam_group module allows assigning groups based on group membership.
This is handy, if for example you want to automagically enable various
rights on a specific server dependant on a users membership in a given
netgroup. The following li
I downloaded the various packages, and it looks like the problem was
fixed in Edgy. Figures. However, the bug still definitively exists in
dapper and earlier, and upstream in Debian as well. Would this be
something that should be fixed in Dapper as part of the LTS support?
Scott James Remnant wrot
Public bug reported:
Currently, /etc/services lists the following;
kpasswd 761/tcp kpwd# Kerberos "passwd"
It should be udp port 464.
** Affects: netbase (Ubuntu)
Importance: Undecided
Status: Unconfirmed
--
Incorrect port for kpasswd entry in /etc/se
13 matches
Mail list logo