> "Christian" == Christian Ehrhardt <1955...@bugs.launchpad.net>
writes:
Christian> Reproducible in local autopkgtest
Let me make sure I'm understanding.
You are saying that prior to penssl 3, the test works, but with
openssl3, the test fails?
What is the ssl version in the
> "Simon" == Simon Chopin <1945...@bugs.launchpad.net> writes:
Simon> We're planning to transition to OpenSSL 3.0 for the 22.04
Simon> release, and consider this issue as blocking for this
Simon> transition.
I expect things to be fixed in Debian within the next couple of months.
This doesn't sound like a Debian issue.
It sounds more like a disagreement between your source of vulnerability
information and Ubuntu about when a problem is fixed (or whether it
was).
I also don't see CVE-2018-5710 as a vulnerability that upstream lists as
fixed in their git history.
I would
This is possibly a duplicate of
https://bugs.launchpad.net/ubuntu/+source/freeipa/+bug/1874915 at least if you
are using freeipa.
As shipped, krb5-kdc does not log to /var/log, but instead logs to syslog
My position is that since krb5's systemd configuration is correct for the
shipped
I'm going to push back on the reassignment to krb5.
I think this is a freeipa bug.
Kerberos's systemd service unit is correct for Kerberos.
freeipa is the one that is deciding it wants to change the Kerberos
logging configuration, and thus is the one that should adjust the
permissions.
Honestly
Yes, it is because of that change.
is the dn outside of the subtree?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817955
Title:
Getting new "DN is out of the realm subtree" error on adding
Robie any chance I could get you to sync krb5 1.17-2 from Debian
unstable to disco?
It's probably not a big deal but there's no reason not to take the fix
into Disco.
> "Robie" == Robie Basak <1817...@bugs.launchpad.net> writes:
Robie> Thanks Clark and Sam. Ubuntu doesn't support
I think this is basically only a problem on upgrade from older versions of
krb5, in particular from prior to the 1.12 era to the current packaging.
As part of adding support for systemd units, I decided to drop support for the
run_kadmind variable, and bungled the upgrade path.
This is an issue
** Changed in: krb5 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817376
Title:
krb5-admin-server postinst has broken debconf if RUN_KADMIND set in
So, is this a spec bug or an implementation bug.
Does the current behavior cause anything to break, or is it simply that
implementations have diverged from the spec in tagging of the string.
--Sam
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
*** This bug is a duplicate of bug 1772447 ***
https://bugs.launchpad.net/bugs/1772447
I agree with Russ.
On the Debian side, I would not support a change to krb5-kdc to make
/var/lib/krb5kdc world readable.
I think putting the public cert in /etc/krb5kdc is fine: I can make a
case it's
Hi.
For whatever reason I'm not getting mail when an MP is opened in the
krb5 gitlab.
In general, i think Debian uses its BTS as the todo system of record
moreso than gitlab MPs. I know for myself and I suspect a lot of other
debian developers, a wishlist bug against a package would be the best
Hi.
It's likely I should know the answer to this, but I don't and I makes it
hard for me to know how to prioritize supporting your work.
Would you mind giving a breakdown of the top five projects you tend to
spend time working on? Linux accessibility for the blind is fairly
broad and.
--Sam
> "Joshua" == Joshua Powers writes:
Joshua> If we want to fix this in zesty, then a release with only
Joshua> the bug fixes would be desired. That could be SRU'ed
Joshua> assuming it is not too big of a change such that it would
Joshua> limit the
> "Joshua" == Joshua Powers writes:
Joshua> If we want to fix this in zesty, then a release with only
Joshua> the bug fixes would be desired. That could be SRU'ed
Joshua> assuming it is not too big of a change such that it would
Joshua> limit the
I can put something in debian experimental if that makes the sync
easier.
So, you'd prefer just the Debian 1.15-1 with bug fixes rather than a
1.15.1?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Bug watch added: Debian Bug tracker #856307
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856307
** Also affects: krb5 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856307
Importance: Unknown
Status: Unknown
--
You received this bug notification because you
> "Robie" == Robie Basak <1643...@bugs.launchpad.net> writes:
Robie> @Bruce Thank you for detailing your testing. In your test
Robie> suite, do you cover any interoperability with SPNEGO but
Robie> not-Windows, whether in integration or code path coverage?
Robie> That's the
As a FYI, upstream has relicensed the file under their standard license
with permission from the author.
Coming to Debian soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644595
Title:
I've forwarded this to upstream krbdev.mit.edu #8506
I don't know if this is pkcs 11 2.10 specific or specific to the backend in
question, but it's worth having upstream take a look.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Langasek, Closes: #833798
* Fix kdb5_util create on 32-bit platforms, thanks Greg Hudson, Closes:
#834035
-- Sam Hartman <hartm...@debian.org> Mon, 05 Sep 2016 21:03:14 -0400
** Affects: krb5 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notifi
> "Till" == Till Kamppeter <1592...@bugs.launchpad.net> writes:
Till> Build the package on the system which you have at hand (amd64,
Till> i386, ...), directing the build output into a file. Search
Till> through the output to see whther there are any compiler
Till> warnings
Try this. I've fixed the new instance of the error as well. Incremented
the version number so the patch has a different name, but you may not
want to do that if you end up uploading
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "krb5_1.14.2+dfsg-1ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1592841/+attachment/4684544/+files/krb5_1.14.2+dfsg-1ubuntu2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I've replaced the debdiff with one that hopefully works. I'm sorry for
spacing at the controls there. Perhaps yearning for a simpler time:-)
** Patch added: "revised patch take 2"
O, sorry.
I knew that seemed simpler than it should have been:-)
Yeah, you could stick single-debian-patch in debian/source/options and
it would work, but I'll do it right.
** Patch removed: "krb5_1.14.2+dfsg-1ubuntu1.debdiff"
/krb5/+bug/1592841/+attachment/4684512/+files/krb5_1.14.2+dfsg-1ubuntu1.debdiff
** Changed in: krb5 (Ubuntu)
Assignee: Sam Hartman (hartmans) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
Looks simple; preparing fix
** Changed in: krb5 (Ubuntu)
Assignee: (unassigned) => Sam Hartman (hartmans)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1592841
Title:
FTBFS on ppc64el, blo
Include a link to the buildlog and i'll take a look.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1592841
Title:
FTBFS on ppc64el, blocks updates of all packages depending on krb5,
for example
** Also affects: moonshot-ui
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1590489
Title:
Feature request: To allow Moonshot UI to also manage SAML ECP
I think it logs to syslog.
Are you seeing logging configuration that is failing because of the
systemd configuration, or are you saying that if the systemd
configuration is updated *and* a logging stanza is added it would log to
this file?
I would e xpect the kdc to log to /var/log/auth.log out
kadmind to exhaust all
available memory. (Closes: #813126)
-- Sam Hartman <hartm...@debian.org> Tue, 23 Feb 2016 08:54:09 -0500
** Affects: krb5 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Serve
kadmind to exhaust all
available memory. (Closes: #813126)
-- Sam Hartman <hartm...@debian.org> Tue, 23 Feb 2016 08:54:09 -0500
** Affects: krb5 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: trusty-backports
Status: Fix Released = Confirmed
** Changed in: utopic-backports
Status: Fix Released = Confirmed
** Summary changed:
- Please backport moonshot-ui 0.7.1-1 (universe) from vivid
+ moonshot-ui was backported to trusty and utopic. However, a
I tested by installing krb5-gss-samples, and installing a proper
moonshot configuration (see docs linked off project-moonshot.org)
I installed moonshot-ui and moonshot-gss-eap.
I created a credential and used moonshot-webp to import it.
Then I ran
gss-server host@localhost
gss-client -mech '{
I tested by installing krb5-gss-samples, and installing a proper
moonshot configuration (see docs linked off project-moonshot.org)
I installed moonshot-ui and moonshot-gss-eap.
I created a credential and used moonshot-webp to import it.
Then I ran
gss-server host@localhost
gss-client -mech '{
Unfortunately, there's a breaks relationship between libmoonshot1 and
moonshot-ui that is poorly constructed. This needs to be relaxed so the
backported moonshot-ui can be installed. Oops and I'll be more careful
about that in the future.
** Description changed:
Please backport moonshot-ui
I tested by installing krb5-gss-samples, and installing a proper
moonshot configuration (see docs linked off project-moonshot.org) I
installed moonshot-ui and moonshot-gss-eap. I created a credential
and used moonshot-webp to import it.
Then I ran
gss-server host@localhost
gss-client -mech '{
I tested by installing krb5-gss-samples, and installing a proper
moonshot configuration (see docs linked off project-moonshot.org)
I installed moonshot-ui and moonshot-gss-eap.
I created a credential and used moonshot-webp to import it.
Then I ran
gss-server host@localhost
gss-client -mech '{
** Description changed:
Please backport libradsec 0.0.5-2 (universe) from vivid to trusty,
utopic.
Reason for the backport:
I'd like to backport the packages needed for
http://www.project-moonshot.org/ and the JISC Assent service
utopic also tested
** Description changed:
Please backport shibboleth-resolver 1.0.0-1 (universe) from vivid to
trusty, utopic.
Reason for the backport:
I'd like to backport the packages needed for
http://www.project-moonshot.org/ and the JISC Assent
And the same debdiff for utopic, which I also tested.
** Patch added: Debdiff for utopic backport
https://bugs.launchpad.net/trusty-backports/+bug/1439215/+attachment/4364514/+files/utopic.debdiff
** Description changed:
Please backport moonshot-ui 0.7.1-1 (universe) from vivid to trusty,
Public bug reported:
Please backport libradsec 0.0.5-2 (universe) from vivid to trusty,
utopic.
Reason for the backport:
I'd like to backport the packages needed for
http://www.project-moonshot.org/ and the JISC Assent service
(http://jisc.ac.uk/assent ) to trusty.
Public bug reported:
Please backport moonshot-ui 0.7.1-1 (universe) from vivid to trusty,
utopic.
Reason for the backport:
I'd like to backport the packages needed for
http://www.project-moonshot.org/ and the JISC Assent service
(http://jisc.ac.uk/assent ) to trusty.
Public bug reported:
Please backport shibboleth-resolver 1.0.0-1 (universe) from vivid to
trusty, utopic.
Reason for the backport:
I'd like to backport the packages needed for
http://www.project-moonshot.org/ and the JISC Assent service
(http://jisc.ac.uk/assent ) to
we know the dev libraries work because moonshot-gss-eap builds. see
ppa:moonshot/moonshot-backports
** Description changed:
Please backport moonshot-ui 0.7.1-1 (universe) from vivid to trusty,
utopic.
Reason for the backport:
I'd like to backport the
According to builds in ppa:moonshot/moonshot-backports, the -dev package
was used successfully to build moonshot-gss-eap
** Description changed:
Please backport libradsec 0.0.5-2 (universe) from vivid to trusty,
utopic.
Reason for the backport:
I'd like
Public bug reported:
Please backport moonshot-gss-eap 0.9.2-3+deb8u1 (universe) from vivid to
trusty, utopic.
Reason for the backport:
I'd like to backport the packages needed for
http://www.project-moonshot.org/ and the JISC Assent service
(http://jisc.ac.uk/assent )
0.9.2-3:
moonshot-gss-eap (0.9.2-3+deb8u1) unstable; urgency=medium
* Incorporate upstream deltas:
- 6dbf073: Allow white space in CA certificates, Closes: #781312
- 90f04c98: Don't shut down openssl on last context deletion,
Closes: #781311
-- Sam Hartman hartm...@debian.org
To test:
Install precise.
On precise, enable multiple architectures (say amd64 and i386)
install libkadm5srv-mit8.
Update your sources.list to trusty, try installing libkadm5srv-mit8.
I'd expect that to fail.
Update your sources.list to also include trusty-proposed.
Upgrade libkadm5srv-mit8;
To test:
Install precise.
On precise, enable multiple architectures (say amd64 and i386)
install libkadm5srv-mit8.
Update your sources.list to trusty, try installing libkadm5srv-mit8.
I'd expect that to fail.
Update your sources.list to also include trusty-proposed.
Upgrade libkadm5srv-mit8;
I enabled proposed, confirmed that as I described in the initial test case
gss-server segfaults with 1.12+dfsg-2ubuntu4. Then I installed
libgssapi-krb5-2 from trusty-proposed. That pulled in most of the other krb5
packages as I'd expect all version 1.12+dfsg-2ubuntu5.
I ran gss-server and it
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Title:
libgssapi-krb5-2: segfault when mechglue loops
I enabled proposed, confirmed that as I described in the initial test case
gss-server segfaults with 1.12+dfsg-2ubuntu4. Then I installed
libgssapi-krb5-2 from trusty-proposed. That pulled in most of the other krb5
packages as I'd expect all version 1.12+dfsg-2ubuntu5.
I ran gss-server and it
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Title:
libgssapi-krb5-2: segfault when mechglue loops endlessly on call
Iain == Iain Lane i...@orangesquash.org.uk writes:
Iain Thanks Sam, I've uploaded krb5. ** Changed in: krb5 (Ubuntu
Iain Trusty) Status: Triaged = In Progress
Hi.
I haven't seen this hit proposed yet.
Is that expected? What is the next step?
--
You received this bug notification
Iain == Iain Lane i...@orangesquash.org.uk writes:
Iain Thanks Sam, I've uploaded krb5. ** Changed in: krb5 (Ubuntu
Iain Trusty) Status: Triaged = In Progress
Hi.
I haven't seen this hit proposed yet.
Is that expected? What is the next step?
--
You received this bug notification
Hi. Here's the rationale behind the krb5-kdc krb5-kadmin-server split.
The krb5-kdc package includes the things you'd need on a traditional slave KDC.
One of the key things about a slave KDC is that the database is read-only.
The slave is not making any changes to the database, locally or
Hi. Here's the rationale behind the krb5-kdc krb5-kadmin-server split.
The krb5-kdc package includes the things you'd need on a traditional slave KDC.
One of the key things about a slave KDC is that the database is read-only.
The slave is not making any changes to the database, locally or
Here's an ubdated debdiff that includes the security update applied to
trusty. I'm still waiting for a sponsor for this.
** Patch removed: debdiff between current trusty and linked branch
Robie == Robie Basak 1347...@bugs.launchpad.net writes:
Robie Thanks Sam. I'm sorry I can't sponsor krb5, only triage the
Robie bug and guide it through to sponsorship. It looks like you
Robie know what you're doing here, so I guess we'll just need to
Robie wait for a sponsor to
Here's an ubdated debdiff that includes the security update applied to
trusty. I'm still waiting for a sponsor for this.
** Patch removed: debdiff between current trusty and linked branch
Robie == Robie Basak 1347...@bugs.launchpad.net writes:
Robie Thanks Sam. I'm sorry I can't sponsor krb5, only triage the
Robie bug and guide it through to sponsorship. It looks like you
Robie know what you're doing here, so I guess we'll just need to
Robie wait for a sponsor to
This is fixed in Debian in 1.12.1+dfsg-87, currently in unstable. The
only change between -6 (utopic) and -7 is the fix to this bug.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
Fix LDAP key data segmentation [CVE-2014-4345]
For principal entries having keys with multiple kvnos (due to use of
-keepold), the LDAP KDB module makes an attempt to store all the keys
having the
*** This bug is a security vulnerability ***
Public security bug reported:
Fix LDAP key data segmentation [CVE-2014-4345]
For principal entries having keys with multiple kvnos (due to use of
-keepold), the LDAP KDB module makes an attempt to store all the keys
having the
This is fixed in Debian in 1.12.1+dfsg-87, currently in unstable. The
only change between -6 (utopic) and -7 is the fix to this bug.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1354714
Title:
to TAILQ macros instead of CIRCLEQ macros,
to work around an issue with certain gcc versions. This is expected to
resolve Ubuntu bug (LP: #1347147).
[ Sam Hartman ]
* Include a quick and dirty patch so we build cleanly with -O3 fixing
incorrect may be uninitialized warnings
I've request a krb5 sync from debian unstable in
https://bugs.launchpad.net/bugs/1352438 that should fix this issue and
include some needed security fixes in utopic.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
to TAILQ macros instead of CIRCLEQ macros,
to work around an issue with certain gcc versions. This is expected to
resolve Ubuntu bug (LP: #1347147).
[ Sam Hartman ]
* Include a quick and dirty patch so we build cleanly with -O3 fixing
incorrect may be uninitialized warnings
I've request a krb5 sync from debian unstable in
https://bugs.launchpad.net/bugs/1352438 that should fix this issue and
include some needed security fixes in utopic.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- In some conditions, propagating a kerberos database to a slave KDC server can
stall.
+ In some conditions, propagating a kerberos database to a slave KDC server or
performing other database operations can stall. As we've investigated the
issue, it looks like a
hi.
If I'm understanding the SRU procedure correctly,
I think we need to get someone to review the referenced bug for
inclusion in trusty.
https://bugs.launchpad.net/gcc/+bug/1347147
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
Sam == Sam Hartman hartm...@debian.org writes:
Sam hi. If I'm understanding the SRU procedure correctly, I think
Sam we need to get someone to review the referenced bug for
Sam inclusion in trusty.
Sorry, launchpad strips more mail headers than I thought it did.
That was sent
debdiff included
** Patch added: debdiff between current trusty and linked branch
https://bugs.launchpad.net/gcc/+bug/1347147/+attachment/4166949/+files/krb5-trusty-stable.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
** Description changed:
- In some conditions, propagating a kerberos database to a slave KDC server can
stall.
+ In some conditions, propagating a kerberos database to a slave KDC server or
performing other database operations can stall. As we've investigated the
issue, it looks like a
hi.
If I'm understanding the SRU procedure correctly,
I think we need to get someone to review the referenced bug for
inclusion in trusty.
https://bugs.launchpad.net/gcc/+bug/1347147
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Sam == Sam Hartman hartm...@debian.org writes:
Sam hi. If I'm understanding the SRU procedure correctly, I think
Sam we need to get someone to review the referenced bug for
Sam inclusion in trusty.
Sorry, launchpad strips more mail headers than I thought it did.
That was sent
debdiff included
** Patch added: debdiff between current trusty and linked branch
https://bugs.launchpad.net/gcc/+bug/1347147/+attachment/4166949/+files/krb5-trusty-stable.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I'm happy to upload a new krb5 to debian so you can sync it if you want
that approach.
I'm also happy if Ubuntu wants to go with a binary rebuild of krb5.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
Please see https://launchpad.net/~hartmans/+archive/ubuntu/krb5 for
trusty packages that should fix the problem.
Can I get confirmation from Tom or someone else that without these
packages trusty fails the reproduce test in comment #1 and with them, it
succeeds the test proposed in comment #1?
I'm sorry, can I get someone to test the packages at
https://launchpad.net/~hartmans/+archive/ubuntu/ubuntu-fixes
not the URI I gave in the previous message.
I pulled the wrong PPA off my home page.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
I'm happy to upload a new krb5 to debian so you can sync it if you want
that approach.
I'm also happy if Ubuntu wants to go with a binary rebuild of krb5.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Please see https://launchpad.net/~hartmans/+archive/ubuntu/krb5 for
trusty packages that should fix the problem.
Can I get confirmation from Tom or someone else that without these
packages trusty fails the reproduce test in comment #1 and with them, it
succeeds the test proposed in comment #1?
I'm sorry, can I get someone to test the packages at
https://launchpad.net/~hartmans/+archive/ubuntu/ubuntu-fixes
not the URI I gave in the previous message.
I pulled the wrong PPA off my home page.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
With the upload of krb5 1.12.1+dfsg-3ubuntu1 to utopic, this is fixed in
utopic. Any additional help I can provide getting this into trusty?
** Changed in: krb5 (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team,
With the upload of krb5 1.12.1+dfsg-3ubuntu1 to utopic, this is fixed in
utopic. Any additional help I can provide getting this into trusty?
** Changed in: krb5 (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Since I'd really like to see the gss infinite loop patch into trusty
I'm going to update the branch for that to also include this fix and
build packages.
Expect a branch link in a few minutes.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
See https://launchpad.net/~hartmans/+archive/ubuntu-fixes packages
building. I had to upload with a different version number on the branch
because that ppa already had a krb5 build.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
Since I'd really like to see the gss infinite loop patch into trusty
I'm going to update the branch for that to also include this fix and
build packages.
Expect a branch link in a few minutes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
See https://launchpad.net/~hartmans/+archive/ubuntu-fixes packages
building. I had to upload with a different version number on the branch
because that ppa already had a krb5 build.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: krb5 (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1332985
Title:
Add the krb5-send-pr command to the ubuntu package
To manage
** Changed in: krb5 (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1332985
Title:
Add the krb5-send-pr command to the ubuntu package
To manage notifications
Public bug reported:
There's a bug fixed in krb5 1.12.1+dfsg-2 (just uploaded to Debian) where if a
gss-api mechanism is dynamically loaded, and that mechanism uses symbols from
libgssapi_krb5, and doesn't provide certain optional entry points added in krb5
1.12, then calling one of those
Marking confirmed because I started tracking this down based on a report
to the Moonshot project from Rhys Smith which ended up being this issue.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
Luke == Luke Howard lu...@padl.com writes:
Luke How about grabbing this commit from browserid: commit
Luke e51f544e6c0b92c88163d1b0f4ae110869abf070 Author: Luke Howard
Luke lu...@padl.com Date: Thu Oct 24 18:10:24 2013 -0700
That's something to consider for the specific case of
I've built the linked branch in ppa:hartmans/ubuntu-fixes for trusty.
With these packages installed and the attached radsec.conf installed as
/usr/local/etc/radsec.conf, then gss-server starts correctly as expected.
Without radsec.conf installed it prints an error about being unable to acquire
Here's the patch from debian krb5 1.12.1+dfsg-2
** Patch added: 0014-Do-not-loop-on-add_cred_from-and-other-new-methods.patch
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1326500/+attachment/4125522/+files/0014-Do-not-loop-on-add_cred_from-and-other-new-methods.patch
--
You received
Marking confirmed because I started tracking this down based on a report
to the Moonshot project from Rhys Smith which ended up being this issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Public bug reported:
There's a bug fixed in krb5 1.12.1+dfsg-2 (just uploaded to Debian) where if a
gss-api mechanism is dynamically loaded, and that mechanism uses symbols from
libgssapi_krb5, and doesn't provide certain optional entry points added in krb5
1.12, then calling one of those
1 - 100 of 236 matches
Mail list logo