Am 02.11.16 um 13:00 schrieb Alberto Gonzalez Iniesta:
> Hi,
>
> I got this bug report [1] on the Debian BTS a long time ago but I
> haven't been able to debug it. Due to its severity it would be nice to
> have it fixed for Stretch. Could anyone take a look at it?
>
> Any suggestions on the best procedure to deal with bugs reported on the
> Debian BTS?
>
I looked at the bug and it seems to boil down to auth-pam in openvpn +
ldap pam in the pam leads to many /dev/urandom being since something in
that call stack opens /dev/urandom but never closes it.

>From a first glance it looks like problem is not really in OpenVPN
itself but rather in the pam libraries/pam ldap libraries.

Of course someone could write a workaround to use the new async
authentication that is implemented in 2.4 and fork so that the leaking
of fds does not burden the main openvpn process.

Arne

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to