Am 02.11.16 um 13:00 schrieb Alberto Gonzalez Iniesta: > Hi, > > I got this bug report [1] on the Debian BTS a long time ago but I > haven't been able to debug it. Due to its severity it would be nice to > have it fixed for Stretch. Could anyone take a look at it? > > Any suggestions on the best procedure to deal with bugs reported on the > Debian BTS? > I looked at the bug and it seems to boil down to auth-pam in openvpn + ldap pam in the pam leads to many /dev/urandom being since something in that call stack opens /dev/urandom but never closes it.
>From a first glance it looks like problem is not really in OpenVPN itself but rather in the pam libraries/pam ldap libraries. Of course someone could write a workaround to use the new async authentication that is implemented in 2.4 and fork so that the leaking of fds does not burden the main openvpn process. Arne ------------------------------------------------------------------------------ Developer Access Program for Intel Xeon Phi Processors Access to Intel Xeon Phi processor-based developer platforms. With one year of Intel Parallel Studio XE. Training and support from Colfax. Order your platform today. http://sdm.link/xeonphi _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel