On Sat, 11 Jun 2011, Dan White wrote:
Yes, interestingly, this shows up for both failure modes:
Jun 11 15:37:02 sparks-ave ldapwhoami: canonuserfunc error -7
Jun 11 15:37:02 sparks-ave ldapwhoami: _sasl_plugin_load failed on
sasl_canonuser_init for plugin:
On Sat, 11 Jun 2011, Dan White wrote:
Do you have libsasl2-modules-gssapi-mit or libsasl2-modules-gssapi-heimdal
installed, and what version?
ii libsasl2-modules-gssapi-heimdal 2.1.24~rc1.dfsg1+cvs2011-05-23-4
Is your slapd running on a separate host?
No, 'tis using ldapi://
If so, is i
$ ldapwhoami
SASL/GSSAPI authentication started
ldap_sasl_interactive_bind_s: Invalid credentials (49)
additional info: SASL(-13): authentication failure: GSSAPI Failure:
gss_accept_sec_context
$ ldapwhoami
SASL/GSSAPI authentication started
SASL username: cowboy@
SASL SSF: 56
SASL data se
$ ldapwhoami
SASL/GSSAPI authentication started
ldap_sasl_interactive_bind_s: Other (e.g., implementation specific) error (80)
additional info: SASL(-1): generic failure: GSSAPI Error: No
credentials were supplied, or the credentials were unavailable or inaccessible.
(unknown mech-code 0
Indeed, I see this with the Cyrus Heimdal package set as well
$ valgrind ldapwhoami
==31776== Command: ldapwhoami
==31776==
SASL/GSSAPI authentication started
SASL username:
SASL SSF: 56
SASL data security layer installed.
==31776== Invalid write of size 1
==31776==at 0x815F549: ??? (in /usr/
On Tue, 2 Nov 2010, Mario 'BitKoenig' Holbe wrote:
nope, it's not fixed:
$ for i in /var/cache/apt/archives/*_8.14.4-1_*; do dpkg --contents "$i"; done
| grep buildinfo
-rw-r--r-- root/root 2210 2010-11-02 00:46
./usr/share/doc/libmilter1.0.1/buildinfo.gz
-rw-r--r-- root/root 2210 2
On Wed, 29 Sep 2010, Russell Coker wrote:
Package: sendmail
Version: 8.14.3-9.2
Severity: normal
When I try to build the sendmail package I get the following in the config.log
after the build process aborts:
configure:3293: gcc -g -O2 -g -Wall -O2 -fPIC -fstack-protector-all -pie -Wl,-
z,noex
Package: libsasl2-modules-gssapi-heimdal
Version: 2.1.23.dfsg1-5
Severity: grave
Tags: sid
Justification: renders package unusable
/var/log/auth.log is being flooded by these:
Aug 1 00:00:01 sparks-ave svn: unable to dlopen
/usr/lib/sasl2/libgssapiv2.so.2: /usr/lib/libgssapi.so.2: version
`HEIMD
On Mon, 22 Mar 2010, Brian May wrote:
Can you please try the latest version,
libwind0-heimdal_1.4.0~git20100221.dfsg.2-3, which I uploaded
yesterday.
It has the same issue:
2010-03-23T03:14:41 AS-REQ authtime: 2010-03-23T03:14:41 starttime:
unset endtime: 2010-04-06T03:14:40 renew till: 2010-
Well, I should've waited longer ...
While the errors were fully repeatable and consistent on the home realm,
they are indeed happening on the work realm as well - they are just
sporadic.
On the home systems, I had to revert to the testing distro for the
entirety of heimdal.
I'll watch the work
Package: heimdal-kdc
Version: 1.4.0~git20100221.dfsg.2-2
Severity: important
I was about to mark this critical, when I found it only affects one of
my realms - the other seems to work fine ?!?
I have two realm, with similar setups:
*) 32 and 64 bit KDC and clients
*) Data stored i
Package: libdb-dev
Severity: important
Whilst creating a new sendmail package, I pulled in the current
libdb-dev (4.8), and found that the built package is broken - at least
the db related portions.
>> # makemap hash access < access
>> access.db: Invalid type 5 specified
>>
On Thu, 14 Jan 2010, Debian Bug Tracking System wrote:
The LSB header information in the initscript also needs to be changed,
or other things will break like nfs-common:
Required-Start:$portmap $time
--
Rick Nelson
Fatal Error: Found [MS-Windows] System -> Repartitioning Disk for L
Package: rpcbind
Version: 0.2.0-4
Severity: important
nfs-common, ugidd, and likely other scripts have conditional starts of
portmap - to make sure it is running before they start.
the two mentioned will fail (differently) if rpcbind is installed, but
fixing them both is dead-simple ... change t
Package: rwalld
Version: 0.17-6.2
Severity: important
Now that rpcbind is in an actually usable state, could you modify the
dependencies to allow either port mapper ?
Depends: ... portmap | rpcbind ...
Thanks,
-- System Information:
Debian Release: squeeze-sid
APT prefers testing-propo
On Fri, 8 Jan 2010, Debian Bug Tracking System wrote:
Actually, rpcbind does, now have an init script:
Migrating to rpcbind is pretty much required for newer nfs, and for any ipv6
support.
Irregardless of there being an 'actual' Debian migration, there is *NO*
harm in letting *me* pick which m
On Fri, 8 Jan 2010, Debian Bug Tracking System wrote:
Your point about default alternatives is a valid one, and yes, for most
folk, and until this is squared away, my bias would be to put portmap
first, then rpcbind.
I still think supporting both programs is proper.
--
Rick Nelson
If the user
Package: nis
Version: 3.17-31
Severity: important
With Debian's transition from portmap to rpcbind, nis needs to support
either mapper:
Depends: ... rpcbind | portmap ...
-- Package-specific info:
-- System Information:
Debian Release: squeeze-sid
Architecture: i386 (i686)
Kernel: Linux
Package: rstatd
Version: 4.0.1-4
Severity: important
With the Debian move from portmap to rpcbind, rstatd needs to support
either mapper:
Depends: ... rpcbind | portmap ...
-- System Information:
Debian Release: squeeze-sid
Architecture: i386 (i686)
Kernel: Linux 2.6.32-trunk-686 (SMP w/
Package: rusersd
Version: 0.17-7.1
Severity: important
With the Debian move from portmap to rpcbind, rusersd needs to support
either mapper:
Depends: ... rpcbind | portmap ...
-- System Information:
Debian Release: squeeze-sid
APT prefers testing-proposed-updates
APT policy: (500, 'testin
On Tue, 5 Jan 2010, Patrik Schindler wrote:
I'm using Debian Lenny with a self-compiled vanilla sendmail 8.14.3 (not the
lenny-package) with stock libmilter from lenny-sendmail and lenny's
spamass-milter.
I wouldn't mix self-compiled sendmail with a packaged libmilter - that
seems to be askin
Package: libsasl2-modules-gssapi-heimdal
Version: 2.1.23.dfsg1-3
Severity: critical
Justification: breaks unrelated software
My /var/log/auth.log are now (that libpam-heimdal has been upgrade)
filled with this:
05:28:37 ultima-thule slapd[4238]: SASL [conn=7464] Failure: Couldn't
find mec
On Thu, 10 Dec 2009, Brian May wrote:
What do I do about this issue:
On Wed, Dec 09, 2009 at 09:07:45PM +0100, Guido Günther wrote:
$ krb5-auth-dialog -A
krb5-auth-dialog: /usr/lib/libkrb5.so.25: version `HEIMDAL_KRB5_1.0' not found
(required by krb5-auth-dialog)
If I look through the libra
Package: libpam-heimdal
Version: 3.15-2
Severity: critical
Justification: breaks the whole system
After updating to the current Heimdal packages, at the next boot,
everything broke - su, login, cron, etc regressing to the testing
level of heimdal packages makes everything work again.
The mi
severity 558446 normal
thanks,
Well, the real issue was ejabberd, though the error messages are a
concern.
--
Rick Nelson
Checking host system type...
i586-unknown-linux
configure: error: sorry, this is the gnu os, not linux
-- Topic on #Linux
--
To UNSUBSCRIBE, email to deb
severity 558444 normal
thanks,
Well, the errors persist, but the transport does actually work - the
failure was caused by ejabberd
--
Rick Nelson
partycle: I seriously do need a vacation from this package.
I actually had a DREAM about introducing a stupid new bug
into xb
Package: pyaimt
Version: 0.8.0.1-1
Severity: important
[2009-11-28 03:39:56] Traceback (most recent call last):
File "/usr/lib/python2.5/site-packages/twisted/python/log.py", line 84, in
return callWithContext({"system": lp}, func, *args, **kw)
File "/usr/lib/python2.5/site-pac
Package: pymsnt
Version: 0.11.3-4
Severity: important
2009-11-28 22:36:33] Traceback (most recent call last):
File "/usr/lib/python2.5/site-packages/twisted/internet/base.py", line 113
self.runUntilCurrent()
File "/usr/lib/python2.5/site-packages/twisted/internet/base.py", lin
Package: ninja
Version: 0.1.2-4
Severity: important
/etc/init.d/ninja: line 27: escalation: command not found
Simply quoting the DESC= value should solve this
-- System Information:
Debian Release: squeeze/sid
APT prefers testing-proposed-updates
APT policy: (500, 'testing-proposed-updates')
Package: squirrelmail
Version: 2:1.4.20~rc2-1
Severity: important
Tags: patch
The current version completely broke the search function:
ERROR: Bad or malformed request.
Query: FETCH (FLAGS UID RFC822.SIZE INTERNALDATE BODY.PEEK[HEADER.FIELDS
(Date To Cc From Subject X-Prior
On Thu, 29 Oct 2009, Manoj Srivastava wrote:
This maintainer script appears to use read to get information from the
user. Prompting in maintainer scripts must be done by communicating through a
program such as debconf which conforms to the Debian Configuration management
specification, version 2
That would be this section:
sendmail-base.prerm:if [ -x /usr/etc/init.d/sendmail ]; then
sendmail-base.prerm:/usr/etc/init.d/sendmail clean;
Since every other call to /etc/init.d/sendmail is guarded by a test for
invoke-rc.d.
The invoke-rc.d manpage says:
INIT S
On Sat, 10 Oct 2009, Juergen Prenzel wrote:
Package: libpam-ldap
Version: 184-4.2
Severity: important
After migrating from etch to lenny I can no longer use the the stanza
uri ldaps://10.76.195.82
tls_checkpeer yes
tls_cacertfile /etc/ssl/certs/jp09_cert.pem
==
Package: jabberd2
Version: 2.2.8-2+b1
Severity: normal
- 64 bit platform fixes
* Merged a patch for size_t related GSASL crash on 64bit platform.
Fixes Bug #367783
* Implemented component clustering. You may now connect many SM
instances and external components servicing the same domain. The
On Thu, 20 Aug 2009, Kees Cook wrote:
Hello!
Hello, and sorry for the delay in answering
Since sendmail handles untrusted inputs and listens on a network port, I
think it might benefit from having hardening[1] enabled for its build.
The attached patch implements this.
I agree, and in fact,
On Sat, 25 Jul 2009, Jan Christoph Nordholz wrote:
Clearly, the length of the key must also be taken into consideration !
no, this is in fact a safety measure: from the README.direct of autofs v4:
] NOTE: Due to current design limitations, direct maps will take over an
] entire directory hi
Package: libnss-ldapd
Version: 0.6.9
Severity: important
A recent upgrade tried to install this again (I had it on hold, and
forgot to report it - sorry). It happens on most all my boxes, which
isn't surprising since I use cfengine to manage the config files.
Preparing to replace libnss-ldapd 0.
On Fri, 8 May 2009, Javier Kohan wrote:
Package: libmilter1.0.1
Version: 8.14.3-5
Severity: important
Sometimes I get errors like this:
May 8 19:15:16 rama1 kernel: [723703.161848] milter-greylist[4544]: segfault
at 130 ip 7f5d46f67900 sp 44ff10f0 error 4 in
libmilter.so.1.0.1[7f5d46f5c000+
Package: clamav-daemon
Version: 0.95+dfsg-1
Severity: normal
I'm getting the followin on most of my centrally managed machines,
where policy has been that no one can peruse /root and cfengine
enforces that policy (so the bypass below is only temporary).
It seems odd to su (shouldn't that really
On Sun, 15 Mar 2009, Antonio Radici wrote:
Hi Richard,
Hello, and sorry for the delay - I had an unexpected trip
and was out of town for a week :(
any update on testing the new (custom) cfengine2 package
from mentors?
On finally making some headway on my mail backlog, I saw your
prompt (th
Package: pdnsd
Version: 1.2.7-par-1
Severity: important
I had been running pdnsd to quickly fail lookups due to the
work DNS infrastructure completely failing on them (SERVFAIL).
In going through some logs recently, I noticed it was no longer
working... Unfortunately, I can't say when it st
On Mon, 2 Mar 2009, Antonio Radici wrote:
At this point, there is a question for Richard: what I expect from this is a
fully reproducible bug, because the error is always in there, do you
constantly experience this bug or does it appears randomly? If it appears
randomly, with which frequency d
A likely unrelated issue... also on i386 - another machine
routine spews dozens+ lines like this:
*
Main Tree Sched: editfiles pass 3 @ Mon Mar 2 04:11:27 2009
**
Package: libpam-heimdal
Version: 3.10-2.1
Severity: critical
Tags: security
Justification: root security hole
libpam-heimdal needs to be braought upto curent libpam-krb5
I know this was all stalled by the freeze, but 'tis time now
--
On Tue, 17 Feb 2009, Dan Ragle wrote:
Since upgrading to Lenny today, I've been inundated with
logfile messages of this variety:
Feb 16 23:30:41 adam sendmail[25756]: NOQUEUE: Milter (dkim): to error
state
Feb 16 23:30:41 adam sendmail[25756]: NOQUEUE: Milter (dk): to error
state
Feb 16 23:30:4
On Sun, 4 Jan 2009, Daniel Haryo Sugondo wrote:
There should be informatitve messages in /var/log/auth.log, and possibly
/var/log/syslog... I can't be of much use without seeing some of them.
syslog
[snip]
auth.log
[snip]
uhm, neither of the log snips appear to be related to your hangs :(
On Sun, 4 Jan 2009, root wrote:
Package: libnss-ldap
Version: 261-2.1
Severity: critical
Justification: breaks the whole system
You very likely are simply misconfigured, but I'll not yet drop
the severity to a more apropriate value.
The ldap entry on nsswitch.conf for ldap authentication lik
Package: autofs
Version: 4.1.4+debian-2.1
Severity: normal
During the outsourcing of my current job, I've had need to mount a
couple DFS (yes, the archaic DCE/DFS combo) filesystems.
On the AIX boxen, I did this:
1) mkdir /...
2) add a direct mount to /etc/auto_master (indirect doesn't work ?!?)
On Fri, 14 Nov 2008, Jörg Herzinger wrote:
On Sun, Nov 09, 2008 at 06:32:12PM -0800, Richard A Nelson wrote:
start with, then extend this line in /etc/libnss-ldap.conf
nss_initgroups_ignoreusers root,openldap
No change when doing this. I also upgraded all packages to newest
available
On Sun, 9 Nov 2008, Jörg Herzinger wrote:
udev, respectively nss-ldap get loaded before networking is set up. This
results in an incredible slow machine after an horribly long boot process.
I could resolve the problem by setting "bind_policy soft" but still a bunch
of error messages are displaye
On Thu, 30 Oct 2008, Simon Josefsson wrote:
Hi Richard.
Hello
As far as I can tell, we've identified that the problem
isn't in gnutls, so I think this bug can be closed. I propose to close
the bug in two weeks if we don't hear anything. Please review:
http://bugs.debian.org/cgi-bin/bugrep
On Thu, 30 Oct 2008, Debian Bug Tracking System wrote:
reassign 502760 libnss-ldap
Bug#502760: ldapscripts: piuparts test fails: invoke-rc.d: unknown initscript,
/etc/init.d/nscd not found.
Bug reassigned from package `ldapscripts' to `libnss-ldap'.
retitle 502760 libnss-ldap calls nscd init
On Wed, 22 Oct 2008, root wrote:
Package: libnss-ldap
Version: 251-7.5etch1
Followup-For: Bug #387467
tls_cacertfile, tls_cert, tls_key unusable in libnss-ldap.conf !!!
Well that was decidedly unhelpful, void of content
please fix it!
You gave absolutely no error context - did you read th
On Fri, 17 Oct 2008, Frank B. Brokken wrote:
Trusted users specified by either confTRUSTED_USERS or trusted-users file are
apparently not recognized.
I've used
FEATURE(use_ct_file)dnl
with trusted-users containing majordom
as well as
define(`confTRUSTED_USERS',`majordom')
but whenev
On Tue, 14 Oct 2008, Simon Josefsson wrote:
Risking the opportunity to close this bug, could you try whether you can
reproduce the problem using openSSL as well? You need to force it to
send a servername extension:
openssl s_client -connect bluepages.ibm.com:636 -servername foo
# openssl s_c
On Sun, 12 Oct 2008, Simon Josefsson wrote:
I was wrong, it doesn't work like that. GnuTLS doesn't send the
server_name extension by default, the application needs to call
gnutls_server_name_set explicitly to enable it. For gnutls-cli, you can
use --disable-extensions to avoid sending the serv
On Sun, 12 Oct 2008, Simon Josefsson wrote:
gnutls-cli -p 636 bluepages.ibm.com -d 4711 --priority
NORMAL:-VERS-TLS1.1:-VERS-TLS1.0
works
No need to post logs if that works. You may need to transfer some
application data to trigger the record padding problem though, so you
might not see fa
On Sun, 12 Oct 2008, Simon Josefsson wrote:
At least I understand the three _other_ problems reported in this bug
now...
;) Still better off than before
Ok. The random success is interesting.
I thought so as well - I wonder if the server (regional IP - I always
see the same IP due to DNS
On Sat, 11 Oct 2008, Simon Josefsson wrote:
I believe we may be close to understanding this entire bug report now.
Cool ;)
The remaining step is to check whether bluepages.ibm.com exhibits either
one of the two last problems. However, the server isn't accessible on
the Internet. Richard, c
On Thu, 9 Oct 2008, Morten Werner Forsbring wrote:
They are back again (was gone due to change of server for
people.debian.org). Are you able to test this package again now?
cool, downloaded and installed - hopefully there is debugging info
in the package... I'll do some runs and see that hap
Further testing shows this same failure hitting on most of my x86 boxen
I'm not yet sure it is the only one, but is deffinitely common.
--
Rick Nelson
"Linux was made by foreign terrorists to take money from true US companies
like Microsoft." - Some AOL'er.
"To this end we dedicate ourselves..."
I was, fortunately, just prodded about this issue on IRC ;)
The current state (for me), is my amd64 servers (also clients) are
running fine... some of my x86 machines are still experiencing
a plethora of segfaults daily
The private builds you did were gone, so I rebuilt the current
package sa
This is still causing me serious issues -- and it seems to still
be an issue with a Kerberized NFSv4 mount ... and that makes no
sense at all; NFSv4 should only need 2049...
If nothing is going to happen here, what is the proper upstream
channel these days? I know NFS is quite some flux in r
On Sun, 28 Sep 2008, Olaf Schulz wrote:
'id' will hang forever when if not setting sizelimit 2048 in the ldap
server config.
Odd, something is likely amiss in your setup
For the reason behind this behaviour I found that libnss-ldap asked the
ldap server for the whole bunch of passwd and gro
On Tue, 9 Sep 2008, Fabian Rey wrote:
Package: sendmail
Version: 8.13.8-3
Severity: important
missing units
/me hands Fabian a 'femtosecond' and declares this bug closed :)
--
Rick Nelson
We can use symlinks of course... syslogd would be a symlink to syslogp and
ftpd and ircd would be linked
On Sat, 6 Sep 2008, Marco Bertorello wrote:
On lun, 2008-09-01 at 19:20 -0700, Richard A Nelson wrote:
Package: denyhosts
Version: 2.6-4
Severity: important
This was even a fairly short startup...
$ ssh [EMAIL PROTECTED] time /etc/init.d/denyhosts start
/etc/init.d/denyhosts: line 44: kill
On Fri, 5 Sep 2008, Morten Werner Forsbring wrote:
Sure, but not until Tuesday ... the home machines seem to be doing
ok after the last round of updates - and the office is powered down
this 3day weekdend
Hi, have you been able to test the new package on your other machines?
Or any other resu
Package: denyhosts
Version: 2.6-4
Severity: important
This was even a fairly short startup...
$ ssh [EMAIL PROTECTED] time /etc/init.d/denyhosts start
/etc/init.d/denyhosts: line 44: kill: (7511) - No such process
Removing stale PID file /var/run/denyhosts.pid..
Starting DenyHosts: denyhosts.
re
On Fri, 29 Aug 2008, Morten Werner Forsbring wrote:
Hi,
Howdy
I've fetched a patch from upstream which fixes a leaking file
descriptor, can you test the packages on my homepage [1]?
Sure, but not until Tuesday ... the home machines seem to be doing
ok after the last round of updates - and
On Mon, 25 Aug 2008, Morten Werner Forsbring wrote:
Cfengine2 2.2.8-1 was uploaded to unstable a few days ago, are you able
to test this version as well? Upstream claims that they have been
"fixing an important threading error that has become apparent with the
influx of multicore processors".
The Xchat plugin will kill pidgin on any group chat, it fails here for XMPP and
meanwhile (Lotus SameTime).
--
Richard A Nelson (Rick)cowboy@((linux.)?vnet|us).ibm.com
Phone: 1-408-463-5584 Fax: 1-408-463-3873
COBOL Development IBM Silicon Valley Laboratory
http://www.ibm.com
On Wed, 13 Aug 2008, Alberto Gonzalez Iniesta wrote:
On Wed, Aug 13, 2008 at 02:43:28AM +, Richard A Nelson wrote:
Here is the relevant log entries at verbose=9
[snip]
Linux ifconfig failed: could not execute external program
Exiting
Package: openvpn
Version: 2.1~rc9-1
Severity: important
Here is the relevant log entries at verbose=9
MTU DYNAMIC mtu=0, flags=1, 0 -> 166
TLS-Auth MTU parms [ L:1574 D:166 EF:66 EB:0 ET:0 EL:0 ]
MTU DYNAMIC mtu=1450,
Package: heimdal
Version: 1.2.dfsg.1-1
Severity: critical
Justification: breaks unrelated software
After Heimdal 1.1 went in, and libpam-heimdal was compiled against it -
I lost ssh access to local and remote machines due to sshd segfaulting.
The problem was traced down and the culprit was missin
On Thu, 24 Jul 2008, Mike Markley wrote:
On Wed, Jul 23, 2008 at 10:55:03AM -0700, Richard A Nelson <[EMAIL PROTECTED]>
wrote:
Sadly, no - and I think that is to be expected since the DNS request
actually worked - it just got bum data. That sent me back to the fine
manual pages and I
On Tue, 22 Jul 2008, Mike Markley wrote:
On Mon, Jul 21, 2008 at 06:08:53PM -0700, Richard A Nelson <[EMAIL PROTECTED]>
wrote:
Yes, and I'm leaning heavily in that direction - depending upon the
vagaries of MTA queueing/coattailing/pipelining is problematic at best.
This could win
tag 380078 +moreinfo
thanks
Since version 246, a change has been made to libnss_ldap, whose
functions getspnam() and getspnam_r() now return "*" instead
of "x" previously, in the sp_pwdp member of a spwd struct.
Yes, and no... it did change behaviour of passwd entries if the
account does not
On Mon, 21 Jul 2008, Mike Markley wrote:
Could you clarify one thing for me? I'm not sure from your message if
this issue is causing the filter to stop being able to verify OTHER
messages, or if it's just for messages from this domain.
Unfortunately, it depends... If it was direct-to-mx, then
to make... there are also two reflectors that might be of assistance:
[EMAIL PROTECTED]
[EMAIL PROTECTED]
--
Richard A Nelson (Rick)cowboy@((linux.)?vnet|us).ibm.com
Phone: 1-408-463-5584 Fax: 1-408-463-3873
COBOL Development IBM Silicon Valley Laboratory
http:/
Package: dk-filter
Version: 1.0.0.dfsg-1+b1
Severity: normal
Things were running along, and then - all of a sudden, this starts
showing up in syslog (some truncation):
milter-greylist: m6GNdcho021163: skipping greylist because sender DNS
name vger.kernel.org is whitelisted,
([EMAI
Package: dkim-filter
Version: 2.5.5.dfsg-1+b2
Severity: normal
From: Murray S. Kucherawy <[EMAIL PROTECTED]> - 2008-06-11 10:31
A new version of dkim-milter is now available for download from SourceForge.
This is a new release of the filter which adds a number of new features
and fixes a number o
On Tue, 15 Jul 2008, Sam Morris wrote:
Excellent. Looks like it's just choosing a reactor that doesn't work.
IMO this is not particularly severe: the non-default reactors are only
necessary if you plan to support many thousands of concurrent
connections, which will never be very reliable because
On Tue, 15 Jul 2008, Sam Morris wrote:
I also see the problem in #488769, but see this, so far, unreported
issue:
sh-3.2# /etc/init.d/pymsnt start
Starting MSN transport for Jabber: Traceback (most recent call last):
File "/usr/share/pymsnt/PyMSNt.py", line 13, in
import main
File "/us
On Mon, 7 Jul 2008, Petter Reinholdtsen wrote:
It would be very useful for Debian Edu if pam-ldap could use the SRV
records from DNS to locate the server, and thus be able to use the
same configuration setting for both pam and nss.
I note that somewhere, in the chain of bugs you're reported on
On Sat, 5 Jul 2008, Petter Reinholdtsen wrote:
One issue with large scale deployment of Linux is the need to
configure each client. It would be easier if the clients were able to
automatically derive their configuration using network services.
Indeed, and the issue is not limited to just larg
Package: pymsnt
Version: 0.11.3-1.1
Severity: grave
Justification: renders package unusable
I also see the problem in #488769, but see this, so far, unreported
issue:
# /etc/init.d/pymsnt stop
Stopping MSN transport for Jabber: No python found running; none killed.
sh-3.2# cp /dev/null *
sh-3.2#
Package: pyicqt
Version: 0.8b-4
Severity: grave
Justification: renders package unusable
[2008-07-04 21:32:16] Traceback (most recent call last):
File "/usr/lib/python2.5/site-packages/twisted/internet/base.py", line 105
self.runUntilCurrent()
File "/usr/lib/python2.5/site-packa
Package: pyaimt
Version: 0.8a-6
Severity: grave
Justification: renders package unusable
[2008-07-04 21:16:13] Traceback (most recent call last):
File "/usr/lib/python2.5/site-packages/twisted/internet/base.py", line 105
self.runUntilCurrent()
File "/usr/lib/python2.5/site-packa
On Wed, 2 Jul 2008, Thomas Liske wrote:
Update_host() uses the find_host() to do the reverse lookup.
If $(host IP) returns ";; connection timed out; no servers could be
reached" this value is taken as you hostname and your sendmail is broken
if you have dialup.m4 included to your sendmail.mc.
tags 376321 + wontfix
thanks,
Yeah, this'd be nice - along with a working chfn/chsh/etc.
I've not found evidence of either libnss or libpam support that this
could be built on... and if there was to be such support, it would take
co-ordinated effort of lib(nss|pam)-ldap and the passwd/chfn/chsh
do you have any of the ssl options set in the conf file ?
There is an upstream bug about this issue and its not clear what is
going to happen :(
--
Rick Nelson
has /usr/bin/emacs been put into /etc/shells yet? :P
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe"
I've moved from libnss-ldap to libnss-ldapd, and am trying to clean
things up for a hopeful hand-off of the package...
Does this problem still exist in testing/unstable ?
--
Rick Nelson
Winnuke in one line? No problem:
perl -MIO::Socket -e
'IO::Socket::INET->new(PeerAddr=>"bad.dude.com:139")-
On Sat, 28 Jun 2008, Steve Langasek wrote:
Hi Richard,
Hey again, sorry we keep meeting this way
Ok, I'll do some more checking on the systems exhibiting the message and
make sure smtp auth is actually working - and if so, I'll just ignore
the messages.
Were you able to confirm that smtp
On Wed, 25 Jun 2008, Morten Werner Forsbring wrote:
==12662== Invalid read of size 1
==12662==at 0x80778C8: (within /usr/sbin/cfagent)
==12662==by 0x8077A8A: (within /usr/sbin/cfagent)
==12662==by 0x807A48E: (within /usr/sbin/cfagent)
==12662==by 0x8053AC0: (within /usr/sbin/cfag
Package: milter-greylist
Version: 3.0-3+b1
Followup-For: Bug #449557
I was a late, and reluctant, convert - and one thing that made the
switch palatable was the availability of whitelists like dnswl.org.
The idea is that large (and small - heck, even my home domain is listed)
sites can define the
Package: nfs-common
Version: 1:1.1.2-4
Severity: important
In a fit of debugging spurious NFS problems I noticed this:
# ps auxw | grep statd
statd 4136 0.0 0.0 2056 652 ?Ss Jun06 0:00
/sbin/rpc.statd --port 32765 --outgoing-port 32766
# lsof | grep rpc.statd | grep :
rpc.s
Package: squirrelmail
Version: 2:1.4.15-1
Severity: normal
/usr/share/squirrelmail/plugins/fortune/fortune_functions.php
$fortune_location = '/usr/bin/fortune';
That should be /usr/games/fortune
-- System Information:
Debian Release: 4.0
APT prefers testing-proposed-updates
APT policy: (500,
On Fri, 30 May 2008, Steve Langasek wrote:
I have absolutely no clue what caused the triplicate submission
Well, bug #474976 wasn't submitted by you - it was already tagged pending at
the time you submitted your bug...
odd, didn't see it in the reportbug output... sorry
And I'll re-check th
On Thu, 29 May 2008, Steve Langasek wrote:
forcemerge 474976 483631 483633
thanks
WTF !?!?!
On Tue, May 27, 2008 at 03:22:46PM +, Richard A Nelson wrote:
was going to peek at what was new, other than the fixes (some of which
were very important to me - like syncrepl bugs).
Only to
Package: slapd
Version: 2.4.9-1
Severity: normal
was going to peek at what was new, other than the fixes (some of which
were very important to me - like syncrepl bugs).
Only to find that the manpage just isn't there any more :(
-- System Information:
Debian Release: lenny/sid
APT prefers testi
1 - 100 of 306 matches
Mail list logo