I wanted to agree with Ara that this bug IS still a problem on a fully
updated Intrepid system. Not much has been installed. This is
important to us because it is causing problem with some of our sysadmin
scripts that check the exit code of passwd. Here are details - I have
tested this on two di
On Thu, Nov 27, 2008 at 07:48:52PM -, pescio wrote:
> # here are the per-package modules (the "Primary" block)
> password [success=2 default=ignore] pam_lwidentity.so
> password [success=1 default=ignore] pam_unix.so obscure use_authtok
> try_first_pass sha512
Ok, that's
here it is,
$ cat /etc/pam.d/common-password
#
# /etc/pam.d/common-password - password-related modules common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of modules that define the services to be
# used to change user passwords
pescio, please post the contents of your /etc/pam.d/common-password
config.
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bug
hi,
I've got a simlar problem: I cannot change my password anymore!!
[EMAIL PROTECTED]:~# passwd
passwd: password updated successfully
[EMAIL PROTECTED]:~#
it does not even ask the current passwd. The same happens for the user, except
that it asks for current passwd and when entered it just e
On Wed, Oct 29, 2008 at 03:02:12AM -, wire_transfer wrote:
> $ egrep -v '#|^$' /etc/pam.d/common-password # removing '#' and empty
> lines
> password [success=1 default=ignore] pam_unix.so obscure sha512
> password requisite pam_deny.so
> password
I still see this on my updated Intrepid system (dist-upgraded from edgy to
hardy to intrepid), i.e.:
"Sorry, passwords do not match
passwd: password updated successfully"
Longer session with initial warning for password 'too simple':
ubuntu:~$ passwd
Changing password for sysuser.
(current) UNI
I am not able to reproduce this using "sudo passwd" or simply "passwd"
on an up-to-date Intrepid system.
:-Dustin
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which i
# here are the per-package modules (the "Primary" block)
password[success=1 default=ignore] pam_unix.so obscure sha512
# here's the fallback if no module succeeds
passwordrequisite pam_deny.so
# prime the stack with a positive return value if there isn't o
On Tue, Oct 21, 2008 at 01:03:44PM -, Ara Pulido wrote:
> No luck... Anything else?
Please post the contents of /etc/pam.d/common-password on this system.
--
Steve Langasek Give me a lever long enough and a Free OS
Debian Developer to set it on, and I can
Yes it is:
[EMAIL PROTECTED]:~$ sudo apt-get upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
[EMAIL PROTECTED]:~$ sudo passwd
Enter new UNIX password:
Retype new UNIX password:
I cannot reproduce this problem:
[EMAIL PROTECTED]:~$ passwd
Changing password for kirkland.
(current) UNIX password:
Enter new UNIX password:
Retype new UNIX password:
Sorry, passwords do not match
passwd: Authentication information cannot be recovered
passwd: password unchanged
[EMAIL PROTECTED]
No luck... Anything else?
[EMAIL PROTECTED]:~$ apt-cache policy libecryptfs0
libecryptfs0:
Installed: 53-1ubuntu10
Candidate: 53-1ubuntu10
Version table:
*** 53-1ubuntu10 0
500 http://es.archive.ubuntu.com intrepid/main Packages
100 /var/lib/dpkg/status
[EMAIL PROTECTED]:~$
On Mon, Oct 20, 2008 at 6:28 PM, Ara Pulido <[EMAIL PROTECTED]> wrote:
> Updating this package didn't solve the wrong success problem:
>
> [EMAIL PROTECTED]:~$ apt-cache policy ecryptfs-utils
> ecryptfs-utils:
> Installed: 53-1ubuntu10
You need to upgrade libecryptfs0 to at least 53-1ubuntu10.
Updating this package didn't solve the wrong success problem:
[EMAIL PROTECTED]:~$ apt-cache policy ecryptfs-utils
ecryptfs-utils:
Installed: 53-1ubuntu10
Candidate: 53-1ubuntu10
Version table:
*** 53-1ubuntu10 0
500 http://es.archive.ubuntu.com intrepid/main Packages
100 /v
This bug was fixed in the package ecryptfs-utils - 53-1ubuntu10
---
ecryptfs-utils (53-1ubuntu10) intrepid; urgency=low
[Dustin Kirkland]
* debian/patches/45-mount_private_counter.dpatch: implement a counter to
track mounts/unmounts of the private directory; unmount if the
Sponsored, waiting for release team approval. Thanks, Dustin!
** Changed in: ecryptfs-utils (Ubuntu Intrepid)
Status: In Progress => Fix Committed
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because
One more update to the patch. The last uploaded patch dropped the
manpage updates.
This update simply adds those back.
Requesting sponsorship.
:-Dustin
** Attachment added: "ecryptfs-utils.272232c.debdiff"
http://launchpadlibrarian.net/18696048/ecryptfs-utils.272232c.debdiff
--
passwd - p
I have mentioned bug #283477 in error at least 3 times in this bug
report. Too much copy and paste. Sorry.
The attached patch fixes bugs #272232 and bug #259293.
* passwd - passwords do not match but updated successfull
* Ecryptfs Private Directory Randomly Unmounts
:-Dustin
--
passwd - pas
I have updated the patch based on a security review of the code for bug
#283477 by Jamie Strandboge.
The attached patch includes fixes for bug #272232, as well as bug
#283477.
I have uploaded a package for testing in my PPA. I'm satisfied with my
testing of both patches. I will be committing bo
** Changed in: ecryptfs-utils (Ubuntu Intrepid)
Importance: Medium => High
Assignee: (unassigned) => Dustin Kirkland (kirkland)
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of
Steve-
Your patch fixes at least one of the problems (given two non-matching
passwords).
It still has the same problem if you a) enter an empty password 6 times,
or b) enter a "too simple" password 6 times in a row.
Per discussion in IRC, I added an additional check to ensure that the
new_passwo
Here's an updated patch for the ecryptfs part of this.
As discussed on IRC, fixing this to not give problems on /any/ stack
requires very subtle libpam surgery indeed, not appropriate for
intrepid; but this patch brings pam_ecryptfs in line with what other
modules do, and fixes the problem for me.
Steve-
Actually, I'm not so sure about pointing the finger entirely at
pam_ecryptfs.
I have an up-to-date Intrepid system here, without ecryptfs at all. I run
passwd and give:
current password: (correct password)
new password 1: foo
new password 2: bar
And it prints:
Sorry, passwords do no
** Changed in: ecryptfs-utils (Ubuntu Intrepid)
Status: Triaged => In Progress
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
Whoops - tested that patch out, it doesn't work. We need to return an
actual failure here in order to let the stack DTRT, instead of returning
PAM_SUCCESS or PAM_IGNORE. This revision of the patch does that.
It still doesn't work in my tests, though; still trying to sort out why
that is...
** A
proposed patch for ecryptfs-utils; Dustin, please review.
** Attachment added: "ecryptfs-utils-272232.debdiff"
http://launchpadlibrarian.net/18597858/ecryptfs-utils-272232.debdiff
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received t
Having looked at the code, I think the ecryptfs-utils case is an
ecryptfs-utils bug and not a pam bug. The relevant code in pam_ecryptfs
is:
if (!old_passphrase || !new_passphrase) {
syslog(LOG_WARNING, "eCryptfs PAM passphrase change module "
"retri
** Also affects: ecryptfs-utils (Ubuntu)
Importance: Undecided
Status: New
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
u
This bug was fixed in the package pam - 1.0.1-4ubuntu5
---
pam (1.0.1-4ubuntu5) intrepid; urgency=low
* debian/libpam0g.postinst: change 'cupsys' to 'cups' in the list of
default desktop services that are ignored in deciding whether to prompt
for service restarts on upgrade.
** Changed in: pam (Ubuntu Intrepid)
Status: Triaged => In Progress
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
Aah...
Okay, so I can now characterize the problem better, and how to
reproduce...
On a system using an encrypted private, `mount | grep Private` to check:
1) invoke passwd
2) enter the "correct" current password
3) enter an invalid new password (such as something too simple) 6 times
Not a bug in shadow at all; this is entirely a pam problem, related to
the pam-auth-update changes to the default PAM stack. I'm working
through this today to fix up the stack semantics.
** Changed in: shadow (Ubuntu Intrepid)
Status: New => Invalid
** Changed in: pam (Ubuntu Intrepid)
My apologies
Please disregard my last message. This bug is still very important, but
I was completely mistaken.
pam_ecryptfs will NOT re-wrap the passphrase if the operation actually
fails (regardless of the success message). Whew.
I stepped this bug back down to Confirmed/High.
:-Dustin
I'm stepping this bug up to critical, and milestoning it against
Intrepid release. I spoke with slangasek and he's going to work on it.
This is currently affecting pam_ecryptfs.
If the user is using an encrypted private directory, and tries to change
their password with passwd, the password chan
That seems to have fixed it. I changed that entry in /etc/pam.d/common-
password like this:
#password [success=1 default=ignore] pam_unix.so obscure sha512
passwordrequiredpam_unix.so obscure sha512
And now it throws out a better error message for both
This looks like a PAM configuration bug.
When pam_unix fails, the error is (willingly) ignored.
One temporary solution to fix this could be to change the line:
password [success=1 default=ignore] pam_unix.so obscure sha512
to
password required pam_unix.so obscure sha512
** Changed in: pa
Reproducible on Intrepid.
** Changed in: shadow (Ubuntu)
Status: New => Confirmed
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I haven't made any changes after installing the Alpha6 besides running
the Update Manager and installing Samba. Here's the contents of common-
password:
[EMAIL PROTECTED]:/$ cat /etc/pam.d/common-password
#
# /etc/pam.d/common-password - password-related modules common to all services
#
# This f
Thanks.
And what about the content of /etc/pam.d/common-password ?
Did you make any change to PAM configuration?
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which i
[EMAIL PROTECTED]:/$ ls -l /etc/pam.d/
total 80
-rw-r--r-- 1 root root 182 2008-07-10 10:01 atd
-rw-r--r-- 1 root root 384 2008-06-09 13:02 chfn
-rw-r--r-- 1 root root 581 2008-06-09 13:02 chsh
-rw-r--r-- 1 root root 1186 2008-09-18 12:18 common-account
-rw-r--r-- 1 root root 1221 2008-09-18 12:
I cannot reproduce it here (on Debian).
Can you provide your /etc/pam.d/passwd ?
(and files included from there)
--
passwd - passwords do not match but updated successfully
https://bugs.launchpad.net/bugs/272232
You received this bug notification because you are a member of Ubuntu
Bugs, which is
42 matches
Mail list logo