Most importantly - you are using IPv6...
The whole idea of that request - do not use ipv6 stack (The CISA secure
config states that IPv6 is to be disabled unless it's in use)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
vi /etc/default/grub
GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1"
update-grub
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068729
Title:
pam_radius_auth: Failed to open RADIUS IPv6 socket: Address
is `ip a` output showing only ipv4?
cat /etc/pam.d/sudo
sessionrequired pam_limits.so
sessionrequired pam_env.so readenv=1 user_readenv=0
sessionrequired pam_env.so readenv=1 envfile=/etc/default/locale
user_readenv=0
auth sufficient pam_radius_auth.so
@include common-aut
logs with debug option (auth sufficient pam_radius_auth.so debug):
2024-07-16T01:23:31.004098+10:00 ubuntu sudo: pam_radius_auth: Got user name:
'user'
2024-07-16T01:23:31.006038+10:00 ubuntu sudo: pam_radius_auth: Failed to open
RADIUS IPv6 socket: Address family not supported by protocol
Needless to say that github version (simple exchange of .so) is working
as expected and already 3 months old...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068729
Title:
pam_radius_auth: Failed t
Do we have any progress?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068729
Title:
pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not
supported by protocol
To manage notifi
Public bug reported:
New and fully updated 24.04 LTS with disabled IPv6 (The CISA secure
config states that IPv6 is to be disabled unless it's in use).
lsb_release -rd:
No LSB modules are available.
Description:Ubuntu 24.04 LTS
Release:24.04
apt-cache policy libpam-radius-auth
libpam
Please note that
"git clone https://github.com/FreeRADIUS/pam_radius
cd pam_radius
make deb && dpkg -i ../libpam-radius-auth_2.0.1_amd64.deb"
is working as expected:
2024-06-07T22:45:13.395293+10:00 sydvpn01 sshd[1457]: pam_radius_auth: 2.0.1
DEVELOPER BUILD - (git #d802da75), built on Jun 7 20
** Also affects: libpam-radius-auth (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068729
Title:
pam_radius_auth: Failed to open RADIUS IPv6 sock
Other observation (different config):
vi /etc/pam.d/sshd
auth sufficient pam_radius_auth.so conf=/etc/pam_radius_auth.conf
retry=3 ipv4=yes ipv6=no debug
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.
Hi Lena,
Thank you for looking into the problem.
>I I created a PPA to test that adding this commit fixes the issue here:
>https://launchpad.net/~lvoytek/+archive/ubuntu/libpam-radius-auth-ipv4-6-yes-no
I am afraid that I was misunderstood...
As I wrote, github version is working as expected but
If we set aside the specific terminology for a moment, it appears that the
version of the software available on GitHub is functioning as expected, while
the version available through the “apt” package manager is not.
My recommendation would be to consider updating the “apt” package directly,
wi
While github version is working as expected.
libpam-radius-auth_2.0.1-1ubuntu0.22.04.1~ppa1_amd64.deb version is
giving me:
user@ubuntu:~$ sudo vi /etc/passwd
free(): double free detected in tcache 2
Aborted (core dumped)
Could we please clone all github version not only add-ipv4-and-ipv6-yes-
n
My apologies, is there any possibility that we could rectify this issue?
Thank you for your understanding.
>importing a full new release would not include just bug fixes, but it
may introduce new functionalities and also new bugs!
I would like to kindly point out that the last modification in th
>Does `sudo true` also crash?
sudo true
free(): double free detected in tcache 2
Aborted (core dumped)
>It would be helpful to have a reproducer of this crash from a clean Noble
>system.
It is clean system, built from scratch
>due to the fact that you configured /etc/pam.d/sudo to authenticate
u
>I believe this crash deserves its own separate bug report, and should probably
>be fixed before addressing this particular bug.
how it could be possible unrelated if github version of libpam-radius-auth is
working as expected?
--
You received this bug notification because you are a member of U
16 matches
Mail list logo