C de-Avillez [2010-04-30 1:55 -]:
> Ran two sequences, one before and one after aplying the packages in
> -proposed. Both of them are logged in lp:~hggdh2/+junk/uec-
> qa/lucid/proposed/euca-1.6.2-0ubuntu30.1.
>
> No OOM on the after-maintenance run, on a 2,000 instances run. No new
> errors.
I too have run into this issue. 9.10 this was fine, 10.04 mount.cifs
requires the setuid bit before allowing users to do this w/o sudo
privileges. This may be a packaging regression?
--
mount.cifs won't mount shares; set uid bit not set
https://bugs.launchpad.net/bugs/563805
You received this bug
Ran two sequences, one before and one after aplying the packages in
-proposed. Both of them are logged in lp:~hggdh2/+junk/uec-
qa/lucid/proposed/euca-1.6.2-0ubuntu30.1.
No OOM on the after-maintenance run, on a 2,000 instances run. No new
errors. Fix verified.
--
[SRU] [scalability] walrus repo
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/46411331/Dependencies.txt
--
bind9 installation and dnsutils binaries crash due to libdns.so.64
https://bugs.launchpad.net/bugs/571960
You received this bug notification because you are a member of Ubuntu
Server Team, which
Public bug reported:
Binary package hint: bind9
1. Ubuntu version:
Description:Ubuntu 10.04 LTS
Release:10.04
2. Package versions for libdns64, dnsutils and bind9. I'm not sure which is the
real cause of this.
libdns64:
Installed: 1:9.7.0.dfsg.P1-1
Candid
** Package changed: ubuntu => krb5 (Ubuntu)
--
Unable to install any updates after cpu upgrade
https://bugs.launchpad.net/bugs/542373
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.
--
Ubuntu-server-bugs mailing list
Ubu
** Package changed: ubuntu => bacula (Ubuntu)
--
package bacula-director-mysql 5.0.1-1ubuntu1 failed to install/upgrade:
underprocess installerade post-installation-skript gav felkod 1
https://bugs.launchpad.net/bugs/568341
You received this bug notification because you are a member of Ubuntu
Se
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/46390953/Dependencies.txt
** Attachment added: "ProcMaps.txt"
http://launchpadlibrarian.net/46390955/ProcMaps.txt
** Attachment added: "ProcStatus.txt"
http://launchpadlibrarian.net/46390956/ProcStatus.txt
--
doveco
Public bug reported:
the installation of dovecot-postfix inserts '/usr/lib/dovecot/deliver -c
/etc/dovecot/conf.d/dovecot.conf -n -m "${EXTENSION}"' into main.cf of
the postfix config file as the 'mailbox command'. Unfortunately the
config file location that dovecot defaults to is
/etc/dovecot/do
You have been subscribed to a public bug:
Installed a dual core processor on a old emachine managed to fix windows
but I'm not able to install any of the upgrades and I'm unable to close
the window. Have 3.19 version of Ubuntu currently installed.
ProblemType: Package
Architecture: i386
Date: Fri
You have been subscribed to a public bug:
Installed under 10.04
ProblemType: Package
DistroRelease: Ubuntu 10.04
Package: bacula-director-mysql 5.0.1-1ubuntu1
ProcVersionSignature: Ubuntu 2.6.32-21.32-generic 2.6.32.11+drm33.2
Uname: Linux 2.6.32-21-generic i686
Architecture: i386
Date: Thu Apr 2
** Tags added: patch
--
permission denied on /var/run/named/named.stats
https://bugs.launchpad.net/bugs/570936
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in ubuntu.
--
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.u
I agree that it is a partial workaround.. it fixes the Ubuntu/Firefox + apache
combination.
But without changing the same thing for all the IIS servers it would still
render my Ubuntu/Firefox + IIS SSO broken.
Since I only administrate the Linux stuff, and the "other side"
genereally are very
Thanks Mathias for the info. I'll look into becoming a contributor.
I found this how-to that solved my problem:
http://www.howtoforge.com/install-and-configure-openldap-on-ubuntu-karmic-koala
It has step-by-step instructions on how to create an "admin" user with a
password.
--
openldap section
In terms of work arounds, if your KDC is an AD KDc, you can add the
final hostnames as ServicePrincipalName attributes on AD for the account
in question. That should make things work either for a Windows server
or for a 1.7+ MIT server.
If your KDC is Unix you can add principals for the final hos
> "Jesper" == Jesper Krogh writes:
Jesper> Hi Russ. I cannot say anything about what other are
Jesper> Would a patch that makes the behaviour configurable be
Jesper> acceptable?
I think that this patch should be accepted only if upstream is
interested in the patch. Given that u
*** This bug is a duplicate of bug 463684 ***
https://bugs.launchpad.net/bugs/463684
Thanks Phil for the info. I'll look into becoming a contributor, etc.
I found this how-to that solved my problem:
http://www.howtoforge.com/install-and-configure-openldap-on-ubuntu-karmic-koala
Perhaps if
*** This bug is a duplicate of bug 463684 ***
https://bugs.launchpad.net/bugs/463684
Hi atom88,
Publishing documents on a wiki isn't always appropriate. While it may be
easier for people to make corrections, there can also be a negative
impact on quality control. As I am sure you will agree,
Hi Russ.
I cannot say anything about what other are experiencing.. but in our
setup we haven't put the final hostname in the keytab (and neither did
the guys that only cared about MSIE+IIS). And all Ubuntu releases (from
around Dapper) and up and until Lucid has worked for us.
So seen from an Ubu
*** This bug is a duplicate of bug 361754 ***
https://bugs.launchpad.net/bugs/361754
The error "vcpu not ready for apic_round_robin" can also occur if a
guest is timing out for other reasons...like not enough RAM allocated. I
have examples of this occuring on a hardy 8.04 LTS system with KVM
Thierry, any chance of of adding another release note covering the post-
upgrade access permissions problems discussed here and in bug #571752?
Even though they won't cause the upgrade process to abort the way the
ordered_value_sort error does, it still seems pretty significate that
some LDAP clie
Sam Hartman writes:
> Well, everything should work fine if you make your DNS consistent.
> Honestly if I was going to make a behavior change here I'd have Firefox
> call gss_import_name with a name type that does not involve resolution.
The main place where you cannot make DNS consistent is if
Well, everything should work fine if you make your DNS consistent.
Honestly if I was going to make a behavior change here I'd have Firefox
call gss_import_name with a name type that does not involve resolution.
--Sam
--
krb5 prefers the reverse pointer no matter what for locating service ticke
Jesper Krogh writes:
> Never the less it is a change from earlier versions of Ubuntu and a
> change that makes Ubuntu + Firefox work in a different way than MS
> Windows + MSIE (negoiating different tickets), thus breaking Single
> Signon in typical Kerberos enabled environments.. our is a corpor
*** This bug is a duplicate of bug 427842 ***
https://bugs.launchpad.net/bugs/427842
Note that the fix committed as part of bug #427842 only changed the
settings for new installations, while this bug is actually about
permission problems after migrating from an earlier version of the slapd
pac
I have opened Bug #571752 for the issue related to missing ACLs for the
frontend database after upgrading from earlier versions of slapd
(discussed in comments 3 & 12 here).
(Obviously, the discussion related to the issue mentioned in comment 11
here has moved to Bug #571057.)
--
olcAccess are
I was also able to use "ldapmodify" to make the necessary changes:
* shut down slapd, removed the two lines I had added manually, restarted
slapd, and confirmed that the three test searches were not returning any
results
* created the file "frontend_acls.ldif" using the input lines given in
bug #
Based on hints found in the documents mentioned in bug #506317 and other
places, I think the following three commands can be used to confirm that
the permissions are set up correctly to allow various LDAP-related
functionality to work:
Naming context discovery (e.g. "ldapvi --discover"):
ldapsea
** Visibility changed to: Public
--
apache2 crashed with SIGSEGV in zend_hash_graceful_reverse_destroy()
https://bugs.launchpad.net/bugs/571430
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in ubuntu.
--
Ubuntu-server-bugs mail
Hi Sam.
I agree.. the current behaviors seems to be excactly what is in the code
and in the documentation.
Never the less it is a change from earlier versions of Ubuntu and a
change that makes Ubuntu + Firefox work in a different way than MS
Windows + MSIE (negoiating different tickets), thus bre
The Kerberos Consortium has a paper on integrating Kerberos into an
application; see http://www.kerberos.org/software/appskerberos.pdf .
I believe that the lucid behavior is correct according to MIT's
documentation: what should be happening is that
* with rdns=true (default), both forward and rev
On Thu, Apr 29, 2010 at 02:23:51PM -, atom88 wrote:
> Any updates as to when this document might be updated?
>
> I would suggest making these docs. more "wiki-like" Then, volunteers
> who run into the issue and wish to update the docs on their own for the
> benefit of the community may do so
** Changed in: ubuntu-release-notes
Status: Confirmed => Fix Committed
** Changed in: ubuntu-release-notes
Assignee: (unassigned) => Thierry Carrez (ttx)
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (again)
https://bugs.launchpad.net
Public bug reported:
As a result of LP: #427842, the initial configuration created upon installation
of slapd 2.4.21-0ubuntu4 and later will include the following ACLs on the
{-1}frontend database:
olcAccess: to dn.base="" by * read
olcAccess: to dn.base="cn=subschema" by * read
However, wh
On Thu, Apr 29, 2010 at 10:23 AM, atom88 wrote:
> https://help.ubuntu.com/9.04/serverguide/C/openldap-server.html
> This documentation is still outdated when it comes to installing it. The
> script does NOT request a password still?
>
> Any updates as to when this document might be updated?
>
>
I found this comment about why things were changed:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/447099
-- Mathias Gug Tue, 11 Aug 2009 14:48:56 -0400
There isn't a default LDAP directory admin password anymore. Instead the
cn=config tree is accessible when connecting as root using th
https://help.ubuntu.com/9.04/serverguide/C/openldap-server.html
This documentation is still outdated when it comes to installing it. The
script does NOT request a password still?
Any updates as to when this document might be updated?
I would suggest making these docs. more "wiki-like" Then,
*** This bug is a duplicate of bug 463684 ***
https://bugs.launchpad.net/bugs/463684
https://help.ubuntu.com/9.04/serverguide/C/openldap-server.html
This documentation is still outdated when it comes to installing it. The
script does NOT request a password still?
Any updates as to when th
> When you say "still log in as root to fix this", did you have to make
> additional edits after you got slapd running again (as you mentioned in
> your original problem description)? That is, were you locked out just
> because slapd wasn't running, and then back to normal again once you got
> sla
As commented by Nathan on comment 10, should we also remove the
olcAuthzRegexp line mentioning localroot from the
/etc/ldap/slapd.d/cn=config.ldif file ?
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (again)
https://bugs.launchpad.net/bugs/571057
I tried 4->5->your proposed 5.1 and ended up with:
olcDatabase: {0}config
olcAccess: {0}to * by dn.exact=gidNumber=0+uidNumber=0,...
olcAccess: {0}to * by dn.exact=gidNumber=0+uidNumber=0,...
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (agai
** Changed in: libgcrypt11 (Debian)
Status: Unknown => Confirmed
--
NSS using LDAP+SSL breaks setuid applications like su and sudo
https://bugs.launchpad.net/bugs/423252
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libnss-ldap in
On Thu, Apr 29, 2010 at 02:57:36 -, Stephen Warren wrote:
> Re: the mention of symptoms in comment #12 above: My symptom was that I
> could not log in at all, and in existing sessions, sudo wouldn't work
> etc. I store user information in LDAP, with just system users in
> /etc/passwd etc., so l
I think it will not be very easy to integrate virConnectNumOfInterface
function. In fact, this function need libnetcf (a library to manage
network config via XML), and libnetcf compile fine under ubuntu but
libnetcf is created under the fedora network scheme configuration and it
is not compatible w
Yes, it is reproducible.
Preconditions:
* an LVM group named leo02
* PWD were you can write...
The following steps should do it, assuming a LVM group leo02:
sudo lvcreate /dev/leo02 --name kvm-test01 --size 5G
sudo vmbuilder kvm ubuntu --addpkg=openssh-server --addpkg=unattended-upgrades,
--addp
Mathias, Thierry: neither of these scripts appear to clean up the
olcAuthzRegexp:
gidNumber=\[\[:digit:]]\+\\\+uidNumber=0,cn=peercred,cn=external,cn=auth
cn=localroot,cn=config'
line that got added to the ${SLAPD_CONF}/cn=config.ldif file by earlier
upgrades. I believe that as long as that
** Bug watch added: Debian Bug tracker #566351
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566351
** Also affects: libgcrypt11 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566351
Importance: Unknown
Status: Unknown
--
NSS using LDAP+SSL breaks setuid applica
I don't see that this requires any changes to the release notes text,
though.
** Changed in: ubuntu-release-notes
Status: Confirmed => Fix Released
--
NSS using LDAP+SSL breaks setuid applications like su and sudo
https://bugs.launchpad.net/bugs/423252
You received this bug notification b
Correct, `passwd` works with likewise-open on hardy, and fails with winbind on
lucid.
I do not know what the outcome of `passwd` is on hardy without likewise-open,
nor
the outcome of `passwd` on lucid with likewise-open.
I will ask this on the Lucid forum at
http://ubuntuforums.org/showthread.p
This bug was introduced in karmic, so upgrade from karmic to lucid shouldn't be
affected.
But for instance all upgrades from last LTS release (not only Ubuntu Server)
will get affected.
** Changed in: ubuntu-release-notes
Status: Fix Released => Confirmed
--
NSS using LDAP+SSL breaks se
Mathias: your proposed branch does not apply the cleanup if you upgrade
from 0ubuntu5, is it on purpose ?
I propose that instead: lp:~ttx/ubuntu/lucid/openldap/cleanup-olcaccess
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (again)
https://bugs.l
Tried.. had that before.. but doesn't work any more. (and isn't
documented in man krb5.conf either).
--
krb5 prefers the reverse pointer no matter what for locating service tickets.
https://bugs.launchpad.net/bugs/571572
You received this bug notification because you are a member of Ubuntu
Serv
This is a bug in winbind, so assigning to samba package
** Package changed: rhythmbox-ubuntuone-music-store (Ubuntu) => samba
(Ubuntu)
--
rhythmbox crashed with SIGSEGV in _nss_wins_gethostbyname_r()
https://bugs.launchpad.net/bugs/529714
You received this bug notification because you are a memb
You have been subscribed to a public bug:
Binary package hint: rhythmbox
rhythmbox crashes when trying to access the Ubuntu One music store.
ProblemType: Crash
Architecture: i386
Date: Sun Feb 28 16:05:20 2010
DistroRelease: Ubuntu 10.04
EcryptfsInUse: Yes
ExecutablePath: /usr/bin/rhythmbox
Pack
No feedback for half a year, I removed the proposed package.
2010-04-29 09:21:13 INFORemoving candidates:
2010-04-29 09:21:13 INFOipsec-tools 1:0.7-2.1ubuntu1.9.04.2 in jaunty
2010-04-29 09:21:13 INFOipsec-tools 1:0.7-2.1ubuntu1.9.04.2 in jaunty
amd64
2010-04-29 09:21:13 INFO
Anyone who can test the proposed package? If not, the proposed update
will be removed again. Thanks!
--
[SRU]nut init script reports incorrect status
https://bugs.launchpad.net/bugs/416182
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nu
Anyone who can test the proposed package?
--
[Hardy] overzealous masquerading affects vm to vm traffic
https://bugs.launchpad.net/bugs/227837
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in ubuntu.
--
Ubuntu-server-bugs mailin
Anyone who can test the proposed package? If not, the proposed update
will be removed again. Thanks!
--
sybase_* functions missing in php5-sybase for hardy
https://bugs.launchpad.net/bugs/240519
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
So it works with likewise-open on Hardy, and fails with winbind on lucid
? Or did you also successfully use winbind on hardy ?
--
passwd : gives "Authentication token manipulation error"
https://bugs.launchpad.net/bugs/570944
You received this bug notification because you are a member of Ubuntu
S
Updated text with:
== NSS resolution breaks with LDAP over SSL in Ubuntu Server ==
Upgrading systems configured to use LDAP via SSL as the first service in
the NSS stack (in /etc/nsswitch.conf) leads to broken NSS resolution
afterwards such that `setuid` applications like `sudo` would stop
workin
** Branch linked: lp:ubuntu/lucid-proposed/eucalyptus
--
[SRU] [scalability] walrus reports java.lang.OutOfMemoryError: Java heap space
https://bugs.launchpad.net/bugs/565101
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to eucalyptus in ub
** Branch linked: lp:ubuntu/lucid-proposed/eucalyptus
--
[SRU] euca-get-console-output gives first 64k of output, not most recent
https://bugs.launchpad.net/bugs/566793
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to eucalyptus in ubuntu.
** Branch linked: lp:ubuntu/lucid-proposed/eucalyptus
--
[SRU] [scalability] NC does not detach created pthreads in KVM driver
https://bugs.launchpad.net/bugs/567371
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to eucalyptus in ubuntu.
--
Try setting rdns=false in the libdefaults section of krb5.conf.
--
krb5 prefers the reverse pointer no matter what for locating service tickets.
https://bugs.launchpad.net/bugs/571572
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5
Since the problem is in the clientside kerberos libraries it affects all
kerberos enabled stuff.
--
krb5 prefers the reverse pointer no matter what for locating service tickets.
https://bugs.launchpad.net/bugs/571572
You received this bug notification because you are a member of Ubuntu
Server T
Public bug reported:
I'm trying to upgrade workstations to lucid an fails to access our
kerberos enabled websites. It reveals that the krb5 implementation in
lucid now tries to resolve the "reverse dns" and aquire a tikket for
/ instead of /.
The latter behavior is what the MS environment does an
66 matches
Mail list logo