Package: sudo
Version: 1.6.8p9-4
Severity: grave
Justification: renders package unusable


After upgrade, sudo fails to authenticate in the same setup where it had
being working before.

sudo logs this to syslog:

Dec 19 11:50:01 localhost sudo:     maxy : pam_authenticate:
Authentication service cannot retrieve authentication info. ; TTY=pts/5
; PWD=/home/maxy ; USER=root ; COMMAND=/usr/bin/aptitude

Doing a downgrade makes it to work again.

I use ldap for authentication. I'm sending the sudo pam config files as an
attachment.

-- System Information:
Debian Release: testing/unstable
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'unstable'), (500, 'testing'), 
(500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=es_AR, LC_CTYPE=es_AR (charmap=ISO-8859-1)

Versions of packages sudo depends on:
ii  libc6                         2.3.5-8.1  GNU C Library: Shared libraries an
ii  libldap2                      2.1.30-12  OpenLDAP libraries
ii  libpam-modules                0.79-3     Pluggable Authentication Modules f
ii  libpam0g                      0.79-3     Pluggable Authentication Modules l

sudo recommends no packages.

-- no debconf information
#
# /etc/pam.d/common-auth - authentication settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the
# traditional Unix authentication mechanisms.
#
auth [success=1 default=ignore] pam_unix.so nullok_secure  
auth required pam_ldap.so use_first_pass
auth required pam_permit.so

#
# /etc/pam.d/common-account - authorization settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authorization modules that define
# the central access policy for use on the system.  The default is to
# only deny service to users whose accounts are expired in /etc/shadow.
#

account [success=1 default=ignore] pam_unix.so
account required pam_ldap.so
account required pam_permit.so

#%PAM-1.0

@include common-auth
@include common-account

No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.371 / Virus Database: 267.14.1/206 - Release Date: 16/12/05

Reply via email to