Package: libpam-krb5
Version: 3.15-1
Severity: important

Changing password (through chpasswd) is broken with libpam-krb5 3.15-1:

# echo "root:foobar2009" | chpasswd
chpasswd: (user root) pam_chauthtok() failed, error:
Authentication token manipulation error
chpasswd: (line 1, user root) password not changed
# dpkg --list libpam\* | grep '^ii'
ii  libpam-chroot                            0.9-3                        
Chroot Pluggable Authentication Module for PAM
ii  libpam-devperm                           1.6-1                        PAM 
module to change device ownership on login
ii  libpam-dotfile                           0.7-4                        A PAM 
module which allows users to have more t
ii  libpam-krb5                              3.15-1                       PAM 
module for MIT Kerberos
ii  libpam-modules                           1.1.0-3                      
Pluggable Authentication Modules for PAM
ii  libpam-ncp                               2.2.6-6                      PAM 
module allowing authentication from a NetW
ii  libpam-runtime                           1.1.0-3                      
Runtime support for the PAM library
ii  libpam-smbpass                           2:3.4.0-4                    
pluggable authentication module for Samba
ii  libpam-ssh                               1.92-8                       
Single sign-on via private SSH key
ii  libpam-thinkfinger                       0.3-2                        PAM 
module for the STMicroelectronics fingerpr
ii  libpam-tmpdir                            0.08-1                       
automatic per-user temporary directories
ii  libpam-usb                               0.4.2-1                      PAM 
module for authentication with removable U
ii  libpam0g                                 1.1.0-3                      
Pluggable Authentication Modules library

When removing libpam-krb5 it works:

# apt-get --purge remove libpam-krb5
[...]
# echo "root:foobar2009" | chpasswd
#

Config *before* removing libpam-krb5:

,---- [ cat /etc/pam.d/passwd /etc/pam.d/common-passwd ]
| #
| # The PAM configuration file for the Shadow `passwd' service
| #
|
| @include common-password
|
| #
| # /etc/pam.d/common-password - password-related modules common to all services
| #
| # This file is included from other service-specific PAM config files,
| # and should contain a list of modules that define the services to be
| # used to change user passwords.  The default is pam_unix.
|
| # Explanation of pam_unix options:
| #
| # The "sha512" option enables salted SHA512 passwords.  Without this option,
| # the default is Unix crypt.  Prior releases used the option "md5".
| #
| # The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
| # login.defs.
| #
| # See the pam_unix manpage for other options.
|
| # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
| # To take advantage of this, it is recommended that you configure any
| # local modules either before or after the default block, and use
| # pam-auth-update to manage selection of other modules.  See
| # pam-auth-update(8) for details.
|
| # here are the per-package modules (the "Primary" block)
| password        requisite                       pam_krb5.so minimum_uid=1000
| password        [success=1 default=ignore]      pam_unix.so obscure 
use_authtok try_first_pass sha512
| # here's the fallback if no module succeeds
| password        requisite                       pam_deny.so
| # prime the stack with a positive return value if there isn't one already;
| # this avoids us returning an error just because nothing sets a success code
| # since the modules above will each just jump around
| password        required                        pam_permit.so
| # and here are more per-package modules (the "Additional" block)
| password        optional                        pam_smbpass.so nullok 
use_authtok use_first_pass
| password        optional        pam_ecryptfs.so
| # end of pam-auth-update config
`----

Config *after* removing libpam-krb5:

,---- [ cat /etc/pam.d/passwd /etc/pam.d/common-passwd ]
| # The PAM configuration file for the Shadow `passwd' service
| #
|
| @include common-password
|
| #
| # /etc/pam.d/common-password - password-related modules common to all services
| #
| # This file is included from other service-specific PAM config files,
| # and should contain a list of modules that define the services to be
| # used to change user passwords.  The default is pam_unix.
|
| # Explanation of pam_unix options:
| #
| # The "sha512" option enables salted SHA512 passwords.  Without this option,
| # the default is Unix crypt.  Prior releases used the option "md5".
| #
| # The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
| # login.defs.
| #
| # See the pam_unix manpage for other options.
|
| # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
| # To take advantage of this, it is recommended that you configure any
| # local modules either before or after the default block, and use
| # pam-auth-update to manage selection of other modules.  See
| # pam-auth-update(8) for details.
|
| # here are the per-package modules (the "Primary" block)
| password        [success=1 default=ignore]      pam_unix.so obscure sha512
| # here's the fallback if no module succeeds
| password        requisite                       pam_deny.so
| # prime the stack with a positive return value if there isn't one already;
| # this avoids us returning an error just because nothing sets a success code
| # since the modules above will each just jump around
| password        required                        pam_permit.so
| # and here are more per-package modules (the "Additional" block)
| password        optional                        pam_smbpass.so nullok 
use_authtok use_first_pass
| password        optional        pam_ecryptfs.so
| # end of pam-auth-update config
`----

This is a plain and fresh Debian system (to be more precise: grml
live system, deployed via FAI), I can easily reproduce this issue
and if it helps could provide you an affected live system/ISO as
well.

thx && regards,
-mika-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to