Your message dated Sun, 30 Sep 2007 19:17:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#444740: fixed in libpam-krb5 3.8-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: libpam-krb5
Version: 3.6-1
Severity: serious
Version 3.6-1 of libpam-krb5 prevents login via openssh if the user's password
has expired (i.e. 'REQUIRES_PWCHANGE'). With openssh configured for
ChallengeResponseAuthentication, I get a prompt to set a new password with
libpam-krb5 version 3.5-1, but authentication simply fails with version
3.6-1. I suspect the changes made to address bug #437171 are the cause.
--Mike
-- System Information:
Debian Release: lenny/sid
APT prefers testing
APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.21-2-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)
Shell: /bin/sh linked to /bin/bash
Versions of packages libpam-krb5 depends on:
ii krb5-config 1.17 Configuration files for Kerberos V
ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries
ii libcomerr2 1.40.2-1 common error description library
ii libkrb53 1.6.dfsg.1-7 MIT Kerberos runtime libraries
ii libpam0g 0.99.7.1-4 Pluggable Authentication Modules l
libpam-krb5 recommends no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: libpam-krb5
Source-Version: 3.8-1
We believe that the bug you reported is fixed in the latest version of
libpam-krb5, which is due to be installed in the Debian FTP archive:
libpam-krb5_3.8-1.diff.gz
to pool/main/libp/libpam-krb5/libpam-krb5_3.8-1.diff.gz
libpam-krb5_3.8-1.dsc
to pool/main/libp/libpam-krb5/libpam-krb5_3.8-1.dsc
libpam-krb5_3.8-1_i386.deb
to pool/main/libp/libpam-krb5/libpam-krb5_3.8-1_i386.deb
libpam-krb5_3.8.orig.tar.gz
to pool/main/libp/libpam-krb5/libpam-krb5_3.8.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Russ Allbery <[EMAIL PROTECTED]> (supplier of updated libpam-krb5 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 30 Sep 2007 11:52:41 -0700
Source: libpam-krb5
Binary: libpam-krb5
Architecture: source i386
Version: 3.8-1
Distribution: unstable
Urgency: low
Maintainer: Russ Allbery <[EMAIL PROTECTED]>
Changed-By: Russ Allbery <[EMAIL PROTECTED]>
Description:
libpam-krb5 - PAM module for MIT Kerberos
Closes: 444740
Changes:
libpam-krb5 (3.8-1) unstable; urgency=low
.
* New upstream release.
- Restore prompting for expired passwords. (Closes: #444740)
- Correctly handle a negative minimum UID setting.
Files:
a3500f6c65e695a416b2f92a3602684f 648 net optional libpam-krb5_3.8-1.dsc
2a0574f54acc887f45bf6207291933b2 143250 net optional
libpam-krb5_3.8.orig.tar.gz
9ed4c4e124151fe114bdb708eec45547 10297 net optional libpam-krb5_3.8-1.diff.gz
ebf283611fc8d82b35c1b0147c86b11e 72508 net optional libpam-krb5_3.8-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFG//Mz+YXjQAr8dHYRAr8uAJ9XFK5O4j/R8NaOC0qrvJqIQh54qACgltj0
i90ZSB38Ja05j2cmqRkxXuk=
=5hbH
-----END PGP SIGNATURE-----
--- End Message ---