Bug#670700: Workaround for 670700

2014-02-27 Thread Andrew Reid
-up script works. You may have to also do "nscd -i passwd" to invalidate the name-service cache of the old entry. -- A. -- Andrew Reid / andrew.ce.r...@gmail.com

Bug#537414: Request -- backport of libhdf5-* 1.8.6 to squeeze

2011-04-05 Thread Andrew Reid
Hi all -- I have just been bitten by this HDF5 default API bug in Debian "squeeze". Juha Jäykkä's work-around solves my immediate problem (thank you!!), but I will be upgrading numerous scientific development systems to Debian "squeeze" in the coming months. I appreciate that the API is

Bug#498213: libmpich1.0gf 1.2.7-8 SIGSEGV bug confirmed, affects 3rd party apps

2010-03-03 Thread Andrew Reid
Hi all -- Just wanted to add my voice to this report. A number of users in my lab here have run into this, the initial symptom was that locally-commpiled versions of the molecular-dynamics code LAMMPS were failing with SEGV when the model systems got beyond a certain size. I conjecture

Bug#465456: closed by Richard A Nelson <[EMAIL PROTECTED]> (Re: Bug#465456: libnss-ldap rejects unexpired certificate as expired)

2008-07-03 Thread Andrew Reid
> From: Richard A Nelson <[EMAIL PROTECTED]> > Subject: Re: Bug#465456: libnss-ldap rejects unexpired certificate as > expired > Date: Thu, 3 Jul 2008 05:05:03 + (UTC) > To: [EMAIL PROTECTED] > > > I've been leaving this open to hopefully help others, but it has been a > while and I'd like t

Bug#465456: libnss-ldap rejects unexpired certificate as expired

2008-02-12 Thread Andrew Reid
On Tue, Feb 12, 2008 at 02:55:32PM -0800, Richard A Nelson wrote: > On Tue, 12 Feb 2008, Andrew Reid wrote: > > >>Since the message deals with the peer certificate, you need > >>to verify not the local cacert certificate - but the LDAP server > >>certificate

Bug#465456: libnss-ldap rejects unexpired certificate as expired

2008-02-12 Thread Andrew Reid
On Tue, Feb 12, 2008 at 02:10:14PM -0800, Richard A Nelson wrote: > On Tue, 12 Feb 2008, Andrew Reid wrote: > > >Package: libnss-ldap > >Version: 258-1b+1 > > This certainly appears to be an OpenSSL issue, not libnss-ldap > > > Running "id " with

Bug#465456: libnss-ldap rejects unexpired certificate as expired

2008-02-12 Thread Andrew Reid
Package: libnss-ldap Version: 258-1b+1 I have a group of hosts which use libnss-ldap for passwd and shadow information, and have recently added a lenny client to the group, which otherwise consists of etch machines. All clients use ldaps/TLS to communicate with the slapd on the server. The

Bug#428732: [krbdev.mit.edu #5593] kadmin crashes during password changes

2007-07-09 Thread Andrew Reid
On Fri, Jul 06, 2007 at 07:53:46PM -0400, Ken Raeburn wrote: > This code path requires that the principal in question have a policy > dictating a minimum time before the password can be changed, and a > password change made before that time has elapsed. (I should've > thought of that given t

Bug#428732: [krbdev.mit.edu #5593] kadmin crashes during password changes

2007-07-09 Thread Andrew Reid
On Fri, Jul 06, 2007 at 07:53:46PM -0400, Ken Raeburn wrote: > This code path requires that the principal in question have a policy > dictating a minimum time before the password can be changed, and a > password change made before that time has elapsed. (I should've > thought of that given t

Bug#428732: Kadmin crash, backtrace

2007-07-06 Thread Andrew Reid
On Thu, Jul 05, 2007 at 03:55:03PM -0700, Russ Allbery wrote: > Andrew Reid <[EMAIL PROTECTED]> writes: > > > I've had a chance to experiment a little more, and it's > > clear that what is crashing the kadmind is a second or > > subsequent kpasswd attemp

Bug#428732: Kadmin crash, additional info

2007-06-14 Thread Andrew Reid
I've had a chance to experiment a little more, and it's clear that what is crashing the kadmind is a second or subsequent kpasswd attempt for a given principal a short time after a (successful) first change. It's as though there's some time window after a kpasswd invocation on a principal dur

Bug#428732: kadmin crashes during password changes

2007-06-13 Thread Andrew Reid
Package: krb5-admin-server Version: 1.4.4-7etch1 Hi all -- I have a distributed system with a few servers and several clients, using Kerboros for user authentication and LDAP for accounts. All servers are Debian "etch", and the clients are a mix of "etch" and "sarge". The problem descr

Bug#107208: xserver-xfree86: [rendition] striped corruption and broken VT switching on Verite 2100/2200 rev 6

2007-04-26 Thread Andrew Reid
-- A. -- Andrew Reid / [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#121819: Comment on ping-based workarounds

2006-07-10 Thread Andrew Reid
I realize this is sort of late-breaking, but I've just run into this bug (and implemented Thomas Hood's suggested work-around). I want to point out that, while Hood's workaround is nicer, it induces a dependency on the "fping" package, which is packaged separately from "ping", and at least i