Debian Bug report logs -
#482553
ldm: password change doesn't work
Reported by: "John S. Skogtvedt" <jss@bzz.no>
Date: Fri, 23 May 2008 13:57:01 UTC
Severity: normal
Found in versions 2:2.0.3-1~40.etch.0, ldm/2:2.0.5-1
Fixed in version ldm/2:2.0.9-1
Done: Vagrant Cascadian <vagrant@freegeek.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>:
Bug#482553; Package ldm.
(full text, mbox, link).
Acknowledgement sent to "John S. Skogtvedt" <jss@bzz.no>:
New Bug report received and forwarded. Copy sent to LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: ldm
Version: 2:2.0.3-1~40.etch.0
Severity: normal
When trying to log in as a user with an expired password,
I experienced the following problems:
1) ldm first prompted for new password, and then prompted again (to confirm).
After that it got stuck - I could enter text, but nothing happened.
2) ldm doesn't check if the new password is equal to the old password.
If it is, then the password won't be succesfully changed.
3) (with 1 and 2 fixed) ldm incorrectly zeros the password,
so that the user has to enter the new password again to log in after
a password change.
I have attached a patch which should fix these problems.
Steps to reproduce:
1) Expire a users password on the server.
2) Attempt to log in as the user with ldm.
-- System Information:
Debian Release: 4.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-486
Locale: LANG=nb_NO.UTF-8, LC_CTYPE=nb_NO.UTF-8 (charmap=UTF-8)
Versions of packages ldm depends on:
ii gtk2-engines [gtk2-eng 1:2.8.2-1 theme engines for GTK+ 2.x
ii gtk2-engines-clearlook 1:2.8.2-1 Clearlooks GTK+ 2.x engine and the
ii libatk1.0-0 1.12.4-3 The ATK accessibility toolkit
ii libc6 2.3.6.ds1-13etch5 GNU C Library: Shared libraries
ii libcairo2 1.2.4-4.1+etch1 The Cairo 2D vector graphics libra
ii libfontconfig1 2.4.2-1.2 generic font configuration library
ii libglib2.0-0 2.12.4-2 The GLib library of C routines
ii libgtk2.0-0 2.8.20-7 The GTK+ graphical user interface
ii libpango1.0-0 1.14.8-5 Layout and rendering of internatio
ii libx11-6 2:1.0.3-7 X11 client-side library
ii libxcursor1 1.1.7-4 X cursor management library
ii libxext6 1:1.0.1-2 X11 miscellaneous extension librar
ii libxfixes3 1:4.0.1-5 X11 miscellaneous 'fixes' extensio
ii libxi6 1:1.0.1-4 X11 Input extension library
ii libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library
ii libxrandr2 2:1.1.0.2-5 X11 RandR extension library
ii libxrender1 1:0.9.1-3 X Rendering Extension client libra
ii openssh-client 1:4.3p2-9etch2 Secure shell client, an rlogin/rsh
ii xserver-xorg 1:7.1.0-19 the X.Org X server
ii xserver-xorg-core [xse 2:1.1.1-21etch4 X.Org X server -- core server
Versions of packages ldm recommends:
ii netcat 1.10-32 TCP/IP swiss army knife
-- no debconf information
[ldm-2.0.3-pwchange.diff (text/x-c, attachment)]
Information forwarded to debian-bugs-dist@lists.debian.org, LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>:
Bug#482553; Package ldm.
(full text, mbox, link).
Acknowledgement sent to Vagrant Cascadian <vagrant@freegeek.org>:
Extra info received and forwarded to list. Copy sent to LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>.
(full text, mbox, link).
Message #10 received at 482553@bugs.debian.org (full text, mbox, reply):
found 482553 2:2.0.5-1
thanks
On Fri, May 23, 2008 at 03:59:18PM +0200, John S. Skogtvedt wrote:
> When trying to log in as a user with an expired password,
> I experienced the following problems:
>
> 1) ldm first prompted for new password, and then prompted again (to confirm).
> After that it got stuck - I could enter text, but nothing happened.
> 2) ldm doesn't check if the new password is equal to the old password.
> If it is, then the password won't be succesfully changed.
> 3) (with 1 and 2 fixed) ldm incorrectly zeros the password,
> so that the user has to enter the new password again to log in after
> a password change.
>
> I have attached a patch which should fix these problems.
thanks for the patch, i tested it and it seems to address the issues
mentioned.
unfortunately additional checks, possibly not present on etch, also
cause it to hang at the verifying password phase. two that i found were
if the password is too similar to the previous password or if the
password is too short- these are likely common issues as well. i suspect
there are more.
the good news is that this part of ldm is currently being discussed by
ltsp developers, as it's totally broken for opensuse and gentoo's
password expiry, as they have totally different text.
live well,
vagrant
Bug marked as found in version 2:2.0.5-1.
Request was from Vagrant Cascadian <vagrant@freegeek.org>
to control@bugs.debian.org.
(Fri, 30 May 2008 06:24:18 GMT) (full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>:
Bug#482553; Package ldm.
(full text, mbox, link).
Acknowledgement sent to Vagrant Cascadian <vagrant@freegeek.org>:
Extra info received and forwarded to list. Copy sent to LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>.
(full text, mbox, link).
Message #17 received at 482553@bugs.debian.org (full text, mbox, reply):
On Fri, May 23, 2008 at 03:59:18PM +0200, John S. Skogtvedt wrote:
> When trying to log in as a user with an expired password,
> I experienced the following problems:
...snip...
> I have attached a patch which should fix these problems.
applied your patch to the version just uploaded to unstable, even though
there are still likely cases where it will hang. i didn't close the bug
since there are outstanding issues.
i am curious if this line is a good idea, though:
@@ -256,7 +261,6 @@
seen = expect(fd, 30.0, "updated successfully", NULL);
if (seen == 1) {
- bzero(ldminfo.password, sizeof ldminfo.password);
return 2;
}
by removing that line, is it leaving the password sitting in memory?
live well,
vagrant
Information forwarded to debian-bugs-dist@lists.debian.org, LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>:
Bug#482553; Package ldm.
(full text, mbox, link).
Acknowledgement sent to "John S. Skogtvedt" <jss2k2@getmail.no>:
Extra info received and forwarded to list. Copy sent to LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>.
(full text, mbox, link).
Message #22 received at 482553@bugs.debian.org (full text, mbox, reply):
Vagrant Cascadian skrev:
> On Fri, May 23, 2008 at 03:59:18PM +0200, John S. Skogtvedt wrote:
>> When trying to log in as a user with an expired password,
>> I experienced the following problems:
> ...snip...
>> I have attached a patch which should fix these problems.
>
> applied your patch to the version just uploaded to unstable, even though
> there are still likely cases where it will hang. i didn't close the bug
> since there are outstanding issues.
>
> i am curious if this line is a good idea, though:
>
> @@ -256,7 +261,6 @@
>
> seen = expect(fd, 30.0, "updated successfully", NULL);
> if (seen == 1) {
> - bzero(ldminfo.password, sizeof ldminfo.password);
> return 2;
> }
>
> by removing that line, is it leaving the password sitting in memory?
>
> live well,
> vagrant
>
Zeroing the password there means that the user has to enter the password
a third time to be able to log in (and ldm doesn't give proper feedback).
It shouldn't be a problem, because the password is zeroed in main().
Reply sent to Vagrant Cascadian <vagrant@freegeek.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to "John S. Skogtvedt" <jss@bzz.no>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #27 received at 482553-close@bugs.debian.org (full text, mbox, reply):
Source: ldm
Source-Version: 2:2.0.9-1
We believe that the bug you reported is fixed in the latest version of
ldm, which is due to be installed in the Debian FTP archive:
ldm_2.0.9-1.diff.gz
to pool/main/l/ldm/ldm_2.0.9-1.diff.gz
ldm_2.0.9-1.dsc
to pool/main/l/ldm/ldm_2.0.9-1.dsc
ldm_2.0.9-1_i386.deb
to pool/main/l/ldm/ldm_2.0.9-1_i386.deb
ldm_2.0.9.orig.tar.gz
to pool/main/l/ldm/ldm_2.0.9.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 482553@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Vagrant Cascadian <vagrant@freegeek.org> (supplier of updated ldm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 06 Aug 2008 16:07:50 -0700
Source: ldm
Binary: ldm
Architecture: source i386
Version: 2:2.0.9-1
Distribution: experimental
Urgency: low
Maintainer: LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>
Changed-By: Vagrant Cascadian <vagrant@freegeek.org>
Description:
ldm - LTSP display manager
Closes: 482553 490897
Changes:
ldm (2:2.0.9-1) experimental; urgency=low
.
* new upstream version:
- cleaner handling of ssh interaction:
+ fixes tcsh logins (Closes: #490897)
+ fixes password expiry (Closes: #482553)
* updated standards-version to 3.8.0, no changes needed.
Checksums-Sha1:
cc6c7259d7ad38a3c21de42560805ff17ede54c1 1388 ldm_2.0.9-1.dsc
58d75dc6732365e66516333cbe6299148432357a 367735 ldm_2.0.9.orig.tar.gz
1c06fb57c51ec2fd24a86245ecde3ea7e82ccb03 6556 ldm_2.0.9-1.diff.gz
dd282662216933c810661bc149157deaf257cf83 156146 ldm_2.0.9-1_i386.deb
Checksums-Sha256:
f4e48cf7196b250504d5e90d76ac191afac89a34c34aa3e5461216f8cb60b335 1388 ldm_2.0.9-1.dsc
07b35f596136ff6b6c634d4e4b62b0ede00b6b8018c9f0534c28b9375a614ed3 367735 ldm_2.0.9.orig.tar.gz
1409d6526ee5b29bc8f6aa0d053cb868dcbf948992744db5a4cf4d9b4715d1d3 6556 ldm_2.0.9-1.diff.gz
5cd80f9a1b8deaec79799e0d8517a8fa7cbe7a3e73f78906f1d9f3506af500e8 156146 ldm_2.0.9-1_i386.deb
Files:
f9e949a8e913e861f19dedf3380b4d89 1388 misc extra ldm_2.0.9-1.dsc
1d7e08d6a46b821c0a0be4c777d99678 367735 misc extra ldm_2.0.9.orig.tar.gz
c3df2864dd4525b034c43f109f78b084 6556 misc extra ldm_2.0.9-1.diff.gz
0916ebb571655605e9d0a47a43e4182a 156146 misc extra ldm_2.0.9-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkiaM3wACgkQlPc63BPWGpnj7wCeNXcxzUw0HV0qa0+R0Ctg0JRf
ZpgAniOlAgBLwsfAheDAzkLp3yIgvHbF
=hmr4
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Tue, 26 Jul 2011 07:37:47 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sat Jul 1 13:34:49 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.