Debian Bug report logs -
#825949
pam_systemd(su:session): Cannot create session: Already running in a session
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, sanvila@unex.es, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Tue, 31 May 2016 16:57:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Santiago Vila <sanvila@unex.es>:
New Bug report received and forwarded. Copy sent to sanvila@unex.es, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Tue, 31 May 2016 16:57:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: libpam-systemd,login
Dear maintainers:
Since I upgraded to stretch, logcheck sends me messages like this each
time I do "su -" to become root:
Security Events for su
=-=-=-=-=-=-=-=-=-=-=-
[...] mymachine su[4887]: pam_systemd(su:session): Cannot create session: Already running in a session
Apparently, "su" is doing something which is not necessary, or in a way
which is not optimal for systemd, or maybe pam_systemd is too picky
about what "su" does.
I don't know which of the two packages is to blame for this, so
I'm filing this report against both, libpam-systemd and login,
in the hope that you both can reach to an agreement about that.
If it happens that everything is ok and working as expected, then
it would be nice to have anyway some rule in /etc/logcheck to avoid
the message being considered as a "security event".
Thanks.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Tue, 31 May 2016 17:21:10 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Biebl <biebl@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Tue, 31 May 2016 17:21:10 GMT) (full text, mbox, link).
Message #10 received at 825949@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Am 31.05.2016 um 18:53 schrieb Santiago Vila:
> Package: libpam-systemd,login
>
> Dear maintainers:
>
> Since I upgraded to stretch, logcheck sends me messages like this each
> time I do "su -" to become root:
>
> Security Events for su
> =-=-=-=-=-=-=-=-=-=-=-
> [...] mymachine su[4887]: pam_systemd(su:session): Cannot create session: Already running in a session
>
>
> Apparently, "su" is doing something which is not necessary, or in a way
> which is not optimal for systemd, or maybe pam_systemd is too picky
> about what "su" does.
>
> I don't know which of the two packages is to blame for this, so
> I'm filing this report against both, libpam-systemd and login,
> in the hope that you both can reach to an agreement about that.
>
Which version of login and libpam-systemd?
--
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Tue, 31 May 2016 17:42:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Santiago Vila <sanvila@unex.es>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Tue, 31 May 2016 17:42:04 GMT) (full text, mbox, link).
Message #15 received at 825949@bugs.debian.org (full text, mbox, reply):
On Tue, May 31, 2016 at 07:20:28PM +0200, Michael Biebl wrote:
> Which version of login and libpam-systemd?
Current ones in stretch as of today:
login 1:4.2-3.1
libpam-systemd 230-1
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Sat, 04 Jun 2016 09:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Christian Kastner <ckk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Sat, 04 Jun 2016 09:24:03 GMT) (full text, mbox, link).
Message #20 received at 825949@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Tue, 31 May 2016 18:53:43 +0200 (CEST) Santiago Vila
<sanvila@unex.es> wrote:
> Since I upgraded to stretch, logcheck sends me messages like this each
> time I do "su -" to become root:
>
> Security Events for su
> =-=-=-=-=-=-=-=-=-=-=-
> [...] mymachine su[4887]: pam_systemd(su:session): Cannot create session: Already running in a session
logcheck was reporting the same for me, except s/su/schroot/.
> Apparently, "su" is doing something which is not necessary, or in a way
> which is not optimal for systemd, or maybe pam_systemd is too picky
> about what "su" does.
>
> I don't know which of the two packages is to blame for this, so
> I'm filing this report against both, libpam-systemd and login,
> in the hope that you both can reach to an agreement about that.
I can successfully trace this back to systemd 223-1 (with 222-2,
everything is still fine).
> If it happens that everything is ok and working as expected, then
> it would be nice to have anyway some rule in /etc/logcheck to avoid
> the message being considered as a "security event".
Regards,
Christian
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Tue, 28 Feb 2017 14:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Laurent Bonnaud <L.Bonnaud@laposte.net>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Tue, 28 Feb 2017 14:24:03 GMT) (full text, mbox, link).
Message #25 received at 825949@bugs.debian.org (full text, mbox, reply):
Hi,
the problem is still there in this package version:
Package: libpam-systemd
Version: 232-18
Here is what happens when I su from root to a normal user:
févr. 28 15:01:36 irancy su[7313]: Successful su for bonnaudl by root
févr. 28 15:01:36 irancy su[7313]: + /dev/pts/0 root:bonnaudl
févr. 28 15:01:36 irancy su[7313]: pam_unix(su:session): session opened for user bonnaudl by root(uid=0)
févr. 28 15:01:36 irancy su[7313]: pam_systemd(su:session): Cannot create session: Already running in a session
févr. 28 15:01:39 irancy su[7313]: pam_unix(su:session): session closed for user bonnaudl
If I pile up 2 su (normal user -> root -> normal user), then I get no error message and the creation of a new session:
févr. 28 15:17:23 irancy su[9191]: Successful su for bonnaudl by root
févr. 28 15:17:23 irancy su[9191]: + /dev/pts/2 root:bonnaudl
févr. 28 15:17:23 irancy su[9191]: pam_unix(su:session): session opened for user bonnaudl by bonnaudl(uid=0)
févr. 28 15:17:23 irancy systemd-logind[2859]: Existing logind session ID 50 used by new audit session, ignoring
févr. 28 15:17:23 irancy systemd[1]: Started Session c2 of user bonnaudl.
févr. 28 15:17:23 irancy systemd-logind[2859]: New session c2 of user bonnaudl.
févr. 28 15:17:24 irancy su[9191]: pam_unix(su:session): session closed for user bonnaudl
févr. 28 15:17:24 irancy systemd-logind[2859]: Removed session c2.
--
Laurent.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Wed, 19 Jul 2017 10:09:03 GMT) (full text, mbox, link).
Acknowledgement sent
to IOhannes m zmoelnig <umlaeute@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Wed, 19 Jul 2017 10:09:03 GMT) (full text, mbox, link).
Message #30 received at 825949@bugs.debian.org (full text, mbox, reply):
Package: libpam-systemd
Version: 232-25
Followup-For: Bug #825949
Dear Maintainer,
this is just to confirm that the behaviour is still there, now that stretch has
been released.
-- System Information:
Debian Release: 9.0
Architecture: amd64 (x86_64)
Kernel: Linux 4.9.0-3-amd64 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968), LANGUAGE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages libpam-systemd depends on:
ii dbus 1.10.18-1
ii libc6 2.24-11+deb9u1
ii libpam-runtime 1.1.8-3.6
ii libpam0g 1.1.8-3.6
ii libselinux1 2.6-3+b1
ii systemd 232-25
ii systemd-sysv 232-25
libpam-systemd recommends no packages.
libpam-systemd suggests no packages.
-- debconf-show failed
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Tue, 19 Sep 2017 07:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Thomas D <sdktda@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Tue, 19 Sep 2017 07:39:03 GMT) (full text, mbox, link).
Message #35 received at 825949@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear maintainers,
I can confirm this bug is present in an up-to-date Stretch as of today.
Are there any plans on this being fixed in Stretch?
BR
Thomas
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Tue, 19 Sep 2017 18:27:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Biebl <biebl@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Tue, 19 Sep 2017 18:27:07 GMT) (full text, mbox, link).
Message #40 received at 825949@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Am 19.09.2017 um 09:36 schrieb Thomas D:
> Dear maintainers,
>
> I can confirm this bug is present in an up-to-date Stretch as of today.
> Are there any plans on this being fixed in Stretch?
Not that I'm aware of. Do you want to work on it?
--
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>:
Bug#825949; Package libpam-systemd,login.
(Wed, 20 Sep 2017 07:06:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Thomas D <sdktda@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>, Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>.
(Wed, 20 Sep 2017 07:06:02 GMT) (full text, mbox, link).
Message #45 received at 825949@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
2017-09-19 20:21 GMT+02:00 Michael Biebl <biebl@debian.org>:
> Am 19.09.2017 um 09:36 schrieb Thomas D:
> > Dear maintainers,
> >
> > I can confirm this bug is present in an up-to-date Stretch as of today.
> > Are there any plans on this being fixed in Stretch?
>
> Not that I'm aware of. Do you want to work on it?
>
>
>
I am not sure I have the skills needed to fix this.
I mean, Christian Kastner mentions that it works in systemd 222-2:
> I can successfully trace this back to systemd 223-1 (with 222-2,
> everything is still fine).
So I can do a diff between 222-2 and current systemd. However, if the
change is non-trivial I would probably not be able to fix it.
BR
Thomas
[Message part 2 (text/html, inline)]
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jan 10 12:15:01 2018;
Machine Name:
beach
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.