From root@gateway.total-knowledge.com Tue Dec 5 19:34:31 2000
Received: from MIT.EDU (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.69.0.28])
by rt-11.mit.edu (8.9.3/8.9.3) with SMTP id TAA08992
for <bugs@RT-11.MIT.EDU>; Tue, 5 Dec 2000 19:34:30 -0500 (EST)
Received: from bay-29-c-242.sfo.dsl.cerfnet.com by MIT.EDU with SMTP
id AA05854; Tue, 5 Dec 00 19:35:55 EST
Received: (from root@localhost)
by gateway.total-knowledge.com (8.11.0/8.11.0) id eB60YPv11956;
Tue, 5 Dec 2000 16:34:25 -0800
Message-Id: <200012060034.eB60YPv11956@gateway.total-knowledge.com>
Date: Tue, 5 Dec 2000 16:34:25 -0800
From: ilya@theIlya.com
Reply-To: ilya@theIlya.com
To: krb5-bugs@MIT.EDU
Cc:
Subject: kpasswd crashes, when no kpasswd_server is configured
X-Send-Pr-Version: 3.99
System: Linux gateway 2.2.16 #5 Sun Oct 29 15:56:17 PST 2000 i586 unknown
Architecture: i586
[realms]
STUDENTS.TOTAL-KNOWLEDGE.COM = {
kdc = KERBEROS.TOTAL-KNOWLEDGE.COM
kdc = KERBEROS3.TOTAL-KNOWLEDGE.COM
admin_server = KERBEROS.TOTAL-KNOWLEDGE.COM
default_domain = TOTAL-KNOWLEDGE.COM
}
[realms]
STUDENTS.TOTAL-KNOWLEDGE.COM = {
kdc = KERBEROS.TOTAL-KNOWLEDGE.COM
kdc = KERBEROS3.TOTAL-KNOWLEDGE.COM
kpasswd_server = KERBEROS.TOTAL-KNOWLEDGE.COM
admin_server = KERBEROS.TOTAL-KNOWLEDGE.COM
}
State-Changed-From-To: open-analyzed
State-Changed-By: raeburn
State-Changed-When: Thu Feb 1 22:32:20 2001
State-Changed-Why:
This problem resulted from a bug in using a pointer with multiple
levels of indirection. The bug was somewhat understandable given that
the routine assigning the pointer value has a somewhat broken API, and
the means of falling back to use admin_server when kpasswd_server
isn't specified is also broken, resulting in the same server being
listed twice.
The 1.2.2 release coming soon (and the snapshots available from the
MIT site) will include a simple fix, already checked in. The 1.3
release will contain a more proper fix for the underlying internal API
problem.
Thanks for reporting the problem.
Responsible-Changed-From-To: krb5-unassigned->raeburn
Responsible-Changed-By: raeburn
Responsible-Changed-When: Thu Feb 1 22:39:11 2001
Responsible-Changed-Why:
Mine to continue fixing for 1.3.
Received: from MIT.EDU (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.69.0.28])
by rt-11.mit.edu (8.9.3/8.9.3) with SMTP id TAA08992
for <bugs@RT-11.MIT.EDU>; Tue, 5 Dec 2000 19:34:30 -0500 (EST)
Received: from bay-29-c-242.sfo.dsl.cerfnet.com by MIT.EDU with SMTP
id AA05854; Tue, 5 Dec 00 19:35:55 EST
Received: (from root@localhost)
by gateway.total-knowledge.com (8.11.0/8.11.0) id eB60YPv11956;
Tue, 5 Dec 2000 16:34:25 -0800
Message-Id: <200012060034.eB60YPv11956@gateway.total-knowledge.com>
Date: Tue, 5 Dec 2000 16:34:25 -0800
From: ilya@theIlya.com
Reply-To: ilya@theIlya.com
To: krb5-bugs@MIT.EDU
Cc:
Subject: kpasswd crashes, when no kpasswd_server is configured
X-Send-Pr-Version: 3.99
Show quoted text
>Number: 904
>Category: krb5-clients
>Synopsis: kpasswd
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: raeburn
>State: analyzed
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Tue Dec 5 19:35:00 EST 2000
>Last-Modified: Fri Sep 14 13:46:25 EDT 2001
>Originator: Ilya Volynets
>Organization:
Total Knowledge>Category: krb5-clients
>Synopsis: kpasswd
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: raeburn
>State: analyzed
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Tue Dec 5 19:35:00 EST 2000
>Last-Modified: Fri Sep 14 13:46:25 EDT 2001
>Originator: Ilya Volynets
>Organization:
Show quoted text
>Release: krb5-1.2.1
>Environment:
>Environment:
System: Linux gateway 2.2.16 #5 Sun Oct 29 15:56:17 PST 2000 i586 unknown
Architecture: i586
Show quoted text
>Description:
kpasswd core-dumps every time if no kadmin_server line is given.Show quoted text
>How-To-Repeat:
Here is realms section form my krb5.conf:[realms]
STUDENTS.TOTAL-KNOWLEDGE.COM = {
kdc = KERBEROS.TOTAL-KNOWLEDGE.COM
kdc = KERBEROS3.TOTAL-KNOWLEDGE.COM
admin_server = KERBEROS.TOTAL-KNOWLEDGE.COM
default_domain = TOTAL-KNOWLEDGE.COM
}
Show quoted text
>Fix:
Add kadmin_server line to krb5.conf. Here is fixed realms section:[realms]
STUDENTS.TOTAL-KNOWLEDGE.COM = {
kdc = KERBEROS.TOTAL-KNOWLEDGE.COM
kdc = KERBEROS3.TOTAL-KNOWLEDGE.COM
kpasswd_server = KERBEROS.TOTAL-KNOWLEDGE.COM
admin_server = KERBEROS.TOTAL-KNOWLEDGE.COM
}
Show quoted text
>Audit-Trail:
State-Changed-From-To: open-analyzed
State-Changed-By: raeburn
State-Changed-When: Thu Feb 1 22:32:20 2001
State-Changed-Why:
This problem resulted from a bug in using a pointer with multiple
levels of indirection. The bug was somewhat understandable given that
the routine assigning the pointer value has a somewhat broken API, and
the means of falling back to use admin_server when kpasswd_server
isn't specified is also broken, resulting in the same server being
listed twice.
The 1.2.2 release coming soon (and the snapshots available from the
MIT site) will include a simple fix, already checked in. The 1.3
release will contain a more proper fix for the underlying internal API
problem.
Thanks for reporting the problem.
Responsible-Changed-From-To: krb5-unassigned->raeburn
Responsible-Changed-By: raeburn
Responsible-Changed-When: Thu Feb 1 22:39:11 2001
Responsible-Changed-Why:
Mine to continue fixing for 1.3.
Show quoted text
>Unformatted: