Skip Menu |
 

Download (untitled) / with headers
text/plain 2.9KiB
From root@gateway.total-knowledge.com Tue Dec 5 19:34:31 2000
Received: from MIT.EDU (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.69.0.28])
by rt-11.mit.edu (8.9.3/8.9.3) with SMTP id TAA08992
for <bugs@RT-11.MIT.EDU>; Tue, 5 Dec 2000 19:34:30 -0500 (EST)
Received: from bay-29-c-242.sfo.dsl.cerfnet.com by MIT.EDU with SMTP
id AA05854; Tue, 5 Dec 00 19:35:55 EST
Received: (from root@localhost)
by gateway.total-knowledge.com (8.11.0/8.11.0) id eB60YPv11956;
Tue, 5 Dec 2000 16:34:25 -0800
Message-Id: <200012060034.eB60YPv11956@gateway.total-knowledge.com>
Date: Tue, 5 Dec 2000 16:34:25 -0800
From: ilya@theIlya.com
Reply-To: ilya@theIlya.com
To: krb5-bugs@MIT.EDU
Cc:
Subject: kpasswd crashes, when no kpasswd_server is configured
X-Send-Pr-Version: 3.99

Show quoted text
>Number: 904
>Category: krb5-clients
>Synopsis: kpasswd
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: raeburn
>State: analyzed
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Tue Dec 5 19:35:00 EST 2000
>Last-Modified: Fri Sep 14 13:46:25 EDT 2001
>Originator: Ilya Volynets
>Organization:
Total Knowledge

Show quoted text
>Release: krb5-1.2.1
>Environment:

System: Linux gateway 2.2.16 #5 Sun Oct 29 15:56:17 PST 2000 i586 unknown
Architecture: i586

Show quoted text
>Description:
kpasswd core-dumps every time if no kadmin_server line is given.
Show quoted text
>How-To-Repeat:
Here is realms section form my krb5.conf:
[realms]
STUDENTS.TOTAL-KNOWLEDGE.COM = {
kdc = KERBEROS.TOTAL-KNOWLEDGE.COM
kdc = KERBEROS3.TOTAL-KNOWLEDGE.COM
admin_server = KERBEROS.TOTAL-KNOWLEDGE.COM
default_domain = TOTAL-KNOWLEDGE.COM
}

Show quoted text
>Fix:
Add kadmin_server line to krb5.conf. Here is fixed realms section:
[realms]
STUDENTS.TOTAL-KNOWLEDGE.COM = {
kdc = KERBEROS.TOTAL-KNOWLEDGE.COM
kdc = KERBEROS3.TOTAL-KNOWLEDGE.COM
kpasswd_server = KERBEROS.TOTAL-KNOWLEDGE.COM
admin_server = KERBEROS.TOTAL-KNOWLEDGE.COM
}

Show quoted text
>Audit-Trail:

State-Changed-From-To: open-analyzed
State-Changed-By: raeburn
State-Changed-When: Thu Feb 1 22:32:20 2001
State-Changed-Why:

This problem resulted from a bug in using a pointer with multiple
levels of indirection. The bug was somewhat understandable given that
the routine assigning the pointer value has a somewhat broken API, and
the means of falling back to use admin_server when kpasswd_server
isn't specified is also broken, resulting in the same server being
listed twice.

The 1.2.2 release coming soon (and the snapshots available from the
MIT site) will include a simple fix, already checked in. The 1.3
release will contain a more proper fix for the underlying internal API
problem.

Thanks for reporting the problem.

Responsible-Changed-From-To: krb5-unassigned->raeburn
Responsible-Changed-By: raeburn
Responsible-Changed-When: Thu Feb 1 22:39:11 2001
Responsible-Changed-Why:

Mine to continue fixing for 1.3.

Show quoted text
>Unformatted:
To: rt-comment@krbdev.mit.edu
Subject: [krbdev.mit.edu #904] kpasswd core dumps with no admin server
Date: Wed, 13 Nov 2002 07:42:48 -0500 (EST)
From: hartmans@mit.edu (Sam Hartman)
RT-Send-Cc:

Ken, are we still trying to fix the API for this for 1.3?

Would you mind documenting what you know about the problem and fix if
not?


Thanks,

--Sam