[Pkg-shadow-devel] Bug#300720: marked as done ([POST-SARGE] Login: Configuration does not load limits.so while others do)

Debian Bug Tracking System owner@bugs.debian.org
Wed, 11 May 2005 11:33:12 -0700


Your message dated Wed, 11 May 2005 14:17:39 -0400
with message-id <E1DVvm7-0000Cr-00@newraff.debian.org>
and subject line Bug#300720: fixed in shadow 1:4.0.3-31sarge4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 21 Mar 2005 12:30:18 +0000
>From jfs@dat.etsit.upm.es Mon Mar 21 04:30:18 2005
Return-path: <jfs@dat.etsit.upm.es>
Received: from tornado.dat.etsit.upm.es (dat.etsit.upm.es) [138.100.17.73] 
	by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
	id 1DDM30-0005U0-00; Mon, 21 Mar 2005 04:30:18 -0800
Received: (qmail 6249 invoked by uid 1013); 21 Mar 2005 12:30:15 -0000
Date: Mon, 21 Mar 2005 13:30:15 +0100
From: Javier =?iso-8859-1?Q?Fern=E1ndez-Sanguino_Pe=F1a?= <jfs@computer.org>
To: submit@bugs.debian.org
Subject: Login: Configuration does not load limits.so while others do
Message-ID: <20050321123014.GA1356@dat.etsit.upm.es>
Reply-To: Javier =?iso-8859-1?Q?Fern=E1ndez-Sanguino_Pe=F1a?= <jfs@computer.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="Qxx1br4bt0+wmkIi"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--Qxx1br4bt0+wmkIi
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: login
Version: 1:4.0.3-31sarge1
Priority: important

/etc/pam.d/login does not have the pam_limit module enabled:

# Sets up user limits, please uncomment and read /etc/security/limits.conf
# to enable this functionality.
# (Replaces the use of /etc/limits in old login)
# session    required   pam_limits.so

However other pam.d configuration files for common stuff (gdm, ssh, xdm and=
=20
suexec) enable it by default.

Is there any reason why that pam module is not enabled by default. That=20
seems to be another hurdle in admin's way when he wants to configure=20
user limits as he needs to modify both /etc/security/limits.conf and then=
=20
/etc/pam.d/login with no indication in either limits.conf nor=20
/etc/security/limits.conf that this module is not enabled per default in=20
'login'.

Regards

Javier

--Qxx1br4bt0+wmkIi
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCPr5Vi4sehJTrj0oRAmi9AJ9+NhHrJg9h7NpUqwyqTo8deaRsCACggxqB
PDR3ETDt5y6Qj90PUuaf+ns=
=SK6E
-----END PGP SIGNATURE-----

--Qxx1br4bt0+wmkIi--

---------------------------------------
Received: (at 300720-close) by bugs.debian.org; 11 May 2005 18:20:13 +0000
>From katie@ftp-master.debian.org Wed May 11 11:20:13 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DVvob-0003aV-00; Wed, 11 May 2005 11:20:13 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1DVvm7-0000Cr-00; Wed, 11 May 2005 14:17:39 -0400
From: Christian Perrier <bubulle@debian.org>
To: 300720-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#300720: fixed in shadow 1:4.0.3-31sarge4
Message-Id: <E1DVvm7-0000Cr-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Wed, 11 May 2005 14:17:39 -0400
Delivered-To: 300720-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: shadow
Source-Version: 1:4.0.3-31sarge4

We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive:

login_4.0.3-31sarge4_i386.deb
  to pool/main/s/shadow/login_4.0.3-31sarge4_i386.deb
passwd_4.0.3-31sarge4_i386.deb
  to pool/main/s/shadow/passwd_4.0.3-31sarge4_i386.deb
shadow_4.0.3-31sarge4.diff.gz
  to pool/main/s/shadow/shadow_4.0.3-31sarge4.diff.gz
shadow_4.0.3-31sarge4.dsc
  to pool/main/s/shadow/shadow_4.0.3-31sarge4.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 300720@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Perrier <bubulle@debian.org> (supplier of updated shadow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  9 May 2005 18:18:55 +0200
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.3-31sarge4
Distribution: testing-proposed-updates
Urgency: low
Maintainer: Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>
Changed-By: Christian Perrier <bubulle@debian.org>
Description: 
 login      - system login tools
 passwd     - change and administer password and group data
Closes: 300720
Changes: 
 shadow (1:4.0.3-31sarge4) testing-proposed-updates; urgency=low
 .
   * The "Improve security release"
   * Make login and su use limits.so PAM module by default
     Closes: #300720
Files: 
 f16e8fb10274c5141320a6187a97ec8e 839 base required shadow_4.0.3-31sarge4.dsc
 be3db7fbd12d7a2d63b53e2ea0422216 1217710 base required shadow_4.0.3-31sarge4.diff.gz
 b960408433588a7a757bba58505b4943 529600 base required passwd_4.0.3-31sarge4_i386.deb
 e403cfe11fe0916c32cef68a63359829 576048 base required login_4.0.3-31sarge4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCf5sJ1OXtrMAUPS0RAneGAJ9jNbfS2eNYPj/+CrhZKGrUF7HboQCffizo
R6PxbcKRur7p4DQvcNJ+aAw=
=ZWka
-----END PGP SIGNATURE-----