Custom Query (1145 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (82 - 84 of 1145)

Ticket Resolution Summary Owner Reporter
#388 fixed config-package-dev maintainer scripts don’t undivert on deconfigure andersk

Reported by andersk, 15 years ago.

Description

We currently undivert on prerm when [ "$1" = "remove" ]. This should probably be [ "$1" != "upgrade" ], so as to include the deconfigure case as well.

More generally, we should check that we handle  all these cases correctly.

#461 fixed pyhesiodfs should pass -o nonempty to fuse andersk

Reported by andersk, 15 years ago.

Description

pyhesiodfs fails to start up on a nonempty /mit.

root@ringworld:/etc/init.d# /usr/bin/pyhesiodfs /mnt
fuse: mountpoint is not empty
fuse: if you are sure this is safe, use the 'nonempty' mount option
Traceback (most recent call last):
  File "/usr/bin/pyhesiodfs", line 226, in <module>
    main()
  File "/usr/bin/pyhesiodfs", line 223, in main
    server.main()
  File "/usr/lib/python2.6/dist-packages/fuse.py", line 713, in main
    main(**d)
fuse.FuseError: filesystem initialization failed

From fuse/README:

nonempty

  Allows mounts over a non-empty file or directory.  By default these
  mounts are rejected (from version 2.3.1) to prevent accidental
  covering up of data, which could for example prevent automatic
  backup.
#529 fixed Make Athena ready to transition away from single-DES kaduk andersk

Reported by andersk, 15 years ago.

Description

[Not entirely a Debathena bug, but this is the most convenient place to keep track of it.]

As an experiment, I modified my Kerberos principal to have only a triple-DES enctype using kadmin:

kadmin:  cpw -e des3-hmac-sha1:normal andersk

This works out fine from a Kerberos client perspective:

  • kinit -5, kinit -45, and krb524init all works, which allows me to use any Kerberized service as normal, including krb4 Zephyr and krb4 IMAP. krb4 is now effectively disabled
  • kinit -4 no longer works (kinit(v4): Kerberos principal unknown), which is expected because Kerberos IV can only use a single-DES key to encrypt my TGT. But that is okay because kinit -45 or krb524init replace this functionality. krb4 is now effectively disabled
  • aklog and AFS works fine.

However, it exposed some problems with various password-authenticated services:

  •  ca.mit.edu does not allow me to generate a new MIT certificate. FIXED.
  • The PO servers do not allow me to log in over IMAP using a password. (Kerberized IMAP still works.) I receive this error using imtest: FIXED.
    $ imtest -s -m login andersk.mail.mit.edu
    …
    Please enter your password:
    C: L01 LOGIN andersk {9}
    S: + go ahead
    C: <omitted>
    S: L01 NO Login failed: authentication failure
    Authentication failed. generic failure
    
  • I cannot log in to  Webmail, presumably as a consequence of the above: “Login failed.” FIXED.
  • I cannot log in to  Touchstone services using a password (though certificate and Kerberos authentication still work): “Error: Please enter a valid username and password. Click help for assistance.” FIXED.
  •  Outlook Web Access works fine.
  • I cannot log in to the  MITnet VPN (vpn.mit.edu): “Login error.” FIXED.
  • I cannot log in to  Brightmail: “Invalid user name or password. Please try again.” FIXED.
  • I cannot log in to Windows after starting the Citrix ICA Client from  Citrix MetaFrame XP: “The system could not log you on. Make sure your User name and domain are correct, then type your password again. Letters in passwords must be typed using the correct case.” GONE. The new citrixapps.mit.edu works, however.
  • I cannot log in to the MIT SECURE wireless network:
  • outgoing(-auth) does not accept passwords auth from principals with strong keys, though it does accept GSSAPI auth, much as the PO servers. FIXED.

Given that single-DES is critically weak, is disabled by default in current releases of Kerberos, and will be removed entirely in future releases, we should talk with network and try to get these little problems worked out sooner rather than later.

Solution

In at least one case (ca.mit.edu), the problem was that the server’s /etc/krb5.conf had the line default_tkt_enctypes = des-cbc-crc. This line should be removed. Since we think this misconfigured /etc/krb5.conf has been copied to many MIT servers, that’s probably all we need to do to fix most or all of these problems.

Note: See TracQuery for help on using queries.