Bug#240953: Debian bug #240953: reported upstream
Hi.
The Debian bug you reported ("ssh: broken pam_krb5") has a
corresponding upstream bug report, which has more detail:
http://bugzilla.mindrot.org/show_bug.cgi?id=688
Note that the solution of enabling threads opens sshd up to any number
or race conditions with any PAM module. Since the LinuxPAM docs give
module writers a license to write thread-unsafe code [1] I recommend
that you do *not* do this in the Debian package.
[1]
http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_appl-4.html#ss4.1
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
Reply to: