[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#262712: marked as done (xdm hangs at kde logout when using pam_ldap)



Your message dated Thu, 01 Mar 2007 22:52:00 +0100
with message-id <45E74B00.7090007@ens-lyon.org>
and subject line submitter address invalid
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: xdm
Version: 4.3.0.dfsg.1-4

Debian : testing (sarge)
Kernel : 2.4.26-1-k7
Libc : 2.3.2-1

xdm hang after a kde logout when I'm using it with pam_ldap :
/etc/pam.d/common-account :
#
# /etc/pam.d/common-account - authorization settings common to all servic=
es
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authorization modules that define
# the central access policy for use on the system. The default is to
# only deny service to users whose accounts are expired in /etc/shadow.
#
account sufficient pam_ldap.so
account required pam_unix.so

/etc/pam.d/common-auth :
#
# /etc/pam.d/common-auth - authentication settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
# traditional Unix authentication mechanisms.
#
auth sufficient pam_ldap.so
auth required pam_unix.so nullok_secure

/etc/pam.d/common-password
#
# /etc/pam.d/common-password - password-related modules common to all
services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of modules that define the services to be
#used to change user passwords. The default is pam_unix

# The "nullok" option allows users to change an empty password, else
# empty passwords are treated as locked accounts.
#
# (Add `md5' after the module name to enable MD5 passwords)
#
# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
# login.defs. Also the "min" and "max" options enforce the length of the
# new password.
password sufficient pam_ldap.so
password required pam_unix.so nullok obscure min=3D4 max=3D8 md5

# Alternate strength checking for password. Note that this
# requires the libpam-cracklib package to be installed.
# You will need to comment out the password line above and
# uncomment the next two in order to use this.
# (Replaces the `OBSCURE_CHECKS_ENAB', `CRACKLIB_DICTPATH')
#
# password required pam_cracklib.so retry=3D3 minlen=3D6 difok=3D3
# password required pam_unix.so use_authtok nullok md5

/etc/pam.d/common-session
#
# /etc/pam.d/common-session - session-related modules common to all servi=
ces
#
# This file is included from other service-specific PAM config files,
# and should contain a list of modules that define tasks to be performed
# at the start and end of sessions of *any* kind (both interactive and
# non-interactive). The default is pam_unix.
#
session sufficient pam_ldap.so
session required pam_unix.so

To solve the problem, I've got to put this in /etc/X11/xdm/Xreset :
/etc/init.d/xdm restart


Best regards,
Lionel Magallon



--- End Message ---
--- Begin Message ---
Closing since the submitter's address is invalid. If anybody ever
reproduces this problem, feel free to reopen.

Brice


--- End Message ---

Reply to: