[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1

Sam Hartman hartmans at debian.org
Tue Nov 10 04:44:03 GMT 2009


>>>>> "Chuck" == Chuck Short <chuck.short at canonical.com> writes:

    Chuck> Thanks I was wondering how I can reproduce this?  Regards
    Chuck> chuck

Set up openssh-krb5 on a server with a keytab
set GssapiKeyExchange to yes in sshd_config
set gssapiKeyExchange to yes in a client config.

Set the replay cache type to none; I'm not sure what the config
variable is for that but the libapache2-mod-auth-kerb docs should tell
you.
run sshd under valgrind and confirm the leak.

I recommend sshd rather than apache2 because getting negotiate auth
with apache2 running  is tricky.

-- 
Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
https://bugs.launchpad.net/bugs/475546
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.



More information about the Ubuntu-server-bugs mailing list