From owner-freebsd-standards@freebsd.org Sun Nov 18 21:01:27 2018 Return-Path: <owner-freebsd-standards@freebsd.org> Delivered-To: freebsd-standards@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6877C1121A52 for <freebsd-standards@mailman.ysv.freebsd.org>; Sun, 18 Nov 2018 21:01:27 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id F2C25703A6 for <freebsd-standards@freebsd.org>; Sun, 18 Nov 2018 21:01:26 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id B46651121A4A; Sun, 18 Nov 2018 21:01:26 +0000 (UTC) Delivered-To: standards@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A251D1121A49 for <standards@mailman.ysv.freebsd.org>; Sun, 18 Nov 2018 21:01:26 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3F65F70399 for <standards@FreeBSD.org>; Sun, 18 Nov 2018 21:01:26 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 5B09A2513E for <standards@FreeBSD.org>; Sun, 18 Nov 2018 21:01:25 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAIL1Pn9069682 for <standards@FreeBSD.org>; Sun, 18 Nov 2018 21:01:25 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAIL1Pbi069672 for standards@FreeBSD.org; Sun, 18 Nov 2018 21:01:25 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <201811182101.wAIL1Pbi069672@kenobi.freebsd.org> X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@FreeBSD.org using -f From: bugzilla-noreply@FreeBSD.org To: standards@FreeBSD.org Subject: Problem reports for standards@FreeBSD.org that need special attention Date: Sun, 18 Nov 2018 21:01:25 +0000 MIME-Version: 1.0 X-Rspamd-Queue-Id: F2C25703A6 X-Spamd-Result: default: False [0.40 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_SPAM_MEDIUM(0.28)[0.285,0]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]; NEURAL_SPAM_SHORT(0.12)[0.120,0] X-Rspamd-Server: mx1.freebsd.org Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-standards@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Standards compliance <freebsd-standards.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-standards>, <mailto:freebsd-standards-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-standards/> List-Post: <mailto:freebsd-standards@freebsd.org> List-Help: <mailto:freebsd-standards-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-standards>, <mailto:freebsd-standards-request@freebsd.org?subject=subscribe> X-List-Received-Date: Sun, 18 Nov 2018 21:01:27 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- Open | 191586 | FreeBSD doesn't validate negative edgecases in bi 1 problems total for which you should take action. From owner-freebsd-standards@freebsd.org Sat Nov 24 19:37:09 2018 Return-Path: <owner-freebsd-standards@freebsd.org> Delivered-To: freebsd-standards@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AEC3E1136E8C for <freebsd-standards@mailman.ysv.freebsd.org>; Sat, 24 Nov 2018 19:37:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3CDA98951F for <freebsd-standards@freebsd.org>; Sat, 24 Nov 2018 19:37:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id EE7A31136E89; Sat, 24 Nov 2018 19:37:08 +0000 (UTC) Delivered-To: standards@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DB8D91136E88 for <standards@mailman.ysv.freebsd.org>; Sat, 24 Nov 2018 19:37:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6D37B89510 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:37:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id C97497541 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:37:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAOJb6Gg053844 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:37:06 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAOJb66T053843 for standards@FreeBSD.org; Sat, 24 Nov 2018 19:37:06 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: standards@FreeBSD.org Subject: [Bug 233478] Authentication fails if password > 128 characters Date: Sat, 24 Nov 2018 19:37:06 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: standards X-Bugzilla-Version: 11.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: asv@inhio.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: standards@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: <bug-233478-99@https.bugs.freebsd.org/bugzilla/> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: 3CDA98951F X-Spamd-Result: default: False [2.29 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_SPAM_LONG(0.79)[0.792,0]; NEURAL_SPAM_SHORT(0.75)[0.746,0]; NEURAL_SPAM_MEDIUM(0.75)[0.749,0]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-standards@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Standards compliance <freebsd-standards.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-standards>, <mailto:freebsd-standards-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-standards/> List-Post: <mailto:freebsd-standards@freebsd.org> List-Help: <mailto:freebsd-standards-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-standards>, <mailto:freebsd-standards-request@freebsd.org?subject=subscribe> X-List-Received-Date: Sat, 24 Nov 2018 19:37:09 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233478 Bug ID: 233478 Summary: Authentication fails if password > 128 characters Product: Base System Version: 11.2-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: standards Assignee: standards@FreeBSD.org Reporter: asv@inhio.net After upgrading from 11.1 RELEASE to 11.2 RELEASE through freebsd-update I'= ve been locked out from my remote server after the reboot. Further investigation and testing on another FreeBSD 11.2 RELEASE (upgraded through build world instead and perfectly working) confirmed that I was loc= ked out because the previous passwords were larger than 128 characters. Both systems are set "passwd_format=3Dsha512" through login.conf (which I b= elieve is the default value nowadays). This issue is something new, was never there and actually forced me to login and fix it modifying the passwords while in single user mode with something shorter. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-standards@freebsd.org Sat Nov 24 19:54:26 2018 Return-Path: <owner-freebsd-standards@freebsd.org> Delivered-To: freebsd-standards@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 51E8A11376CF for <freebsd-standards@mailman.ysv.freebsd.org>; Sat, 24 Nov 2018 19:54:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id D037F89E4C for <freebsd-standards@freebsd.org>; Sat, 24 Nov 2018 19:54:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 9041711376CC; Sat, 24 Nov 2018 19:54:25 +0000 (UTC) Delivered-To: standards@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7E77911376CB for <standards@mailman.ysv.freebsd.org>; Sat, 24 Nov 2018 19:54:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 08C5189E4A for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:54:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 239D977F8 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:54:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAOJsOd3090137 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:54:24 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAOJsO2j090136 for standards@FreeBSD.org; Sat, 24 Nov 2018 19:54:24 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: standards@FreeBSD.org Subject: [Bug 233478] Authentication fails if password > 128 characters Date: Sat, 24 Nov 2018 19:54:24 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: standards X-Bugzilla-Version: 11.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: asv@inhio.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: standards@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: <bug-233478-99-gxcsBadKb5@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-233478-99@https.bugs.freebsd.org/bugzilla/> References: <bug-233478-99@https.bugs.freebsd.org/bugzilla/> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: D037F89E4C X-Spamd-Result: default: False [2.24 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_SPAM_LONG(0.78)[0.780,0]; NEURAL_SPAM_SHORT(0.73)[0.733,0]; NEURAL_SPAM_MEDIUM(0.73)[0.732,0]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-standards@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Standards compliance <freebsd-standards.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-standards>, <mailto:freebsd-standards-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-standards/> List-Post: <mailto:freebsd-standards@freebsd.org> List-Help: <mailto:freebsd-standards-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-standards>, <mailto:freebsd-standards-request@freebsd.org?subject=subscribe> X-List-Received-Date: Sat, 24 Nov 2018 19:54:26 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233478 --- Comment #1 from ASV <asv@inhio.net> --- By the way, you're allowed to set passwords as long as you like but PAM will fail to authenticate. If there's a reason why this is happening (why?!), so= if it's not a bug, I believe a check should be introduced to forbid the settin= g of passwords with length > 128 characters. --=20 You are receiving this mail because: You are the assignee for the bug.=