From owner-freebsd-standards@freebsd.org  Sun Nov 18 21:01:27 2018
Return-Path: <owner-freebsd-standards@freebsd.org>
Delivered-To: freebsd-standards@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6877C1121A52
 for <freebsd-standards@mailman.ysv.freebsd.org>;
 Sun, 18 Nov 2018 21:01:27 +0000 (UTC)
 (envelope-from bugzilla-noreply@FreeBSD.org)
Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org
 [IPv6:2001:1900:2254:206a::50:5])
 by mx1.freebsd.org (Postfix) with ESMTP id F2C25703A6
 for <freebsd-standards@freebsd.org>; Sun, 18 Nov 2018 21:01:26 +0000 (UTC)
 (envelope-from bugzilla-noreply@FreeBSD.org)
Received: by mailman.ysv.freebsd.org (Postfix)
 id B46651121A4A; Sun, 18 Nov 2018 21:01:26 +0000 (UTC)
Delivered-To: standards@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id A251D1121A49
 for <standards@mailman.ysv.freebsd.org>; Sun, 18 Nov 2018 21:01:26 +0000 (UTC)
 (envelope-from bugzilla-noreply@FreeBSD.org)
Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org
 [IPv6:2001:1900:2254:206a::19:3])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "mxrelay.ysv.freebsd.org",
 Issuer "Let's Encrypt Authority X3" (verified OK))
 by mx1.freebsd.org (Postfix) with ESMTPS id 3F65F70399
 for <standards@FreeBSD.org>; Sun, 18 Nov 2018 21:01:26 +0000 (UTC)
 (envelope-from bugzilla-noreply@FreeBSD.org)
Received: from kenobi.freebsd.org (kenobi.freebsd.org
 [IPv6:2001:1900:2254:206a::16:76])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 5B09A2513E
 for <standards@FreeBSD.org>; Sun, 18 Nov 2018 21:01:25 +0000 (UTC)
 (envelope-from bugzilla-noreply@FreeBSD.org)
Received: from kenobi.freebsd.org ([127.0.1.118])
 by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAIL1Pn9069682
 for <standards@FreeBSD.org>; Sun, 18 Nov 2018 21:01:25 GMT
 (envelope-from bugzilla-noreply@FreeBSD.org)
Received: (from bugzilla@localhost)
 by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAIL1Pbi069672
 for standards@FreeBSD.org; Sun, 18 Nov 2018 21:01:25 GMT
 (envelope-from bugzilla-noreply@FreeBSD.org)
Message-Id: <201811182101.wAIL1Pbi069672@kenobi.freebsd.org>
X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to
 bugzilla-noreply@FreeBSD.org using -f
From: bugzilla-noreply@FreeBSD.org
To: standards@FreeBSD.org
Subject: Problem reports for standards@FreeBSD.org that need special attention
Date: Sun, 18 Nov 2018 21:01:25 +0000
MIME-Version: 1.0
X-Rspamd-Queue-Id: F2C25703A6
X-Spamd-Result: default: False [0.40 / 15.00];
 local_wl_from(0.00)[FreeBSD.org];
 NEURAL_SPAM_MEDIUM(0.28)[0.285,0];
 ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US];
 NEURAL_SPAM_SHORT(0.12)[0.120,0]
X-Rspamd-Server: mx1.freebsd.org
Content-Type: text/plain; charset="UTF-8"
X-Content-Filtered-By: Mailman/MimeDel 2.1.29
X-BeenThere: freebsd-standards@freebsd.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Standards compliance <freebsd-standards.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-standards>, 
 <mailto:freebsd-standards-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-standards/>
List-Post: <mailto:freebsd-standards@freebsd.org>
List-Help: <mailto:freebsd-standards-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-standards>, 
 <mailto:freebsd-standards-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Nov 2018 21:01:27 -0000

To view an individual PR, use:
  https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id).

The following is a listing of current problems submitted by FreeBSD users,
which need special attention. These represent problem reports covering
all versions including experimental development code and obsolete releases.

Status      |    Bug Id | Description
------------+-----------+---------------------------------------------------
Open        |    191586 | FreeBSD doesn't validate negative edgecases in bi 

1 problems total for which you should take action.

From owner-freebsd-standards@freebsd.org  Sat Nov 24 19:37:09 2018
Return-Path: <owner-freebsd-standards@freebsd.org>
Delivered-To: freebsd-standards@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id AEC3E1136E8C
 for <freebsd-standards@mailman.ysv.freebsd.org>;
 Sat, 24 Nov 2018 19:37:09 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org
 [IPv6:2001:1900:2254:206a::50:5])
 by mx1.freebsd.org (Postfix) with ESMTP id 3CDA98951F
 for <freebsd-standards@freebsd.org>; Sat, 24 Nov 2018 19:37:09 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: by mailman.ysv.freebsd.org (Postfix)
 id EE7A31136E89; Sat, 24 Nov 2018 19:37:08 +0000 (UTC)
Delivered-To: standards@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id DB8D91136E88
 for <standards@mailman.ysv.freebsd.org>; Sat, 24 Nov 2018 19:37:08 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org
 [IPv6:2001:1900:2254:206a::19:3])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "mxrelay.ysv.freebsd.org",
 Issuer "Let's Encrypt Authority X3" (verified OK))
 by mx1.freebsd.org (Postfix) with ESMTPS id 6D37B89510
 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:37:08 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from kenobi.freebsd.org (kenobi.freebsd.org
 [IPv6:2001:1900:2254:206a::16:76])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id C97497541
 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:37:06 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from kenobi.freebsd.org ([127.0.1.118])
 by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAOJb6Gg053844
 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:37:06 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
Received: (from www@localhost)
 by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAOJb66T053843
 for standards@FreeBSD.org; Sat, 24 Nov 2018 19:37:06 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
X-Authentication-Warning: kenobi.freebsd.org: www set sender to
 bugzilla-noreply@freebsd.org using -f
From: bugzilla-noreply@freebsd.org
To: standards@FreeBSD.org
Subject: [Bug 233478] Authentication fails if password > 128 characters
Date: Sat, 24 Nov 2018 19:37:06 +0000
X-Bugzilla-Reason: AssignedTo
X-Bugzilla-Type: new
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: Base System
X-Bugzilla-Component: standards
X-Bugzilla-Version: 11.2-RELEASE
X-Bugzilla-Keywords: 
X-Bugzilla-Severity: Affects Many People
X-Bugzilla-Who: asv@inhio.net
X-Bugzilla-Status: New
X-Bugzilla-Resolution: 
X-Bugzilla-Priority: ---
X-Bugzilla-Assigned-To: standards@FreeBSD.org
X-Bugzilla-Flags: 
X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform
 op_sys bug_status bug_severity priority component assigned_to reporter
Message-ID: <bug-233478-99@https.bugs.freebsd.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
X-Rspamd-Queue-Id: 3CDA98951F
X-Spamd-Result: default: False [2.29 / 15.00];
 local_wl_from(0.00)[freebsd.org];
 NEURAL_SPAM_LONG(0.79)[0.792,0];
 NEURAL_SPAM_SHORT(0.75)[0.746,0];
 NEURAL_SPAM_MEDIUM(0.75)[0.749,0];
 ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]
X-Rspamd-Server: mx1.freebsd.org
X-BeenThere: freebsd-standards@freebsd.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Standards compliance <freebsd-standards.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-standards>, 
 <mailto:freebsd-standards-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-standards/>
List-Post: <mailto:freebsd-standards@freebsd.org>
List-Help: <mailto:freebsd-standards-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-standards>, 
 <mailto:freebsd-standards-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Nov 2018 19:37:09 -0000

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233478

            Bug ID: 233478
           Summary: Authentication fails if password > 128 characters
           Product: Base System
           Version: 11.2-RELEASE
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: standards
          Assignee: standards@FreeBSD.org
          Reporter: asv@inhio.net

After upgrading from 11.1 RELEASE to 11.2 RELEASE through freebsd-update I'=
ve
been locked out from my remote server after the reboot.
Further investigation and testing on another FreeBSD 11.2 RELEASE (upgraded
through build world instead and perfectly working) confirmed that I was loc=
ked
out because the previous passwords were larger than 128 characters.

Both systems are set "passwd_format=3Dsha512" through login.conf (which I b=
elieve
is the default value nowadays).
This issue is something new, was never there and actually forced me to login
and fix it modifying the passwords while in single user mode with something
shorter.

--=20
You are receiving this mail because:
You are the assignee for the bug.=

From owner-freebsd-standards@freebsd.org  Sat Nov 24 19:54:26 2018
Return-Path: <owner-freebsd-standards@freebsd.org>
Delivered-To: freebsd-standards@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 51E8A11376CF
 for <freebsd-standards@mailman.ysv.freebsd.org>;
 Sat, 24 Nov 2018 19:54:26 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org
 [IPv6:2001:1900:2254:206a::50:5])
 by mx1.freebsd.org (Postfix) with ESMTP id D037F89E4C
 for <freebsd-standards@freebsd.org>; Sat, 24 Nov 2018 19:54:25 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: by mailman.ysv.freebsd.org (Postfix)
 id 9041711376CC; Sat, 24 Nov 2018 19:54:25 +0000 (UTC)
Delivered-To: standards@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7E77911376CB
 for <standards@mailman.ysv.freebsd.org>; Sat, 24 Nov 2018 19:54:25 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org
 [IPv6:2001:1900:2254:206a::19:3])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "mxrelay.ysv.freebsd.org",
 Issuer "Let's Encrypt Authority X3" (verified OK))
 by mx1.freebsd.org (Postfix) with ESMTPS id 08C5189E4A
 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:54:25 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from kenobi.freebsd.org (kenobi.freebsd.org
 [IPv6:2001:1900:2254:206a::16:76])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 239D977F8
 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:54:24 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from kenobi.freebsd.org ([127.0.1.118])
 by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAOJsOd3090137
 for <standards@FreeBSD.org>; Sat, 24 Nov 2018 19:54:24 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
Received: (from www@localhost)
 by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAOJsO2j090136
 for standards@FreeBSD.org; Sat, 24 Nov 2018 19:54:24 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
X-Authentication-Warning: kenobi.freebsd.org: www set sender to
 bugzilla-noreply@freebsd.org using -f
From: bugzilla-noreply@freebsd.org
To: standards@FreeBSD.org
Subject: [Bug 233478] Authentication fails if password > 128 characters
Date: Sat, 24 Nov 2018 19:54:24 +0000
X-Bugzilla-Reason: AssignedTo
X-Bugzilla-Type: changed
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: Base System
X-Bugzilla-Component: standards
X-Bugzilla-Version: 11.2-RELEASE
X-Bugzilla-Keywords: 
X-Bugzilla-Severity: Affects Many People
X-Bugzilla-Who: asv@inhio.net
X-Bugzilla-Status: New
X-Bugzilla-Resolution: 
X-Bugzilla-Priority: ---
X-Bugzilla-Assigned-To: standards@FreeBSD.org
X-Bugzilla-Flags: 
X-Bugzilla-Changed-Fields: 
Message-ID: <bug-233478-99-gxcsBadKb5@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-233478-99@https.bugs.freebsd.org/bugzilla/>
References: <bug-233478-99@https.bugs.freebsd.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
X-Rspamd-Queue-Id: D037F89E4C
X-Spamd-Result: default: False [2.24 / 15.00];
 local_wl_from(0.00)[freebsd.org];
 NEURAL_SPAM_LONG(0.78)[0.780,0];
 NEURAL_SPAM_SHORT(0.73)[0.733,0];
 NEURAL_SPAM_MEDIUM(0.73)[0.732,0];
 ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]
X-Rspamd-Server: mx1.freebsd.org
X-BeenThere: freebsd-standards@freebsd.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Standards compliance <freebsd-standards.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-standards>, 
 <mailto:freebsd-standards-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-standards/>
List-Post: <mailto:freebsd-standards@freebsd.org>
List-Help: <mailto:freebsd-standards-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-standards>, 
 <mailto:freebsd-standards-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Nov 2018 19:54:26 -0000

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233478

--- Comment #1 from ASV <asv@inhio.net> ---
By the way, you're allowed to set passwords as long as you like but PAM will
fail to authenticate. If there's a reason why this is happening (why?!), so=
 if
it's not a bug, I believe a check should be introduced to forbid the settin=
g of
passwords with length > 128 characters.

--=20
You are receiving this mail because:
You are the assignee for the bug.=