• Bug#1104505: xrdp: no-change rebuild changes /etc/pam.d/xrdp-sesman

    From Chris Hofstaedtler@21:1/5 to All on Thu May 1 13:00:01 2025
    Source: xrdp
    Version: 0.10.1-3
    Severity: serious
    User: reproducible-builds@lists.alioth.debian.org
    Usertag: environment
    X-Debbugs-CC: reproducible-builds@lists.alioth.debian.org

    Hi,

    when doing a no-change binary rebuild of xrdp, the resulting .deb
    has a different content for /etc/pam.d/xrdp-sesman:

    ─ ./etc/pam.d/xrdp-sesman
    @@ -1,14 +1,5 @@
    #%PAM-1.0
    -auth required pam_env.so readenv=1
    -auth required pam_env.so readenv=1 envfile=/etc/default/locale
    -@include common-auth
    --auth optional pam_gnome_keyring.so
    --auth optional pam_kwallet5.so
    -
    -@include common-account
    -
    -@include common-password
    -
    -@include common-session
    --session optional pam_gnome_keyring.so auto_start
    --session optional pam_kwallet5.so auto_start
    +auth include common-auth
    +account include common-account
    +session include common-session
    +password include common-password

    Reporting as serious, as this makes xrdp binNMU-unsafe.

    From what it looks like, xrdp autodetects which OS-specific set of
    PAM config it should use, and the detection now uses the "suse" set
    instead of the "debian" set.

    Best,
    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Fri Jun 6 15:40:02 2025
    This is a multi-part message in MIME format...

    Your message dated Fri, 06 Jun 2025 13:35:45 +0000
    with message-id <E1uNXEX-00DgvD-Ih@fasolo.debian.org>
    and subject line Bug#1104505: fixed in xrdp 0.10.1-3.1
    has caused the Debian Bug report #1104505,
    regarding xrdp: no-change rebuild changes /etc/pam.d/xrdp-sesman
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1104505: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104505
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 1 May 2025 10:48:46 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-105.9 required=4.0 tests=BAYES_00,DKIMWL_WL_HIGH,
    DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FROMDEVELOPER,
    SPF_HELO_NONE,SPF_NONE,UNPARSEABLE_RELAY,USER_IN_DKIM_WELCOMELIST,
    USER_IN_DKIM_WHITELIST autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 22; hammy, 150; neutral, 32; spammy,
    0. spammytokens:
    hammytokens:0.000-+--Hx-spam-relays-external:sk:stravin,
    0.000-+--H*RT:sk:stravin, 0.000-+--Hx-spam-relays-external:311,
    0.000-+--H*RT:311, 0.000-+--H*RT:108
    Return-path: <zeha@debian.org>
    Received: from stravinsky.debian.org ([2001:41b8:202:deb::311:108]:57918)