Hello,

Am 15.04.19 um 12:51 schrieb Timo Müller:
> Hello,
> 
> after testing with different working and not working configs of proftpd we 
> think we found a workaround.
> 
> The login is working with the following config:

I was also working on proftpd at the weekend and tried to gather more
information about this failure. Apparently it is not a general issue but
can only be triggered with certain configuration options. I found an
older Debian bug report that seems to describe a similar problem.

https://bugs.debian.org/839880

However the resolution was to upgrade to 1.3.6. and upstream did not
backport the fix to the 1.3.5 branch. I was under the impression 1.3.5
was a long-term supported branch but apparently I was wrong.

In #839880 one bug reporter mentioned that disabling PAM had no effect.
So in fact there could be more than one bug we are talking about now.

The changelog diff between 1.3.5e and 1.3.6 mentions a PAM related bug fix.

https://fossies.org/diffs/proftpd/1.3.5e_vs_1.3.6/ChangeLog-diff.html

At the moment I see two options to move forward.

I can either backport the current version of proftpd in Buster (1.3.6-4)
as I had initially intended which will most likely fix those issues or I
revert back to the previous version and try harder to fix the memory
leaks reported in

https://bugs.debian.org/923926

with targeted patches, the reason why we upgraded proftpd in the first
place. Unfortunately it is not clear what commit exactly addressed the
memory leaks, at one point someone just stated it works with 1.3.5d.

Maintainers of proftpd-dfsg, what is your preference?

Regards,

Markus


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to