Em Seg, 2006-12-04 às 09:11 +0200, Fabian Fagerholm escreveu:
> severity 401348 normal
> tags 401348 + unreproducible moreinfo
> thanks
> 
> Hi Fernando,
  Hi, Fabian


> Thanks for your report! I can't reproduce this bug, so we need some more
> information to understand what's going on.
> 
  Ok.

> On Sat, 2006-12-02 at 17:30 -0200, Fernando Ike wrote:
> > Installed sasl2-bin and change "/etc/default/saslauthd"  for
> > started daemon, but is failed started for not of exist directory
> > "/var/run/saslauthd". Manually create directory and started saslauthd is
> > success.
> 
> Could you send the file /etc/default/saslauthd to this bug, so we can
> check it?
  Sure, file is default.saslauthd. =)

> Also, please send the output of
> dpkg-statoverride --list /var/run/saslauthd
  Here is the problem. I installed sasl2-bin package, change parameter
to "START=yes" /etc/default/saslauthd and execute invoke-rc.d saslauthd
start. Out command is:

invoke-rc.d saslauthd start
saslauthd[15761] :main            : could not chdir
to: /var/run/saslauthd
saslauthd[15761] :main            : chdir: No such file or directory
saslauthd[15761] :main            : Check to make sure the directory
exists and is
saslauthd[15761] :main            : writeable by the user this process
runs as.


  Directory /var/run/saslauthd isn't exist. Command out
dpkg-statoverride:


pmanson:~# dpkg-statoverride --list /var/run/saslauthd
pmanson:~#
  
  
> Finally, please send the file /etc/init.d/saslauthd to this bug.

  This atached which init.saslauthd.
  It will be that I obtained to explain better. =)


kind regards,
-- 
Fernando Ike de Oliveira <[EMAIL PROTECTED]>
#
# Settings for saslauthd daemon
#

# Should saslauthd run automatically on startup? (default: no)
START=yes

# Which authentication mechanisms should saslauthd use? (default: pam)
#
# Available options in this Debian package:
# getpwent  -- use the getpwent() library function
# kerberos5 -- use Kerberos 5
# pam       -- use PAM
# rimap     -- use a remote IMAP server
# shadow    -- use the local shadow password file
# sasldb    -- use the local sasldb database file
# ldap      -- use LDAP (configuration is in /etc/saslauthd.conf)
#
# Only one option may be used at a time. See the saslauthd man page
# for more information.
#
# Example: MECHANISMS="pam"
MECHANISMS="pam"

# Additional options for this mechanism. (default: none)
# See the saslauthd man page for information about mech-specific options.
MECH_OPTIONS=""

# How many saslauthd processes should we run? (default: 5)
# A value of 0 will fork a new process for each connection.
THREADS=5

# Other options (default: -c)
# See the saslauthd man page for information about these options.
#
# Example for postfix users: "-c -m /var/spool/postfix/var/run/saslauthd"
# Note: See /usr/share/doc/sasl2-bin/README.Debian
OPTIONS="-c"

Attachment: init.saslauthd
Description: application/shellscript

Attachment: signature.asc
Description: Esta é uma parte de mensagem assinada digitalmente

Reply via email to