Tom/ Heikki , This is a custom build. I used "./configure --with-pam --with-perl --with-python --enable-thread-safety --with-openssl --with-krb5".
Gdb output below... Core was generated by `postgres: rdouglas tacacs 10.0'. Program terminated with signal 11, Segmentation fault. #0 0x0000000000559624 in pam_passwd_conv_proc () Missing separate debuginfos, use: debuginfo-install audit-libs-1.7.13-1.fc11.x86_64 (gdb) bt #0 0x0000000000559624 in pam_passwd_conv_proc () #1 0x00007f738dfeedd8 in _pam_krb5_conv_call (pamh=<value optimized out>, messages=0xb51780, n_prompts=0, responses=0x7fff2e356668) at conv.c:99 #2 0x00007f738dfefb38 in _pam_krb5_generic_prompter (context=<value optimized out>, data=0x7fff2e357fe0, name=<value optimized out>, banner=<value optimized out>, num_prompts=1, prompts=<value optimized out>, suppress_password_prompts=1) at prompter.c:330 #3 0x00007f738dfefe10 in _pam_krb5_normal_prompter (context=0x0, data=0xb51890, name=0x7fff2e356668 "", banner=0x79df27 "", num_prompts=0, prompts=0x101010101010101) at prompter.c:409 #4 0x00000031d3660bce in krb5_get_as_key_password (context=0xb4e710, client=<value optimized out>, etype=23, prompter=<value optimized out>, prompter_data=<value optimized out>, salt=0x7fff2e356f00, params=0x7fff2e356ef0, as_key=0x7fff2e356ec0, gak_data=0x7fff2e357120) at gic_pwd.c:61 #5 0x00000031d3667713 in pa_enc_timestamp (context=0xb4e710, request=<value optimized out>, in_padata=<value optimized out>, out_padata=0x7fff2e356d30, salt=<value optimized out>, s2kparams=<value optimized out>, etype=0x7fff2e356f4c, as_key=0x7fff2e356ec0, prompter=0x7f738dfefe00 <_pam_krb5_normal_prompter>, prompter_data=0x7fff2e357fe0, gak_fct=0x31d36609f0 <krb5_get_as_key_password>, gak_data=0x7fff2e357120) at preauth2.c:635 #6 0x00000031d3667e0c in krb5_do_preauth (context=<value optimized out>, request=0x7fff2e356e40, encoded_request_body=<value optimized out>, encoded_previous_request=<value optimized out>, in_padata=0xb51060, out_padata=<value optimized out>, salt=0x7fff2e356f00, s2kparams=0x7fff2e356ef0, etype=0x7fff2e356f4c, as_key=0x7fff2e356ec0, prompter=0x7f738dfefe00 <_pam_krb5_normal_prompter>, prompter_data=0x7fff2e357fe0, gak_fct=0x31d36609f0 <krb5_get_as_key_password>, gak_data=0x7fff2e357120, get_data_rock=0x7fff2e356ee0, opte=0xb4ec50) at preauth2.c:1586 #7 0x00000031d365f251 in krb5_get_init_creds (context=0xb4e710, creds=<value optimized out>, client=<value optimized out>, prompter=<value optimized out>, prompter_data=<value optimized out>, start_time=<value optimized out>, in_tkt_service=0x7fff2e358050 "krbtgt/thexchange....@thexchange.com", options=0xb4ec50, gak_fct=0x31d36609f0 <krb5_get_as_key_password>, gak_data=0x7fff2e357120, use_master=0x7fff2e35715c, as_reply=0x7fff2e357150) at get_in_tkt.c:1106 #8 0x00000031d3660f18 in krb5_get_init_creds_password (context=0xb4e710, creds=<value optimized out>, client=<value optimized out>, password=<value optimized out>, prompter=0x7f738dfefe00 <_pam_krb5_normal_prompter>, data=<value optimized out>, start_time=0, in_tkt_service=0x7fff2e358050 "krbtgt/thexchange....@thexchange.com", options=0xb4ec50) at gic_pwd.c:139 #9 0x00007f738dff5571 in v5_get_creds (ctx=0xb4e710, pamh=<value optimized out>, creds=<value optimized out>, user=<value optimized out>, userinfo=0xb4efe0, options=0xb4ecb0, service=0x7f738dff9bf8 "krbtgt", password=0x0, gic_options=0xb4ec50, prompter=0x7f738dfefe00 <_pam_krb5_normal_prompter>, result=0xb505c4) at v5.c:1014 #10 0x00007f738dfeb3cf in pam_sm_authenticate (pamh=0xb5f460, flags=0, argc=<value optimized out>, argv=<value optimized out>) at auth.c:423 #11 0x00000031d0202c1e in _pam_dispatch_aux (use_cached_chain=<value optimized out>, resumed=<value optimized out>, h=<value optimized out>, flags=<value optimized out>, pamh=<value optimized out>) at pam_dispatch.c:110 #12 _pam_dispatch (use_cached_chain=<value optimized out>, resumed=<value optimized out>, h=<value optimized out>, flags=<value optimized out>, pamh=<value optimized out>) at pam_dispatch.c:407 #13 0x00000031d0202500 in pam_authenticate (pamh=0xb5f460, flags=0) at pam_auth.c:34 #14 0x00000000005598ed in CheckPAMAuth.clone.0 () #15 0x0000000000559b96 in ClientAuthentication () #16 0x00000000005b25dc in BackendInitialize () #17 0x00000000005b2ebc in ServerLoop () #18 0x00000000005b559c in PostmasterMain () #19 0x00000000005617d0 in main () -----Original Message----- From: Heikki Linnakangas [mailto:heikki.linnakan...@enterprisedb.com] Sent: Thursday, October 15, 2009 5:23 PM To: Douglas, Ryan Cc: pgsql-bugs@postgresql.org Subject: Re: [BUGS] BUG #5121: Segmentation Fault when using pam w/ krb5 Ryan Douglas wrote: > The following bug has been logged online: > > Bug reference: 5121 > Logged by: Ryan Douglas > Email address: rdoug...@arbinet.com > PostgreSQL version: 8.4.1 > Operating system: Fedora 11 > Description: Segmentation Fault when using pam w/ krb5 > Details: > > Whenever I use psql to remotely connect to the database the server crashes > (see log below). If I use psql with the '-W' option then it's fine. > > I also tested with pam_tacplus.so and in both cases the db didn't crash. It > just complained about not having credentials to authenticate when the -W > option is not used. > > I can reproduce at will so let me know if you need more information. Can you get a stack trace with gdb? Something along the lines of: ulimit -c unlimited (start postmaster) (reproduce the crash) gdb /usr/bin/postgres $PGDATA/core bt -- Heikki Linnakangas EnterpriseDB http://www.enterprisedb.com -- Sent via pgsql-bugs mailing list (pgsql-bugs@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-bugs