release 0.9.4 of nss-pam-ldapd
[
Date Prev][Date Next]
[
Thread Prev][Thread Next]
release 0.9.4 of nss-pam-ldapd
- From: Arthur de Jong <arthur [at] arthurdejong.org>
- To: nss-pam-ldapd-announce <nss-pam-ldapd-announce [at] lists.arthurdejong.org>
- Reply-to: nss-pam-ldapd-users [at] lists.arthurdejong.org
- Subject: release 0.9.4 of nss-pam-ldapd
- Date: Fri, 06 Jun 2014 21:23:11 +0200
This is an update for the 0.9 development branch of nss-pam-ldapd that
includes a few small improvements. Development has slowed down a bit and
the current release should be reasonably stable. Focus now will be on
further testing and stabilising.
Users are encouraged to test this release and report any problems. The
pynslcd implementation is not considered as stable as nslcd yet.
A summary of the changes since 0.9.3:
* also handle password policy information on BIND failure (this
makes it possible to distinguish between a wrong password and
an expired password)
* fix mapping the member attribute to an empty string
* any buffers that may have held passwords are cleared before
the memory is released
* increase buffer size for passwords to support extremely long
passwords (thanks ushi)
* increase buffer size for DN to support very long names or
names with non-ASCII characters
* log an error in almost all places where a defined buffer is
not large enough to hold the provided data instead of just
(sometimes silently) failing
* logging improvements (start-up problems, login failures)
* small improvement for Solaris
More information can be found at:
http://arthurdejong.org/nss-pam-ldapd/
Ideas, comments and patches for functionality are more than welcome.
Please drop a note on the nss-pam-ldapd-users mailing list with any
ideas or patches you may have.
--
-- arthur - arthur@arthurdejong.org - http://arthurdejong.org/ --
--
To unsubscribe send an email to
nss-pam-ldapd-announce-unsubscribe@lists.arthurdejong.org or see
http://lists.arthurdejong.org/nss-pam-ldapd-announce/
- release 0.9.4 of nss-pam-ldapd,
Arthur de Jong