blowfish + 56 byte keys broken
Bug #402790 reported by
Dustin Kirkland
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ecryptfs-utils (Ubuntu) |
Fix Released
|
Medium
|
Tyler Hicks |
Bug Description
Binary package hint: ecryptfs-utils
<soren> mount -t ecryptfs -o ecryptfs_
<soren> Passphrase:
<soren> Error attempting to evaluate mount options: [-22] Invalid argument
<soren> Check your system logs for details on why this happened.
<soren> Try updating your ecryptfs-utils package, and/or
<soren> submit a bug report on https:/
Related branches
Changed in ecryptfs-utils (Ubuntu): | |
status: | New → Fix Committed |
importance: | Undecided → Medium |
assignee: | nobody → Tyler Hicks (tyhicks) |
To post a comment you must log in.
This bug was fixed in the package ecryptfs-utils - 77-0ubuntu1
---------------
ecryptfs-utils (77-0ubuntu1) karmic; urgency=low
[ Dustin Kirkland ] /key_management .c, src/pam_ ecryptfs/ pam_ecryptfs. c: ecryptfs- umount- private: use for loop to loop over key mount.ecryptfs_ private. c: return non-zero on unmount failure umount- private too; make ecryptfs- utils.postinst: move /tmp counters to /dev/shm ecryptfs. h, src/libecryptfs /main.c, pam_ecryptfs/ pam_ecryptfs. c, src/utils/ Makefile. am, utils/mount. ecryptfs_ private. c: move two functions from ecryptfs_ private to libecryptfs, namely is_mounted() and private_ mnt(); use these in both pam_ecryptfs and ecryptfs_ private; also move PRIVATE to ECRYPTFS_PRIVATE in mount-private. txt: removed the "$" to make copy-n-paste ecryptfs- setup-private: when encrypting home, put the
* src/libecryptfs
revert the zombie code removal from pam_ecryptfs as it seems this
bit is still needed; fix the source of the problem introduced in
commit r407; check for non-zero return codes; this problem would
manifest itself as a) unable to unlock screensaver, b) unable to
switch users, c) unable to mount home folder on initial login;
LP: #402222, #402029
* src/utils/
ids on removal
* src/utils/
due to open sessions; handle this in ecryptfs-
the flock() blocking; use /dev/shm for counter; add an iterator to the
counter file to prevent users from DoS'ing one another from accessing
their encrypted directories, LP: #402745
* debian/
* configure.ac: link against pam, silence shlib warning
* src/include/
src/
src/
mount.
fetch_
mount.
the ecryptfs.h headers; this will allow us to short-circuit some of the
costly key-loading code on pam_auth if the private dir is already
mounted, speeding up some subsequent authentications significantly,
LP: #402748
* doc/ecryptfs-
more user friendly
* src/utils/
.ecryptfs and .Private data in /home/.ecryptfs rather than /var/lib,
as users are forgetting to backup /var/lib, and are often putting
/home on a separate partition; furthermore, this gives users a place
to access their encrypted data for backup, rather than hiding the
data below $HOME, LP: #371719
[ Tyler Hicks ] /cipher_ list.c, src/libecryptfs /module_ mgr.c:
* src/libecryptfs
add blowfish/56-bytes to the list of ciphers we officially support,
LP: #402790
-- Dustin Kirkland <email address hidden> Wed, 22 Jul 2009 00:01:56 -0500