[Bug 524663] Re: cryptsetup: luksKillSlot reports incorrect slot unlocked
Bug Watch Updater
524663 at bugs.launchpad.net
Thu Aug 11 15:12:47 UTC 2011
** Changed in: cryptsetup (Debian)
Status: Unknown => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to cryptsetup in Ubuntu.
https://bugs.launchpad.net/bugs/524663
Title:
cryptsetup: luksKillSlot reports incorrect slot unlocked
Status in “cryptsetup” package in Ubuntu:
Fix Released
Status in “cryptsetup” package in Debian:
Fix Released
Bug description:
Binary package hint: cryptsetup
SEVERITY: MINOR
When you use luksKillSlot to kill key slot X, and then enter the
passphrase for keyslot Y, cryptsetup performs the correct actions.
However, the message printed is "Key slot X unlocked". So in other
words, cryptsetup tells the user it killed the keyslot they just used to
unlock the action.
This is cosmetic, but has given me a jolt of fear at least once, and a
fix should be extremely trivial. Perhaps print a message like
"""
Key slot Y unlocked
Killed key slot X
"""
Including below reportbug-style information as well as a sample
execution on a loopback. Note that I found this bug operating on a
real LVM partition, and have simply reproduced it on a loopback. I
have added into the terminal output the passwords I used (a for
keyslot 0, b for keyslot 1) so you can follow what I typed.
Thanks for the free software, don't root me bro, and best of luck,
Alex
************************************************************************
alexr at eternity:~$ sudo cryptsetup --version
cryptsetup 1.0.6
alexr at eternity:~$ cd /tmp
alexr at eternity:/tmp$ sudo dd if=/dev/zero of=backing bs=4M count=10
10+0 records in
10+0 records out
41943040 bytes (42 MB) copied, 0.0743792 s, 564 MB/s
alexr at eternity:/tmp$ sudo losetup /dev/loop5 backing
alexr at eternity:/tmp$ sudo cryptsetup luksFormat /dev/loop5
WARNING!
========
This will overwrite data on /dev/loop5 irrevocably.
Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase: a
Verify passphrase: a
Command successful.
alexr at eternity:/tmp$ sudo cryptsetup luksAddKey /dev/loop5
Enter any LUKS passphrase: a
key slot 0 unlocked.
Enter new passphrase for key slot: b
Verify passphrase: b
Command successful.
alexr at eternity:/tmp$ sudo cryptsetup luksKillSlot /dev/loop5 0
Enter any remaining LUKS passphrase: b
key slot 0 verified.
Command successful.
alexr at eternity:/tmp$
************************************************************************
ProblemType: Bug
Architecture: amd64
Date: Fri Feb 19 13:00:14 2010
Dependencies:
libgcc1 1:4.3.3-5ubuntu4
debconf 1.5.26ubuntu3
libdevmapper1.02.1 2:1.02.27-4ubuntu5
libtext-wrapi18n-perl 0.06-6
udev 141-1.2
libtext-iconv-perl 1.7-1build1
sed 4.1.5-8
ncurses-bin 5.7+20090207-1ubuntu1
findutils 4.4.0-2ubuntu4
procps 1:3.2.7-11ubuntu2
libgcrypt11 1.4.1-2ubuntu1
initramfs-tools 0.92bubuntu29
lzma 4.43-14ubuntu1
debconf-i18n 1.5.26ubuntu3
libselinux1 2.0.65-5build1
lsb-base 4.0-0ubuntu0.9.04.1
coreutils 6.10-6ubuntu1
libpam0g 1.0.1-9ubuntu1.1
libstdc++6 4.3.3-5ubuntu4
module-init-tools 3.7~pre9-2
libpam-runtime 1.0.1-9ubuntu1.1
libpam-modules 1.0.1-9ubuntu1.1
passwd 1:4.1.1-6ubuntu6
liblocale-gettext-perl 1.05-4build1
cpio 2.9-15ubuntu1
libvolume-id1 141-1.2
libattr1 1:2.4.43-1
libacl1 2.2.47-2
debianutils 2.30ubuntu3
libncurses5 5.7+20090207-1ubuntu1
libc6 2.9-4ubuntu6
libgpg-error0 1.4-2ubuntu7
dpkg 1.14.24ubuntu1
libklibc 1.5.14-1~exp1ubuntu2
klibc-utils 1.5.14-1~exp1ubuntu2
libpopt0 1.14-4
dmsetup 2:1.02.27-4ubuntu5
adduser 3.110ubuntu5
busybox-initramfs 1:1.10.2-2ubuntu7
perl-base 5.10.0-19ubuntu1.1
libdb4.7 4.7.25-6ubuntu1
libtext-charwidth-perl 0.04-5build1
gcc-4.3-base 4.3.3-5ubuntu4
libuuid1 1.41.4-1ubuntu1
DistroRelease: Ubuntu 9.04
Package: cryptsetup 2:1.0.6-7ubuntu7
PackageArchitecture: amd64
ProcEnviron:
PATH=(custom, user)
LANG=en_US.UTF-8
SHELL=/bin/bash
SourcePackage: cryptsetup
Uname: Linux 2.6.30 x86_64
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/524663/+subscriptions
More information about the foundations-bugs
mailing list