[Bug 595648] Re: Remote unlocking not possible if plymouth is active (Bug or Feature?)
Davidos
595648 at bugs.launchpad.net
Wed Feb 6 00:36:32 UTC 2013
Have a look at probably simpler solution provided here:
https://bugs.launchpad.net/cryptsetup/+bug/556372
The solution is to install plymouth-dummy package and remove the standard one. Then everything works fine as earlier.
This is fully based on https://bugs.launchpad.net/cryptsetup/+bug/556372/comments/78
###
Oliver Joos (oliver-joos) wrote on 2012-03-25: #78
Ok then, here is the ready-to-install plymouth-dummy_1.0_all.deb! It's
an empty package but allows to remove plymouth while keeping the
packages that have wrong dependencies to plymouth.
To workaround this (WontFix??) bug and remove plymouth just execute 2 commands in a Terminal:
sudo dpkg -i plymouth-dummy_1.0_all.deb
sudo apt-get remove plymouth
Advanced users can build plymouth-dummy_1.0_all.deb themselves: see comment 16
Many thanks to Christian Kujau!
###
I've tested it on 12.04 LTS
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to plymouth in Ubuntu.
https://bugs.launchpad.net/bugs/595648
Title:
Remote unlocking not possible if plymouth is active (Bug or Feature?)
Status in “cryptsetup” package in Ubuntu:
Triaged
Status in “plymouth” package in Ubuntu:
Confirmed
Bug description:
Binary package hint: cryptsetup
If plymouth is active, it is no longer possible in an easy way to remotely unlock the disc(s).
Which means that with a standard Ubuntu setup the README.remote is wrong or incomplete.
Reason: Plymouth is "stealing" the password prompt because the
cryptroot script checks if plymouth is active:
if [ -z "$cryptkeyscript" ]; then
cryptkey="Unlocking the disk $cryptsource ($crypttarget)\nEnter passphrase: "
if [ -x /bin/plymouth ] && plymouth --ping; then
cryptkeyscript="plymouth ask-for-password --prompt"
cryptkey=$(echo -e "$cryptkey")
else
cryptkeyscript="/lib/cryptsetup/askpass"
fi
fi
but only askpass has a feature which is checking for a file with a
password in it.
Because I am not so good in writing startup fixes, I am proposing this as a bug.
Possible solutions:
1. Include a new script, which doesn't use plymouth at all.
2. Use command line switches to use askpass instead of plymouth.
3. Patch plymouth, e.g. to include a "pass-as-password" option, which is passing the password along to a running plymouth(d?).
My knowledge about the inner workings of the startup process is limited, I would prefer solution no. 3.
Any suggestions?
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/595648/+subscriptions
More information about the foundations-bugs
mailing list