[ubuntu/karmic] ecryptfs-utils 77-0ubuntu1 (Accepted)

Dustin Kirkland kirkland at ubuntu.com
Wed Jul 22 06:05:17 BST 2009


ecryptfs-utils (77-0ubuntu1) karmic; urgency=low

  [ Dustin Kirkland ]
  * src/libecryptfs/key_management.c, src/pam_ecryptfs/pam_ecryptfs.c:
    revert the zombie code removal from pam_ecryptfs as it seems this
    bit is still needed; fix the source of the problem introduced in
    commit r407; check for non-zero return codes; this problem would
    manifest itself as a) unable to unlock screensaver, b) unable to
    switch users, c) unable to mount home folder on initial login;
    LP: #402222, #402029
  * src/utils/ecryptfs-umount-private: use for loop to loop over key
    ids on removal
  * src/utils/mount.ecryptfs_private.c: return non-zero on unmount failure
    due to open sessions; handle this in ecryptfs-umount-private too; make
    the flock() blocking; use /dev/shm for counter; add an iterator to the
    counter file to prevent users from DoS'ing one another from accessing
    their encrypted directories, LP: #402745
  * debian/ecryptfs-utils.postinst: move /tmp counters to /dev/shm
  * configure.ac: link against pam, silence shlib warning
  * src/include/ecryptfs.h, src/libecryptfs/main.c,
    src/pam_ecryptfs/pam_ecryptfs.c, src/utils/Makefile.am,
    src/utils/mount.ecryptfs_private.c: move two functions from
    mount.ecryptfs_private to libecryptfs, namely is_mounted() and
    fetch_private_mnt(); use these in both pam_ecryptfs and
    mount.ecryptfs_private; also move PRIVATE to ECRYPTFS_PRIVATE in
    the ecryptfs.h headers; this will allow us to short-circuit some of the
    costly key-loading code on pam_auth if the private dir is already
    mounted, speeding up some subsequent authentications significantly,
    LP: #402748
  * doc/ecryptfs-mount-private.txt: removed the "$" to make copy-n-paste
    more user friendly
  * src/utils/ecryptfs-setup-private: when encrypting home, put the
    .ecryptfs and .Private data in /home/.ecryptfs rather than /var/lib,
    as users are forgetting to backup /var/lib, and are often putting
    /home on a separate partition; furthermore, this gives users a place
    to access their encrypted data for backup, rather than hiding the
    data below $HOME, LP: #371719

  [ Tyler Hicks ]
  * src/libecryptfs/cipher_list.c, src/libecryptfs/module_mgr.c:
    add blowfish/56-bytes to the list of ciphers we officially support,
    LP: #402790

Date: Wed, 22 Jul 2009 00:01:56 -0500
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Dustin Kirkland <dustin.kirkland at gmail.com>
https://launchpad.net/ubuntu/karmic/+source/ecryptfs-utils/77-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 22 Jul 2009 00:01:56 -0500
Source: ecryptfs-utils
Binary: ecryptfs-utils libecryptfs0 libecryptfs-dev
Architecture: source
Version: 77-0ubuntu1
Distribution: karmic
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
Changes: 
 ecryptfs-utils (77-0ubuntu1) karmic; urgency=low
 .
   [ Dustin Kirkland ]
   * src/libecryptfs/key_management.c, src/pam_ecryptfs/pam_ecryptfs.c:
     revert the zombie code removal from pam_ecryptfs as it seems this
     bit is still needed; fix the source of the problem introduced in
     commit r407; check for non-zero return codes; this problem would
     manifest itself as a) unable to unlock screensaver, b) unable to
     switch users, c) unable to mount home folder on initial login;
     LP: #402222, #402029
   * src/utils/ecryptfs-umount-private: use for loop to loop over key
     ids on removal
   * src/utils/mount.ecryptfs_private.c: return non-zero on unmount failure
     due to open sessions; handle this in ecryptfs-umount-private too; make
     the flock() blocking; use /dev/shm for counter; add an iterator to the
     counter file to prevent users from DoS'ing one another from accessing
     their encrypted directories, LP: #402745
   * debian/ecryptfs-utils.postinst: move /tmp counters to /dev/shm
   * configure.ac: link against pam, silence shlib warning
   * src/include/ecryptfs.h, src/libecryptfs/main.c,
     src/pam_ecryptfs/pam_ecryptfs.c, src/utils/Makefile.am,
     src/utils/mount.ecryptfs_private.c: move two functions from
     mount.ecryptfs_private to libecryptfs, namely is_mounted() and
     fetch_private_mnt(); use these in both pam_ecryptfs and
     mount.ecryptfs_private; also move PRIVATE to ECRYPTFS_PRIVATE in
     the ecryptfs.h headers; this will allow us to short-circuit some of the
     costly key-loading code on pam_auth if the private dir is already
     mounted, speeding up some subsequent authentications significantly,
     LP: #402748
   * doc/ecryptfs-mount-private.txt: removed the "$" to make copy-n-paste
     more user friendly
   * src/utils/ecryptfs-setup-private: when encrypting home, put the
     .ecryptfs and .Private data in /home/.ecryptfs rather than /var/lib,
     as users are forgetting to backup /var/lib, and are often putting
     /home on a separate partition; furthermore, this gives users a place
     to access their encrypted data for backup, rather than hiding the
     data below $HOME, LP: #371719
 .
   [ Tyler Hicks ]
   * src/libecryptfs/cipher_list.c, src/libecryptfs/module_mgr.c:
     add blowfish/56-bytes to the list of ciphers we officially support,
     LP: #402790
Checksums-Sha1: 
 423757ad88ba74e1736be571ca495f80d6b7eb02 1632 ecryptfs-utils_77-0ubuntu1.dsc
 41b292de3917887afaffb6c34c61a190b0616d36 511343 ecryptfs-utils_77.orig.tar.gz
 23a2e20178f429d1f2e85d13e894fbe2afc8c2a4 12784 ecryptfs-utils_77-0ubuntu1.diff.gz
Checksums-Sha256: 
 f355addb1b221b2397f13f9b1d27eb56d45d96daa2d9140ec529b243c9db1df1 1632 ecryptfs-utils_77-0ubuntu1.dsc
 98020b89e1081d7e77bd8bc2a9f847153b2cb9a3f249bc470e9f9b1a0f4ae819 511343 ecryptfs-utils_77.orig.tar.gz
 70d5c16ac7c18a69cd563f336bec7ac6a741de51114383a38e7ff63a2a56d62f 12784 ecryptfs-utils_77-0ubuntu1.diff.gz
Files: 
 dcbaec6d70712092bd2a4015397d5613 1632 misc optional ecryptfs-utils_77-0ubuntu1.dsc
 c8a91a01bcf436d351d678e457b628c5 511343 misc optional ecryptfs-utils_77.orig.tar.gz
 7c349d2bca85fc9059b926bc29c339b4 12784 misc optional ecryptfs-utils_77-0ubuntu1.diff.gz
Launchpad-Bugs-Fixed: 371719 402029 402222 402745 402748 402790
Original-Maintainer: Daniel Baumann <daniel at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpmnVoACgkQs7pNXIOmEZTQfACgsP69A10bkvRrq9doDOGoa7w9
dE8AoKnYNmIs2QxmnMphOkTjdK/AH5OT
=dSh+
-----END PGP SIGNATURE-----


More information about the Karmic-changes mailing list