Your message dated Tue, 22 Aug 2006 00:47:06 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#381981: fixed in partman-crypto 10
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: installation-reports

Boot method: businesscard ISO
Image version: 2006-08-07 build from
http://cdimage.debian.org/cdimage/daily-builds/sid_d-i/arch-latest/i386/iso-cd/debian-testing-i386-businesscard.iso

Machine: VMWare Player 1.0.1 build-19317
Memory: 128MB
Partitions:

Filesystem    Type   1K-blocks      Used Available Use% Mounted on
/dev/mapper/crypt0
              ext3      917414    270869    597600  32% /
tmpfs        tmpfs       63580         0     63580   0% /dev/shm
/dev/sda2     ext3       45162     10727     32026  26% /boot
/dev/mapper/crypt1
              ext3       89361      4127     80466   5% /srv
tmpfs        tmpfs       10240       100     10140   1% /dev

# /etc/fstab: static file system information.
#
# <file system> <mount point>   <type>  <options>       <dump>  <pass>
proc            /proc           proc    defaults        0       0
/dev/mapper/crypt0 /               ext3    defaults,errors=remount-ro 0       1
/dev/sda2       /boot           ext3    defaults        0       2
/dev/mapper/crypt1 /srv            ext3    defaults        0       2
/dev/sda5       none            swap    
sw,loop=/dev/loop0,encryption=serpent128 0       0
/dev/hdc        /media/cdrom0   udf,iso9660 user,noauto     0       0
/dev/fd0        /media/floppy0  auto    rw,user,noauto  0       0

/etc/crypttab:
crypt0 /dev/sda1 none luks
crypt1 /dev/sda3 none luks

cryptsetup status crypt{0,1}:
/dev/mapper/crypt0 is active:
  cipher:  aes-cbc-essiv:sha256
  keysize: 256 bits
  device:  /dev/.static/dev/sda1
  offset:  2056 sectors
  size:    1957811 sectors
  mode:    read/write
/dev/mapper/crypt1 is active:
  cipher:  blowfish-cbc-essiv:sha256
  keysize: 256 bits
  device:  /dev/.static/dev/sda3
  offset:  2056 sectors
  size:    190724 sectors
  mode:    read/write

losetup -a:
/dev/loop/0: [000c]:4381 (/dev/sda5) offset=4096 encryption=serpent128 
multi-key-v3

/proc/swaps:
Filename                                Type            Size    Used    Priority
/dev/loop0                              partition       96344   0       -1

Initial boot worked:    [O]
Configure network HW:   [O]
Config network:         [O]
Detect CD:              [O]
Load installer modules: [O]
Detect hard drives:     [O]
Partition hard drives:  [O]
Create file systems:    [O]
Mount partitions:       [O]
Install base system:    [O]
Install boot loader:    [O]
Reboot:                 [O]

This install was focused on testing installation onto dm-crypt
encrypted root partition.

1. For dm-crypt I could choose the blowfish cipher with a 
keysize of 448 bits. The blowfish kernel module supports such a
large keysize, but unfortunately cryptsetup is not too happy
about it and segfaults during luksOpen of the device. It was
possible to continue the installation after changing the 
keysize to 256 bits. (Bug#381973) 

cheers, 
Max


--- End Message ---
--- Begin Message ---
Source: partman-crypto
Source-Version: 10

We believe that the bug you reported is fixed in the latest version of
partman-crypto, which is due to be installed in the Debian FTP archive:

partman-crypto-dm_10_all.udeb
  to pool/main/p/partman-crypto/partman-crypto-dm_10_all.udeb
partman-crypto-loop_10_all.udeb
  to pool/main/p/partman-crypto/partman-crypto-loop_10_all.udeb
partman-crypto_10.dsc
  to pool/main/p/partman-crypto/partman-crypto_10.dsc
partman-crypto_10.tar.gz
  to pool/main/p/partman-crypto/partman-crypto_10.tar.gz
partman-crypto_10_i386.udeb
  to pool/main/p/partman-crypto/partman-crypto_10_i386.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Max Vozeler <[EMAIL PROTECTED]> (supplier of updated partman-crypto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 21 Aug 2006 14:42:53 +0200
Source: partman-crypto
Binary: partman-crypto-dm partman-crypto partman-crypto-loop
Architecture: source i386 all
Version: 10
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team <debian-boot@lists.debian.org>
Changed-By: Max Vozeler <[EMAIL PROTECTED]>
Description: 
 partman-crypto - Add to partman support for block device encryption (udeb)
 partman-crypto-dm - Add to partman support for dm-crypt encryption (udeb)
 partman-crypto-loop - Add to partman support for loop-AES encryption (udeb)
Closes: 381870 381981 382374 382398 382605
Changes: 
 partman-crypto (10) unstable; urgency=low
 .
   [ Max Vozeler ]
   * Drop leading "_dev_" from the name of loop-AES keyfiles
   * Yes/no choices for erase data can be translated. Thanks to
     Miroslav Kure. Closes: #382605
   * Limit key sizes for dm-crypt/blowfish. Closes: #381981
   * Add lintian override for no-standards-version-field
   * Check for unencrypted swap in commit.d/unsafe_swap to catch
     setup after encrypted devices. Closes: #381870
   * Set name of dm-crypt devices according to the underlying
     block devices (e.g. hda5_crypt). Closes: #382398
 .
   [ David Härdeman ]
   * Only set the tmp option in crypttab if /tmp is on a random keyed
     mapping (closes: #382374)
 .
   [ Colin Watson ]
   * Use /dev/loop$n if the /dev/loop directory doesn't exist.
 .
   [ Updated translations ]
   * Czech (cs.po) by Miroslav Kure
   * Spanish (es.po) by Javier Fernández-Sanguino Peña
   * Finnish (fi.po) by Tapio Lehtonen
   * French (fr.po) by Christian Perrier
   * Galician (gl.po) by Jacobo Tarrio
   * Hungarian (hu.po) by SZERVÁC Attila
   * Italian (it.po) by Giuseppe Sacco
   * Khmer (km.po) by Khoem Sokhem
   * Norwegian Bokmål (nb.po) by Bjørn Steensrud
   * Portuguese (pt.po) by Miguel Figueiredo
   * Romanian (ro.po) by Eddy Petrişor
   * Russian (ru.po) by Yuri Kozlov
   * Swedish (sv.po) by Daniel Nylander
   * Tagalog (tl.po) by Eric Pareja
   * Ukrainian (uk.po) by Eugeniy Meshcheryakov
   * Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu
Files: 
 0d043959d752c5d857ee2a4efe3e42e7 609 debian-installer standard 
partman-crypto_10.dsc
 08bc4ccc1606994af698fc68dad99b25 229184 debian-installer standard 
partman-crypto_10.tar.gz
 65f38d0144b028fc571bf3bfd7428f0f 1364 debian-installer standard 
partman-crypto-dm_10_all.udeb
 3c593fa656fa088d5eeecd45f8cb77ec 1218 debian-installer standard 
partman-crypto-loop_10_all.udeb
 343713e4a80a4f60edb4acd867796974 165294 debian-installer standard 
partman-crypto_10_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE6rQ3nVvVEbfNotwRAsivAJ45RhL5MeG5eZt8nV/O0fJFKde34ACbB5OI
nnucGLbqGYEspK+eIroSDf8=
=ieTS
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to