Hi,

> You can enable debugging in /etc/security/pam_mount.conf.xml. Then the 
> commands being executed by pam_mount (and some more info) will be listed in 
> auth.log.
Debug looks like that:

Jul 29 22:16:34 oimel login[3409]: pam_mount(pam_mount.c:306) saving
authtok for session code (authtok=0x249bd40) 
Jul 29 22:16:34 oimel login[3409]: pam_env(login:session): Unable to
open env file: /etc/environment: No such file or directory
Jul 29 22:16:34 oimel login[3409]: pam_mount(pam_mount.c:458) Entered
pam_mount session stage 
Jul 29 22:16:34 oimel login[3409]: pam_mount(pam_mount.c:479) back from
global readconfig 
Jul 29 22:16:34 oimel login[3409]: pam_mount(pam_mount.c:481) per-user
configurations not allowed by pam_mount.conf.xml 
Jul 29 22:16:34 oimel login[3409]: pam_mount(misc.c:43) Session open:
(uid=0, euid=0, gid=1000, egid=1000) 
Jul 29 22:16:34 oimel login[3409]: pam_mount(rdconf2.c:181) checking
sanity of volume record (/dev/sda5) 
Jul 29 22:16:34 oimel login[3409]: pam_mount(pam_mount.c:533) about to
perform mount operations 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:366) information
for mount: 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:367)
---------------------- 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:368) (defined by
globalconf) 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:369) user:
prisma 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:370)
server:         
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:371)
volume:        /dev/sda5 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:372)
mountpoint:    /home/prisma 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:373) options:
cipher=aes-lrw-benbi,fsck 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:374)
fs_key_cipher:  
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:375)
fs_key_path:    
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:376) use_fstab:
0 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:377)
---------------------- 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:170) realpath of
volume "/home/prisma" is "/home/prisma" 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:174) checking to
see if /dev/mapper/_dev_sda5 is already mounted at /home/prisma 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:848) checking for
encrypted filesystem key configuration 
Jul 29 22:16:34 oimel login[3409]: pam_mount(mount.c:874) about to start
building mount command 
Jul 29 22:16:34 oimel login[3409]: pam_mount(misc.c:272) command: mount
[-t] [crypt] [-o cipher=aes-lrw-benbi,fsck] [/dev/sda5] [/home/prisma]  
Jul 29 22:16:34 oimel login[17040]: pam_mount(misc.c:43) set_myuid<pre>:
(uid=0, euid=0, gid=1000, egid=1000) 
Jul 29 22:16:34 oimel login[17040]: pam_mount(misc.c:43)
set_myuid<post>: (uid=0, euid=0, gid=1000, egid=1000) 

> 
> > It seems that the 
> > mount processes are unable to finish. Executing by hand works perfectly
> > (mount -t crypt -o cipher=lrw-aes-benbi,fsck /dev/sdx /home/x)
> What login program are you using - gdm?
Yes normally gdm, but the logs are exactly the same as above (with
login)

I have attached all requested files (no important information in them i
guess)
Thanks a lot...

Attachment: pam_mount.conf.xml
Description: XML document

#%PAM-1.0
auth    requisite       pam_nologin.so
auth    required        pam_env.so readenv=1
auth    required        pam_env.so readenv=1 envfile=/etc/default/locale
@include common-auth
@include common-pammount
auth    optional        pam_gnome_keyring.so
@include common-account
session required        pam_limits.so
@include common-session
session optional        pam_gnome_keyring.so auto_start
@include common-password
#
# The PAM configuration file for the Shadow `login' service
#

# Outputs an issue file prior to each login prompt (Replaces the
# ISSUE_FILE option from login.defs). Uncomment for use
# auth       required   pam_issue.so issue=/etc/issue

# Disallows root logins except on tty's listed in /etc/securetty
# (Replaces the `CONSOLE' setting from login.defs)
auth       requisite  pam_securetty.so

# Disallows other than root logins when /etc/nologin exists
# (Replaces the `NOLOGINS_FILE' option from login.defs)
auth       requisite  pam_nologin.so

# This module parses environment configuration file(s)
# and also allows you to use an extended config
# file /etc/security/pam_env.conf.
# 
# parsing /etc/environment needs "readenv=1"
session       required   pam_env.so readenv=1
# locale variables are also kept into /etc/default/locale in etch
# reading this file *in addition to /etc/environment* does not hurt
session       required   pam_env.so readenv=1 envfile=/etc/default/locale

# Standard Un*x authentication.
@include common-auth

# PAMMOUNT
@include common-pammount

# This allows certain extra groups to be granted to a user
# based on things like time of day, tty, service, and user.
# Please edit /etc/security/group.conf to fit your needs
# (Replaces the `CONSOLE_GROUPS' option in login.defs)
auth       optional   pam_group.so

# Uncomment and edit /etc/security/time.conf if you need to set
# time restrainst on logins.
# (Replaces the `PORTTIME_CHECKS_ENAB' option from login.defs
# as well as /etc/porttime)
# account    requisite  pam_time.so

# Uncomment and edit /etc/security/access.conf if you need to
# set access limits.
# (Replaces /etc/login.access file)
# account  required       pam_access.so

# Sets up user limits according to /etc/security/limits.conf
# (Replaces the use of /etc/limits in old login)
session    required   pam_limits.so

# Prints the last login info upon succesful login
# (Replaces the `LASTLOG_ENAB' option from login.defs)
session    optional   pam_lastlog.so

# Prints the motd upon succesful login
# (Replaces the `MOTD_FILE' option in login.defs)
session    optional   pam_motd.so

# Prints the status of the user's mailbox upon succesful login
# (Replaces the `MAIL_CHECK_ENAB' option from login.defs). 
#
# This also defines the MAIL environment variable
# However, userdel also needs MAIL_DIR and MAIL_FILE variables
# in /etc/login.defs to make sure that removing a user 
# also removes the user's mail spool file.
# See comments in /etc/login.defs
session    optional   pam_mail.so standard

# SELinux needs to intervene at login time to ensure that the process
# starts in the proper default security context.
# Uncomment the following line to enable SELinux
# session required pam_selinux.so multiple

# Standard Un*x account and session
@include common-account
@include common-session
@include common-password
# Include this file in every /etc/pam.d/SERVICE you use for login:
# [...]
# @include common-auth
# @include common-session
# [...]
# # added for libpam-mount
# @include common-pammount
#
# Make sure that the common-auth and common-session includes are
# above the common-pammount include (just as in the example above).

# replace "optional" with "required" if a user must mount the specified
# volumes, for example the home directory

# make sure that there is no PAM module loaded with a "sufficient"
# priority before these entries, else the pam_mount module is not
# executed

# for configuration details about different login programs see
# /usr/share/doc/libpam-mount/README.Debian.gz

auth       required   pam_mount.so try_first_pass
session    required   pam_mount.so try_first_pass

Reply via email to