Package: ecryptfs-utils
Version: 64-2
Severity: minor
Tags: patch
It looks like there were ecryptfs-setup-confidential (I see it on the
https://wiki.ubuntu.com/EncryptedPrivateDirectory under "Getting
Involved"). But current upstream and Debian ships with
ecryptfs-setup-private and uses ~/Private/ as the default mount point.
I think ecryptfs-utils/doc/ecryptfs-pam-doc.txt in the source needs to
be updated accordingly to reduce confusion. I attach patch here.
Please forward this to upstream.
By the way, I do not see auth-client-config package in Debian.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (800, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages ecryptfs-utils depends on:
ii libc6 2.7-16 GNU C Library: Shared libraries
ii libecryptfs0 64-2 ecryptfs cryptographic filesystem
ii libgcrypt11 1.4.1-1 LGPL Crypto library - runtime libr
ii libgpg-error0 1.4-2 library for common error values an
ii libgpgme11 1.1.6-2 GPGME - GnuPG Made Easy
ii libkeyutils1 1.2-9 Linux Key Management Utilities (li
ii libpam0g 1.0.1-4+b1 Pluggable Authentication Modules l
ii libpkcs11-helper1 1.05-1 library that simplifies the intera
ii libssl0.9.8 0.9.8g-14 SSL shared libraries
ii libtspi1 0.3.1-7 open-source TCG Software Stack (li
ecryptfs-utils recommends no packages.
Versions of packages ecryptfs-utils suggests:
pn auth-client-config <none> (no description available)
ii opencryptoki 2.2.6+dfsg-5 PKCS#11 implementation for Linux (
-- no debconf information
--- ecryptfs-pam-doc.txt.orig 2008-11-08 13:15:07.000000000 +0900
+++ ecryptfs-pam-doc.txt 2008-11-08 13:15:51.000000000 +0900
@@ -7,11 +7,11 @@
eCryptfs is set up in the Open Client to automatically mount on user
login. The default mount is an overlay mount on top of
-~/Confidential/, and it uses a passphrase-based key.
+~/Private/, and it uses a passphrase-based key.
eCryptfs requires that the user's mount passphrase be inserted into
the user session keyring in order to access the files under the
-~/Confidential/ mount point. The mount passphrase is wrapped
+~/Private/ mount point. The mount passphrase is wrapped
(encrypted) with the user's login passphrase and is stored in the
~/.ecryptfs/wrapped-passphrase file. When the user logs in, the
eCryptfs PAM module intercepts the user's login passphrase, uses it to
@@ -21,7 +21,7 @@
Once the user has logged in, his ~/.bash_profile script is executed by
the Bash shell. A segment of code in ~/.bash_profile checks for the
existence of a ~/.ecryptfs/auto-mount file. If this file exists, then
-code is executed to mount ~/Confidential/ via eCryptfs.
+code is executed to mount ~/Private/ via eCryptfs.
When the user changes his login credentials, the eCryptfs PAM module
unwraps the mount passphrase in ~/.ecryptfs/wrapped-passphrase with
@@ -38,7 +38,7 @@
In order for these operations to complete successfully, the eCryptfs
PAM module needs to be inserted into the PAM stack in
/etc/pam.d/system-auth, an entry needs to be in /etc/fstab for the
-user's ~/Confidential/ directory, the ~/.ecryptfs/auto-mount and
+user's ~/Private/ directory, the ~/.ecryptfs/auto-mount and
~/.ecryptfs/wrapped-passphrase files need to exist, and the mount code
needs to be in the user's ~/.bash_profile script.
@@ -75,7 +75,7 @@
The following line needs to be added to /etc/fstab:
-/home/user/Confidential /home/user/Confidential ecryptfs rw,ecryptfs_sig=deadbeefbaadf00d,ecryptfs_cipher=aes,ecryptfs_key_bytes=16,user,noauto, 0 0
+/home/user/Private /home/user/Private ecryptfs rw,ecryptfs_sig=deadbeefbaadf00d,ecryptfs_cipher=aes,ecryptfs_key_bytes=16,user,noauto, 0 0
Where 'user' is the username and 'deadbeefbaadf00d' is the mount
passphrase signature/identifier value. This signature is in /etc/mtab
@@ -85,9 +85,9 @@
~/.bash_profile:
if test -e $HOME/.ecryptfs/auto-mount; then
- mount | grep "$HOME/Confidential type ecryptfs"
+ mount | grep "$HOME/Private type ecryptfs"
if test $? != 0; then
- mount -i $HOME/Confidential
+ mount -i $HOME/Private
fi
fi
ecryptfs-zombie-kill
@@ -112,18 +112,18 @@
Troubleshooting
- Problem: The ~/Confidential/ directory is not being mounted on login.
- Problem: The ~/Confidential/ directory is mounted on login, but
- the files under the ~/Confidential/ directory cannot be read.
+ Problem: The ~/Private/ directory is not being mounted on login.
+ Problem: The ~/Private/ directory is mounted on login, but
+ the files under the ~/Private/ directory cannot be read.
Solution: Your ~/.ecryptfs/wrapped-passphrase file may be
incorrect. Run ecryptfs-wrap-passphrase to recreate it if
that is the case. Otherwise, the PAM stack is not set up
correctly. Otherwise, the code to mount your
- ~/Confidential directory is not in your ~/.bash_profile
+ ~/Private directory is not in your ~/.bash_profile
file.
- Problem: The ~/Confidential/ directory mounts on console login
+ Problem: The ~/Private/ directory mounts on console login
but not on GDM login.
Solution: Make sure you have the most recent
@@ -139,7 +139,7 @@
Problem: How to I backup my encrypted files?
- Solution: Unmount your ~/Confidential directory so that
+ Solution: Unmount your ~/Private directory so that
the lower filesystem files (in encrypted state) show up at
that path location, and then copy the files in that
directory to another storage device.