** Also affects: ecryptfs-utils (Ubuntu)
Importance: Undecided
Status: New
** Changed in: ecryptfs
Status: Triaged => Fix Committed
** Changed in: ecryptfs-utils (Ubuntu)
Status: New => Fix Committed
** Changed in: ecryptfs-utils (Ubuntu)
Importance: Undecided => Medium
** Changed in: ecryptfs-utils (Ubuntu)
Assignee: (unassigned) => Dustin Kirkland (kirkland)
--
improve subsequent login and screen unlock times
https://bugs.launchpad.net/bugs/402748
You received this bug notification because you are a member of eCryptfs,
which is subscribed to ecryptfs-utils in ubuntu.
Status in eCryptfs - Enterprise Cryptographic Filesystem: Fix Committed
Status in “ecryptfs-utils” package in Ubuntu: Fix Committed
Bug description:
Every time pam_ecryptfs is called by the PAM stack, it will use the entered
password, decrypt the wrapped-passphrase, key-strengthen that, load the results
into the keyring, and then mount the user's private directory.
If the user's home (or private) directory is already mounted, this is a
tremendous waste of time/effort.
We should short-circuit this process if possible.
Note that the counter aspect of this is going to be tricky...
:-Dustin
_______________________________________________
Mailing list: https://launchpad.net/~ecryptfs
Post to : [email protected]
Unsubscribe : https://launchpad.net/~ecryptfs
More help : https://help.launchpad.net/ListHelp