[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2017-10-26 Thread Bug Watch Updater
Launchpad has imported 14 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=480547.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.


On 2009-01-18T19:22:45+00:00 Denis wrote:

Created attachment 329304
Text file of session to show commands used to reproduce problem

Description of problem:Any passphrase entered at mount will decrypt file


Version-Release number of selected component (if applicable):
ecryptfs-utils-61-0.fc10.i386
kernel-2.6.27.9-159.fc10.i686


How reproducible:Entering a wrong passphrase will decrypt file


Steps to Reproduce:
1.As root, mount directory using ecryptfs
2.put file in directory
3.umount directory
4.mount directory again with wrong passphrase
5.file can be retrieved
  
Actual results: file can be retrieved


Expected results:should not be able to read file if wrong passphrase is entered 
at mount


Additional info: Everything works as expected on FC9. Giving wrong passphrase 
during mount gives the error "Input/output error" when trying to access crypted 
file.

Reply at: https://bugs.launchpad.net/ubuntu/+source/ecryptfs-
utils/+bug/313812/comments/2


On 2009-01-23T20:21:59+00:00 Eric wrote:

I think this is a feature, not a bug.

The first passphrase ended up cached in your kernel crypto keychain, and
so was still available to decrypt your old files.  If you wish to clear
it, use keyctl.

Other users will not be able to see these files by entering arbitrary
passphrases.

-Eric

Reply at: https://bugs.launchpad.net/ubuntu/+source/ecryptfs-
utils/+bug/313812/comments/3


On 2009-01-24T15:39:49+00:00 Denis wrote:

Hi Eric,

Thanks a lot for the explanation. I played with keyctl and now see what is 
going on.
However, this automatic caching leads to a false sense of security. Whatever 
strength I use for the crypted FS key (30+ characters), the overall security is 
only as strong as my (8 to 10 character) password. And I don't get any warning 
of this fact.

Is there a way to disable this automatic caching?
Until I understand more completely the whole process, it seems I must do an 
alias on the umount command to be immediately followed by "keyctl clear @u" 
command.

Thank you very much for the time you spent on this.

Reply at: https://bugs.launchpad.net/ubuntu/+source/ecryptfs-
utils/+bug/313812/comments/4


On 2009-01-26T16:56:31+00:00 Michal wrote:

Hi,

I've talked about this with upstream with this conclusions:

1) it's not a bug, it's a feature. Even  gnome-keyring doesn't clear out
a key after an application uses it

2) If you want to clear your keyring, use `keyctl clear @u`

3) the password at mount time is not a password to read existing files.
It is a password that is turned into a key which is used when creating
new files

4) there will be added new mount option that will automatically clear
keyring after umount (so mount with wrong passphrase will not work any
more)

Reply at: https://bugs.launchpad.net/ubuntu/+source/ecryptfs-
utils/+bug/313812/comments/5


On 2009-01-27T10:58:22+00:00 Denis wrote:

Thanks for the precisions.
Item 3) makes it very clear and 4) will be a welcome enhancement.
Thanks again.

Reply at: https://bugs.launchpad.net/ubuntu/+source/ecryptfs-
utils/+bug/313812/comments/9


On 2009-01-29T08:58:23+00:00 Michal wrote:

extract from irc:
> let me answer this question a different way, "when is this an actual problem?"
> first, only a root user can perform an ecryptfs mount
> non-root users can perform mounts through the setuid binary, 
> mount.ecryptfs_private, but in that case, what they can do is tightly 
> constrained
> to perform a generic mount, it has to be a root user
> now, for this to be a problem, the *root* user must:
> a) establish an ecryptfs mount with one passphrase
> b) unmount
> c) do *not* clear the keyring
> d) do *not* logout of the session
> and then a malicious user must obtain access to *that* session
> by either sitting down at the terminal, or accessing via vnc or screen or 
> some such
> at that point, the malicious user has a root shell
> and while accessing some encrypted data is a bad thing, there are a lot of 
> bad things that can happen at that point
> so we can help with (c) by clearing the keys on unmount
> but ultimately, (d) is the biggie ...  the root user needs to logout of the 
> session if they want their data protected


so I think you can still feel yourself safe :)

anyway, 

[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2014-10-20 Thread Thiago Martins
I'm seeing this problem with Ubuntu 14.10 when using
`init=/lib/systemd/systemd` but I'm not sure if it is related or not...
:-/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2014-10-20 Thread papukaija
@Thiago: Please open a new bug if you still experience issues with
ecryptfs, as this bug has is fixed. Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-08-02 Thread Dustin Kirkland
User over in  Bug #725862 is reporting a regression in Maverick after
taking this update

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-07-31 Thread Launchpad Bug Tracker
This bug was fixed in the package ecryptfs-utils - 83-0ubuntu3.1maverick

---
ecryptfs-utils (83-0ubuntu3.1maverick) maverick-proposed; urgency=low

  * Cherry pick upstream bzr commit r520
  * src/utils/mount.ecryptfs_private.c:
- fix bug LP: #313812, clear used keys on unmount
- add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
  umount.ecryptfs behave similarly
- use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
 -- Dustin Kirkland kirkl...@ubuntu.com   Fri, 11 Feb 2011 17:21:59 -0600

** Changed in: ecryptfs-utils (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-07-30 Thread Marc Deslauriers
** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-07-28 Thread Marc Deslauriers
This has been in maverick-proposed for 22 weeks now. Could someone test
it, please.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-07-28 Thread C de-Avillez
Verified for Maverick:

Welcome to the Ubuntu Server!
 * Documentation:  http://www.ubuntu.com/server/doc
Last login: Thu Jul 28 14:41:12 2011
root@ubuntu:~# mount
/dev/vda1 on / type ext4 (rw,errors=remount-ro)
proc on /proc type proc (rw,noexec,nosuid,nodev)
none on /sys type sysfs (rw,noexec,nosuid,nodev)
fusectl on /sys/fs/fuse/connections type fusectl (rw)
none on /sys/kernel/debug type debugfs (rw)
none on /sys/kernel/security type securityfs (rw)
none on /dev type devtmpfs (rw,mode=0755)
none on /dev/pts type devpts (rw,noexec,nosuid,gid=5,mode=0620)
none on /dev/shm type tmpfs (rw,nosuid,nodev)
none on /var/run type tmpfs (rw,nosuid,mode=0755)
none on /var/lock type tmpfs (rw,noexec,nosuid,nodev)
none on /var/lib/ureadahead/debugfs type debugfs (rw,relatime)

# ubuntu has not logged in since boot:

root@ubuntu:~# ls /home/ubuntu
Access-Your-Private-Data.desktop  README.txt

# ubuntu logged in on another pseudo terminal:

root@ubuntu:~# mount | grep ubuntu
/home/ubuntu/.Private on /home/ubuntu type ecryptfs 
(ecryptfs_sig=5cb83cfa021dc74e,ecryptfs_fnek_sig=bb92820c0e6e63ad,ecryptfs_cipher=aes,ecryptfs_key_bytes=16,ecryptfs_unlink_sigs)

# ubuntu logged off:

root@ubuntu:~# mount | grep ubuntu
root@ubuntu:~# su - ubuntu
keyctl_search: Required key not available
Perhaps try the interactive 'ecryptfs-mount-private'
To run a command as administrator (user root), use sudo command.
See man sudo_root for details.

Verification successful.
ubuntu@ubuntu:~$ ls
Access-Your-Private-Data.desktop  README.txt
ubuntu@ubuntu:~$ 

---
Ubuntu Bug Squad volunteer triager
http://wiki.ubuntu.com/BugSquad

** Tags added: verification-done-maverick

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-07-28 Thread Serge Hallyn
I also verified on maverick.  Note that the directions in the
description are not right.  Comment #39 gives the right recipe.  In any
case, -proposed fixes it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/313812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-05-02 Thread Martin Pitt
This package has been in karmic-proposed for a long time without
verification. I removed it as karmic is  end-of-life now.

** Changed in: ecryptfs-utils (Ubuntu Karmic)
   Status: Fix Committed = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-04-19 Thread Martin Pitt
** Changed in: ecryptfs-utils (Ubuntu Karmic)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-04-19 Thread Launchpad Bug Tracker
This bug was fixed in the package ecryptfs-utils - 83-0ubuntu3.1

---
ecryptfs-utils (83-0ubuntu3.1) lucid-proposed; urgency=low

  * Cherry pick upstream bzr commit r520
  * src/utils/mount.ecryptfs_private.c:
- fix bug LP: #313812, clear used keys on unmount
- add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
  umount.ecryptfs behave similarly
- use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
 -- Dustin Kirkland kirkl...@ubuntu.com   Fri, 11 Feb 2011 17:21:59 -0600

** Changed in: ecryptfs-utils (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-04-19 Thread Martin Pitt
Setting back to v-needed for karmic/maverick.

** Tags removed: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-04-18 Thread C de-Avillez
Confirmed fixed for Lucid, ecryptfs-utils 83-0ubuntu3.1.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-04-18 Thread Martin Pitt
** Tags added: verification-done
** Tags removed: verification-needed

** Tags added: verification-done-lucid verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-03-08 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/karmic-proposed/ecryptfs-utils

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-23 Thread Martin Pitt
Accepted ecryptfs-utils into maverick-proposed, the package will build
now and be available in a few hours. Please test and give feedback here.
See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you in advance!

** Changed in: ecryptfs-utils (Ubuntu Maverick)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-23 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/ecryptfs-utils

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-15 Thread Martin Pitt
Accepted ecryptfs-utils into lucid-proposed, the package will build now
and be available in a few hours. Please test and give feedback here. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed. Thank you in advance!

** Changed in: ecryptfs-utils (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Tags added: verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-15 Thread Martin Pitt
Rejecting uploaded maverick update:

FAILED: ecryptfs-utils (The source ecryptfs-utils - 83-0ubuntu3.1 is
already accepted in ubuntu/lucid and you cannot upload the same version
within the same distribution. You have to modify the source version and
re-upload.)

Please reupload with fixed version number.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-15 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/ecryptfs-utils

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-11 Thread Dustin Kirkland
** Changed in: ecryptfs-utils (Ubuntu Karmic)
   Status: Triaged = In Progress

** Changed in: ecryptfs-utils (Ubuntu Karmic)
 Assignee: (unassigned) = Dustin Kirkland (kirkland)

** Changed in: ecryptfs-utils (Ubuntu Lucid)
   Status: Triaged = In Progress

** Changed in: ecryptfs-utils (Ubuntu Lucid)
 Assignee: (unassigned) = Dustin Kirkland (kirkland)

** Changed in: ecryptfs-utils (Ubuntu Maverick)
   Status: Triaged = In Progress

** Changed in: ecryptfs-utils (Ubuntu Maverick)
 Assignee: (unassigned) = Dustin Kirkland (kirkland)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-02-11 Thread Dustin Kirkland
Howdy,

I just prepared a round of SRUs to fix this bug in Karmic, Lucid, and
Maverick.

I would really appreciate if some of the people suffering from this bug
could test out the proposed packages as soon as they're accepted and
built.

Cheers!
Dustin

** Description changed:

  How to reproduce :
  
  1) setup a private directory
  2)
  sudo -s
  
  cd /
  
  mkdir source
  
  mkdir target
  
  cp ~user/.Private/example.pdf source
  
  file /source/example.pdf
  /source/example.pdf: data
  
  mount -t ecryptfs source target
  Passphrase: type anything that is not your passphrase or passwords
- Select cipher: 
-  1) aes: blocksize = 16; min keysize = 16; max keysize = 32 (loaded)
-  2) blowfish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
-  3) des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 (not loaded)
-  4) twofish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
-  5) cast6: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
-  6) cast5: blocksize = 8; min keysize = 5; max keysize = 16 (not loaded)
- Selection [aes]: 
- Select key bytes: 
-  1) 16
-  2) 32
-  3) 24
- Selection [16]: 
+ Select cipher:
+  1) aes: blocksize = 16; min keysize = 16; max keysize = 32 (loaded)
+  2) blowfish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
+  3) des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 (not loaded)
+  4) twofish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
+  5) cast6: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
+  6) cast5: blocksize = 8; min keysize = 5; max keysize = 16 (not loaded)
+ Selection [aes]:
+ Select key bytes:
+  1) 16
+  2) 32
+  3) 24
+ Selection [16]:
  Enable plaintext passthrough (y/n) [n]: n
  Attempting to mount with the following options:
-   ecryptfs_key_bytes=16
-   ecryptfs_cipher=aes
-   ecryptfs_sig=4c748f746abcc24e
+   ecryptfs_key_bytes=16
+   ecryptfs_cipher=aes
+   ecryptfs_sig=4c748f746abcc24e
  WARNING: Based on the contents of [/root/.ecryptfs/sig-cache.txt],
- it looks like you have never mounted with this key 
- before. This could mean that you have typed your 
+ it looks like you have never mounted with this key
+ before. This could mean that you have typed your
  passphrase wrong.
  
  Would you like to proceed with the mount (yes/no)? yes
  Would you like to append sig [4c748f746abcc24e] to
- [/root/.ecryptfs/sig-cache.txt] 
+ [/root/.ecryptfs/sig-cache.txt]
  in order to avoid this warning in the future (yes/no)? no
  Not adding sig to user sig cache file; continuing with mount.
  Mounted eCryptfs
  
  file /source/example.pdf
  /source/example.pdf: PDF document, version 1.4
  
+ Now I know that the files are really encrypted (using a wrong passphrase
+ on files copied to another computer makes the file unreadable), but I
+ don't understand how root on my system can mount my files without the
+ correct passphrase... is the passphrase stored somewhere? This is really
+ strange and doesn't give me too much confidence in this technology.
+ Let's hope I overlooked something.
  
- Now I know that the files are really encrypted (using a wrong passphrase on 
files copied to another computer makes the file unreadable), but I don't 
understand how root on my system can mount my files without the correct 
passphrase... is the passphrase stored somewhere? This is really strange and 
doesn't give me too much confidence in this technology. Let's hope I overlooked 
something.
+ 
+ SRU Justification:
+ 
+ Impact: This bug affects users of Ubuntu's encrypted home/private
+ directory feature if they are concerned about a malicious or snooping
+ root user on the system.
+ 
+ Minimal patch: The minimal patch can be found in upstream commit r520:
+  * http://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/520
+ 
+ Reproduce instructions:  Follow the excellent instructions in this bug
+ description.
+ 
+ Regression potential: Minimal.  The key removal code is the last thing that 
happens before the umount is attempted.  If for some reason the new 
key-unlinking code failed (it should not; errors are ignored; keys are removed 
on a best-effort basis), then the umount might not happen.  As I said, this 
should be a near impossible situation.  I think this update should be very 
safe.  It's been in Natty now for a couple of weeks.
+ 

** Changed in: ecryptfs-utils (Ubuntu Karmic)
Milestone: None = karmic-updates

** Changed in: ecryptfs-utils (Ubuntu Lucid)
Milestone: None = lucid-updates

** Changed in: ecryptfs-utils (Ubuntu Maverick)
Milestone: None = maverick-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com

[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Serge Hallyn
@Dustin,

is there any reason why we can't simply use the same fix as is being
used in mount.ecryptfs.c, in mount.ecryptfs_private.c?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Dustin Kirkland
** Changed in: ecryptfs
   Status: Triaged = In Progress

** Also affects: ecryptfs-utils (Ubuntu Natty)
   Importance: Medium
   Status: Confirmed

** Changed in: ecryptfs-utils (Ubuntu Natty)
   Status: Confirmed = In Progress

** Changed in: ecryptfs-utils (Ubuntu Natty)
 Assignee: (unassigned) = Dustin Kirkland (kirkland)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Launchpad Bug Tracker
** Branch linked: lp:ecryptfs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Dustin Kirkland
Let's give this a week or two in Natty Alpha2, and then we can put
together an SRU for Karmic/Lucid/Maverick.

** Changed in: ecryptfs-utils (Ubuntu Jaunty)
   Status: Confirmed = Won't Fix

** Changed in: ecryptfs-utils (Ubuntu Karmic)
   Status: Confirmed = Triaged

** Changed in: ecryptfs-utils (Ubuntu Maverick)
   Status: Confirmed = Triaged

** Changed in: ecryptfs-utils (Ubuntu Lucid)
   Status: Confirmed = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Dustin Kirkland
Okay, fixed this once and for all in r520!

Big thanks to Tyler and Serge for helping find a suitable approach (and
believe me, I have spent several days trying several different
approaches).

So the current fix modifies the setuid umount.ecryptfs_private helper.
We can't do it in umount.ecryptfs, because this runs as root, and root
can't unlink the non-root user's keys (at least not with the existing
implementation).  But if we do it in the umount.ecryptfs_private helper,
we can do it as the user before doing the setuid(0) and calling the
unmount.  Note that the failure to unlink the keys is a non-fatal error.
A suitable message (and a pointer to how to unlink keys correctly) is
shown on stderr, but the unlink proceeds.  Doing this here is quite
nice, as it allows us to use the reference counting code, etc, and only
unlink when there are no other open references to the mount.

This will be released in ecryptfs-utils-85.

** Changed in: ecryptfs
   Status: In Progress = Fix Committed

** Changed in: ecryptfs-utils (Ubuntu Natty)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Dustin Kirkland
** Changed in: ecryptfs
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Launchpad Bug Tracker
This bug was fixed in the package ecryptfs-utils - 85-0ubuntu1

---
ecryptfs-utils (85-0ubuntu1) natty; urgency=low

  [ Dustin Kirkland ]
  * src/utils/ecryptfs-recover-private: clean sigs of invalid characters
  * src/utils/mount.ecryptfs_private.c:
- fix bug LP: #313812, clear used keys on unmount
- add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
  umount.ecryptfs behave similarly
- use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek

  [ pres...@gmail.com ]
  * src/utils/ecryptfs-migrate-home:
- support user databases outside of /etc/passwd, LP: #627506
 -- Dustin Kirkland kirkl...@ubuntu.com   Sun, 19 Dec 2010 10:50:52 -0600

** Changed in: ecryptfs-utils (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2011-01-31 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/ecryptfs-utils

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/313812

Title:
  umount of ecryptfs does not automatically clear the keyring (can be
  mounted by root later)

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-08-13 Thread Dave Walker
Has this stalled? Is anybody actively looking for a resolution to this
issue?

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-08-13 Thread Dustin Kirkland
On Fri, Aug 13, 2010 at 7:42 AM, Dave Walker davewal...@ubuntu.com wrote:
 Has this stalled? Is anybody actively looking for a resolution to this
 issue?

I'm not currently looking at it.

I have a working solution that requires two minor, empty stubs added
to PAM, and a small patch to eCryptfs.  The PAM hooks were rejected.
I haven't had the drive to push harder on that, or look for a
different solution.

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-08-13 Thread Aldo Caruso
More side effects working with encrypted homes:

1) The same side effect explained above between user1 and user2 happens
if user2 is a privileged user and if user2 has his home directory
encrypted.

2) If you have your home encrypted, accessing remotely with ssh is not
possible if you demand using private  public keys (setting
PasswordAuthentication = no in the file /etc/ssh/sshd_config ), because
the sshd daemon has to access ~/.ssh/authorized_keys file in a directory
which is not yet mounted.

IMHO, home directory encryption is still unreliable and it should be
userd with care. In its current state, it only protects after rebooting
the machine ( please tell me if this observation is wrong ), and
consequently only protects from a disk or machine physical theft.

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-08-09 Thread Aldo Caruso
The following effect may be a consequence of the same bug.

Distribution: Ubuntu 10.04

1) Create user1 ( with administrative privileges )
2) Create user2 ( without administrative privileges )
3) Logged as user2 set up a private directory, logout  login, create some 
files in ~/Private, logout.
4) Logged as user1 change user2 password.
5) Logged as user2 (using the new password defined by user1) you can access the 
/home/user2/Private directory and its contents.

The effect persists until you reboot.

Conclusion:
A privileged user can access private data from others (who recently have logged 
in and out ) by means of changing their password.

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-07-28 Thread papukaija
@Serge: I haven't submitted this bug or not even commented on it so why
did you write Quoting papukaija ? I only added some tags to this bug
report and nothing else.

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-07-28 Thread Serge Hallyn
Quoting papukaija (313...@bugs.launchpad.net):
 @Serge: I haven't submitted this bug or not even commented on it so why
 did you write Quoting papukaija ? I only added some tags to this bug
 report and nothing else.

Sorry, my mail client added that.

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-07-27 Thread Serge Hallyn
Quoting papukaija (313...@bugs.launchpad.net):
 ** Tags added: jaunty karmic lucid maverick patch
 
 -- 
 umount of ecryptfs does not automatically clear the keyring (can be mounted 
 by root later)
 https://bugs.launchpad.net/bugs/313812
 You received this bug notification because you are a member of eCryptfs
 Developers, which is subscribed to eCryptfs.
 
 Status in eCryptfs - Enterprise Cryptographic Filesystem: Triaged
 Status in “ecryptfs-utils” package in Ubuntu: Confirmed
 Status in “ecryptfs-utils” source package in Lucid: Confirmed
 Status in “ecryptfs-utils” source package in Maverick: Confirmed
 Status in “ecryptfs-utils” source package in Jaunty: Confirmed
 Status in “ecryptfs-utils” source package in Karmic: Confirmed
 Status in “ecryptfs-utils” package in Fedora: Fix Released
 
 Bug description:
 How to reproduce :
 
 1) setup a private directory
 2)
 sudo -s
 
 cd /
 
 mkdir source
 
 mkdir target
 
 cp ~user/.Private/example.pdf source
 
 file /source/example.pdf
 /source/example.pdf: data
 
 mount -t ecryptfs source target
 Passphrase: type anything that is not your passphrase or passwords
 Select cipher: 
  1) aes: blocksize = 16; min keysize = 16; max keysize = 32 (loaded)
  2) blowfish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
  3) des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 (not loaded)
  4) twofish: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
  5) cast6: blocksize = 16; min keysize = 16; max keysize = 32 (not loaded)
  6) cast5: blocksize = 8; min keysize = 5; max keysize = 16 (not loaded)
 Selection [aes]: 
 Select key bytes: 
  1) 16
  2) 32
  3) 24
 Selection [16]: 
 Enable plaintext passthrough (y/n) [n]: n
 Attempting to mount with the following options:
   ecryptfs_key_bytes=16
   ecryptfs_cipher=aes
   ecryptfs_sig=4c748f746abcc24e
 WARNING: Based on the contents of [/root/.ecryptfs/sig-cache.txt],
 it looks like you have never mounted with this key 
 before. This could mean that you have typed your 
 passphrase wrong.
 
 Would you like to proceed with the mount (yes/no)? yes
 Would you like to append sig [4c748f746abcc24e] to
 [/root/.ecryptfs/sig-cache.txt] 
 in order to avoid this warning in the future (yes/no)? no
 Not adding sig to user sig cache file; continuing with mount.
 Mounted eCryptfs
 
 file /source/example.pdf
 /source/example.pdf: PDF document, version 1.4

But you're not just logging in as root.  You're using sudo which will keep
your keyrings and much of your environment from your user shell.  Try the
following instead:

Create a new user.  After doing the ecryptfs unmount, 'switch user' (leave
your original user logged in) to the new user, and sudo from that new user.
Then try the ecryptfs mount from that shell.  Does it still work?

 Now I know that the files are really encrypted (using a wrong passphrase on
 files copied to another computer makes the file unreadable), but I don't
 understand how root on my system can mount my files without the correct
 passphrase... is the passphrase stored somewhere? This is really strange and
 doesn't give me too much confidence in this technology. Let's hope I

Good!  WhatEVER you do, do not trust anything which claims to keep you
safe from root.

 overlooked something.

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-07-26 Thread papukaija
** Tags added: jaunty karmic lucid maverick patch

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-05-06 Thread Marc Deslauriers
** Changed in: ecryptfs-utils (Ubuntu)
   Status: Fix Released = Confirmed

** Also affects: ecryptfs-utils (Ubuntu Jaunty)
   Importance: Undecided
   Status: New

** Also affects: ecryptfs-utils (Ubuntu Karmic)
   Importance: Undecided
   Status: New

** Also affects: ecryptfs-utils (Ubuntu Maverick)
   Importance: Undecided
   Status: Confirmed

** Also affects: ecryptfs-utils (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: ecryptfs-utils (Ubuntu Lucid)
   Status: New = Confirmed

** Changed in: ecryptfs-utils (Ubuntu Karmic)
   Status: New = Confirmed

** Changed in: ecryptfs-utils (Ubuntu Jaunty)
   Importance: Undecided = Medium

** Changed in: ecryptfs-utils (Ubuntu Jaunty)
   Status: New = Confirmed

** Changed in: ecryptfs-utils (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: ecryptfs-utils (Ubuntu Maverick)
   Importance: Undecided = Medium

** Changed in: ecryptfs-utils (Ubuntu Karmic)
   Importance: Undecided = Medium

** This bug has been flagged as a security vulnerability

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-02-17 Thread Dustin Kirkland
** Visibility changed to: Public

** This bug is no longer flagged as a security vulnerability

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 313812] Re: umount of ecryptfs does not automatically clear the keyring (can be mounted by root later)

2010-02-17 Thread Tyler Hicks
Dustin, I realize those patches are not in finished form, but it looks
like the changes to ecryptfs_add_auth_tok_to_keyring() will cause a
regression in the case of non-pam initiated eCryptfs mounts.  I don't
think we want auth toks for those types of mounts to be specific to any
session.  Also, the keyring variable should technically be of type
key_serial_t.

Do you know what is going on in ecryptfs_validate_keyring() when
KEY_SPEC_SESSION_KEYRING is being linked to KEY_SPEC_USER_KEYRING?
Isn't that essentially the same thing as what your patch is doing with
the first call to add_key() in ecryptfs_add_auth_tok_to_keyring()?

-- 
umount of ecryptfs does not automatically clear the keyring (can be mounted by 
root later)
https://bugs.launchpad.net/bugs/313812
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs