Package: linux-2.6
Version: 2.6.14-4
Severity: important
External module builds against ia64 headers currently fail in the
linker stage with an error about missing arch/ia64/module.lds.
Perhaps this is a reincarnation of #266804 ?
Package: linux-2.6
Version: 2.6.12-10
Severity: important
This bug is a bit weird :-)
Apparently the binaries in m68k -headers were built for i386.
This breaks builds of external modules as they try to execute eg.
scripts/basic/fixdep on m68k.
$ dpkg -x
Hi Clytie,
On Wed, May 18, 2005 at 09:40:25PM +0930, Clytie Siddall wrote:
Package: cdtool
Version: 2.1.5-13
Severity: minor
Tags: l10n, patch
The Vietnamese translation for debconf: cdtool
Thanks. I hope to upload a version with your translation later today.
cheers,
Max
--
To
This is CVE-2005-4532.
BTW, did you have a chance to look at this bug yet? I'm considering
to do an NMU for unstable, but I'd prefer if someone who actively uses
scponly and who could test the changes would do the upload.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
Hi Bryan,
On Fri, Jan 06, 2006 at 03:07:41PM -0500, Bryan Donlan wrote:
On my system (using udev, kernel 2.6.12-1-k7) only /dev/loop/0 is
created automatically. This causes mount -o loop to fail after one loop
device is in use, even though the loop module supports eight.
On this system here
Package: mzscheme
Version: 209-9
Severity: important
The postinst of mzscheme fails when I try to upgrade to 209-9.
I can't make much sense of the error it returns unfortunately.
(log attached).
Random bits of other information:
Purging mzscheme and reinstalling gives the same failure.
Running
On Wed, Jan 11, 2006 at 06:38:54PM +0100, Max Vozeler wrote:
Package: mzscheme
Version: 209-9
Severity: important
The postinst of mzscheme fails when I try to upgrade to 209-9.
I can't make much sense of the error it returns unfortunately.
(log attached).
It seems like this has something
I've tested and confirmed the postinst failure in a clean chroot.
mzscheme configures without problem if slib is NOT installed, but
fails if slib (3a2-3) IS installed.
Perhaps this bug should be against slib. Unfortunately I have no
idea how slib and mzscheme interact.
cheers,
Max
--
To
Package: module-assistant
Version: 0.10.2
Hi Eduard,
finally the day has come where loop-AES can be built without requiring
kernel source trees! :-) Please remove modass/packages/loop-aes-source
and add loop-aes-source to compliant.list.
cheers,
Max
diff -ruN
I wrote:
It would be useful to have uuencode available in busybox-udeb for the
support of block device encryption in partman-crypto. In particular, I'd
like to use uuencode to create loop-AES multi-key style encryption keys.
I did the comparison again today and got updated information on the
Hi Christian,
On Thu, Dec 15, 2005 at 08:12:05AM +0100, Christian T. Steigies wrote:
On Tue, Dec 06, 2005 at 03:48:40PM +0100, Max Vozeler wrote:
Apparently the binaries in m68k -headers were built for i386.
Yes, this may very well be possible, since the m68k linux-* packages
were cross
On Thu, Dec 15, 2005 at 02:39:45PM +0100, Sven Luther wrote:
Are you sure you are using the per-flavour header packages
(linux-headers-2.6.14-2-flavour ?
The package build-depends on linux-headers-2.6.14-2-all and
uses the per-flavour headers for the actual build.
Also, do you know about the
On Tue, Dec 13, 2005 at 10:54:34AM +1030, Arthur Marsh wrote:
Package: linux-image-2.6.14-2-686
Version: 2.6.14-5
Followup-For: Bug #343048
Same thing happens here. I also had problems trying to install
loop-aes at the same time as upgrading from 2.6.14-4 to 2.6.14-5. The
installation went
Hi Bastian,
On Sat, Dec 17, 2005 at 02:25:25PM +0100, Bastian Blank wrote:
On Tue, Aug 16, 2005 at 08:58:42PM +0200, Max Vozeler wrote:
It would be useful to have uuencode available in busybox-udeb for the
support of block device encryption in partman-crypto. In particular, I'd
like to use
Hi Bastian,
On Sat, Dec 17, 2005 at 02:25:25PM +0100, Bastian Blank wrote:
On Tue, Aug 16, 2005 at 08:58:42PM +0200, Max Vozeler wrote:
It would be useful to have uuencode available in busybox-udeb for the
support of block device encryption in partman-crypto. In particular, I'd
like to use
Hi Ludovic,
On Fri, Nov 11, 2005 at 05:06:19PM +0100, Ludovic Rousseau wrote:
Package: cdtool
Version: 2.1.8-pre3-1
Severity: important
$ cdplay
cdplay: ioctl subchnl: INVALID
I guess the command was working before but as I don't use it often I
don't know what I modified since then.
A
On Fri, Nov 11, 2005 at 07:12:54PM +0100, Max Vozeler wrote:
Hi Ludovic,
On Fri, Nov 11, 2005 at 05:06:19PM +0100, Ludovic Rousseau wrote:
Package: cdtool
Version: 2.1.8-pre3-1
Severity: important
$ cdplay
cdplay: ioctl subchnl: INVALID
I guess the command was working before
Package: scponly
Version: 4.1-1
Severity: critical
Hey Thomas,
scponly 4.2 has been released with a fix for the privilege
escalation we've mailed about.
http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html:
...
Problem Description: If ALL the following conditions are true,
found 344418 4.0-1
tags 344418 + patch
thanks
The attached patch is extracted from 4.2 and should apply to 4.0-1 in
stable. I've verified that it builds and fixes the bug.
Note that there is a small change in behaviour that could break existing
(but unsafe) setups. If the home directory is not
On Thu, Dec 22, 2005 at 04:56:55PM +0100, Max Vozeler wrote:
http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
This should read http_s_
https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED
today!
Important Security Notice:
Max Vozeler has reported a problem whereby rssh can allow users who
have shell access to systems where rssh is installed (and
rssh_chroot_helper is installed SUID) to gain root access to the
system, due to the ability to chroot to arbitrary locations
The chroot-fix in 4.2 had a bug that refused to chroot although
directory permissions were OK. This bug was also present in the
previously attached patch. Attached is a fixed version.
cheers,
Max
diff -ur scponly-4.0/scponly.c scponly-4.0-chrootfix/scponly.c
--- scponly-4.0/scponly.c
Package: ftp.debian.org
Hi ftp-masters,
loop-aes-ciphers-source has been merged into loop-aes-source as of
version 3.1b-1. The two can coexist, but -ciphers-source is no longer
actually useful. Please remove the package from unstable.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
On Sat, Nov 12, 2005 at 11:40:59AM +0100, Ludovic Rousseau wrote:
Le Friday 11 November 2005 à 19:12:54, Max Vozeler a écrit:
It would be interesting to know what kind of drive this is bug occurs
with. (hdparm -I device or similar)
$ sudo hdparm -I /dev/cdrom
/dev/cdrom:
ATAPI CD-ROM
close 339662 3.0a-1
thanks
Hi Evgeni,
On Thu, Nov 17, 2005 at 09:49:35PM +0100, Evgeni Golov wrote:
I do not really understand why the make fails.
The error appears to be somewhere outside the make output you quoted.
Could you send the complete build log to this bug?
With the Sid version of
Hi Evgeni,
On Mon, Nov 21, 2005 at 09:48:16AM +0100, Evgeni Golov wrote:
I've still didn't try the new modules. Whats about the loop-aes-util
package? Should I rebiuld it with Sid sources too? Or leave it and hope
the new loop-aes module is backward-compatible?
There is no need for using
Hi all,
On Tue, 12 Sep 2006 16:33:07 +0200, Lionel Elie Mamane wrote:
what you want is a conf dir for build specific package specific
settings.
Actually, if we look at the details, I'm not sure the loopaes-utils
package should unconditionally set the umask of initramfs-tools, as
a
Hi Timo,
On Sun, Sep 17, 2006 at 12:44:04PM +0300, Timo Myyrä wrote:
I had troubles with the crypting my harddrive. It just said that error
happened. I could choose the encryption and all but when I was supposed
to write them to disk it started complaing about error. This happened after
it
Hey Lionel,
On Sun, Nov 05, 2006 at 05:02:30PM +0100, Lionel Elie Mamane wrote:
Was easier than anticipated, at the price of some code
duplication. Patch attached.
Thanks, I have applied the patch to SVN.
How do we best proceed from here? I would be happy to upload
2.12r-15 with the scripts
a bit too risky.
On Sat, Nov 11, 2006 at 01:57:14PM +0100, Max Vozeler wrote:
Alternatively, the scripts could be included now but changed to only
do anything if they have been explicitly enabled by the user.
Yes, that would be adequate, too. And would avoid having to manage two
branches
Hey all,
On Sat, Nov 11, 2006 at 05:39:56PM +0100, Max Vozeler wrote:
Indeed, that's one nice advantage I didn't think about yet. Let's go
for this approach. I'll have some time later tonight where I could
check which changes are required for the scripts and documentation
This was rather
Package: loop-aes-utils
Version: 2.12r-14
Severity: important
$ ls /bin/mount*
/bin/mount /bin/mount.orig
$ man mount.orig
No manual entry for mount.orig
$ man mount-orig
Reformatting mount-orig(8), please wait...
The man pages should be renamed so that they match the names of the
diverted
Hi all,
On Tue, Oct 17, 2006 at 05:35:24PM +0200, Miroslav Kure wrote:
I installed from today's i386 netinst (20061016) with the following
setup:
/dev/hda1 16MB /boot
/dev/hda2 500MB physical volume for raid
/dev/hdb1 16MB unused
/dev/hdb2 500MB physical volume for raid
RAID 1
Hi Rafał,
I have split your bug report because it includes two distinct issues.
1. Problem mounting loop-AES loop (#394406)
2. System left without /bin/mount after upgrade (#394457)
On Sat, Oct 21, 2006 at 06:01:07AM +0200, [EMAIL PROTECTED] wrote:
It fails to mount a crypto partition (loop
Hi Frans,
On Wed, Oct 18, 2006 at 03:21:40PM +0200, Frans Pop wrote:
Currently the same string is used for both listing encrypted
partitions as devices and as a short description after the
encrypted partition itself.
For the short description the current string is too long which
leads to
Hi Lionel,
sorry for the long delay. I must admit that I have lost track a
little bit of the exact status regarding UMASK= in initramfs-tools
and the overall integration. I think all required patches should
now be applied in our new SVN repo:
On Sun, Oct 22, 2006 at 05:17:11PM +0200, Milan Zamazal wrote:
- I tried to use encrypted block device (dm-crypt with default
settings). The partioning tool looked like I could create multiple
partitions inside a single dm-crypt area, but actually any attempts to
create both a root partition
clone 385629 -1
retitle -1 Swap check fails for swap-on-LVM-on-crypto
thanks
Hi James,
On Mon, Oct 09, 2006 at 11:59:55PM +0100, James Westby wrote:
I am playing around with the installer and I believe I have hit this
problem.
If I select automatically set up LVM and crypto I get a good
Hi all,
On Tue, Oct 10, 2006 at 01:51:34AM +0200, David Härdeman wrote:
The loop is there because it needs to look not for the $dev device but
the virtual device-mapper device which has been created ontop of the
device pointed to by $dev after the crypto_setup step. It should be a
bit
Hi James,
On Tue, Oct 10, 2006 at 08:39:07PM +0100, James Westby wrote:
1) Make a game that involves typing,
I was reminded of a game called Daley Thompson's Decathlon, which
involved bashng two keys in turn as quickly as possible, while this
wouldn't be good I thought some sort of game
tags 392285 + confirmed pending
thanks
Hi James,
On Tue, Oct 10, 2006 at 07:40:18PM +0100, James Westby wrote:
I had the first partition for / unencrypted, then two partitions, a
random key for swap, and a GPG encrypted key for /home. I used
twofish128 for minimum impact while testing. The
Hi Marc,
On Wed, Sep 27, 2006 at 02:50:13PM +0200, Marc Lehmann wrote:
aespipe pads data to the cipher blocksize on encryption. as aespipe has no
container format there is no way this cna be avoided, but many programs
barf on the extra data appended (and give ghastly error messages), so this
tags 390554 + pending
thanks
On Sun, Oct 01, 2006 at 09:21:13PM +0200, Bastian Blank wrote:
/usr/bin/make -C /usr/src/linux-headers-2.6.17-2-s390-tape
M=/build/buildd/loop-aes-3.1d/debian/build/build_s390_none_s390-tape
make: Entering an unknown directory
make: ***
Hi Russell,
many thanks for your document. I will try to have a detailed reading
and integrate it along with the scripts.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: ftp.debian.org
Patch: d-i
Hi ftp-masters,
debian-installer currently loads udebs partman-crypto-loop and
partman-crypto-dm by default.
We have lowered their priority to optional in recent uploads so
that they can be loaded on demand. This will help us to decrease
the overall memory
On Mon, Sep 25, 2006 at 09:53:31PM +0200, Frans Pop wrote:
/var/log/syslog shows:
kernel: device-mapper: crypt: Error allocating crypto tfm
kernel: device-mapper: error adding target to table
kernel: device-mapper: device doesn't appear to be in the dev hash table.
partman-crypto: Command
Hey again,
On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote:
This leaves libpopt0 and cdebconf-newt-entropy
I've committed a preliminary test for the presence of those two libs to
crypto_check_required_tools.
case $1 in
dm-crypt)
-
Hey David,
Thanks for adding the checks.
On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote:
This leaves libpopt0 and cdebconf-newt-entropy
cdebconf-newt-entropy is already taken care of through db_capb;
blockdev-keygen will return an error dialog if it needs but cannot
find the
Hi Lionel,
On Sun, Aug 06, 2006 at 05:06:41PM +0200, Lionel Elie Mamane wrote:
On Wed, Jul 26, 2006 at 12:03:23PM +0200, Max Vozeler wrote:
At the start of mkinitramfs umask is initialized to 0022.
I've filed a bug to ask it to be initialised to 0077. Simplest,
easiest.
Thanks for taking
Hi Lionel,
On Sun, Aug 06, 2006 at 04:24:14PM +0200, Lionel Elie Mamane wrote:
Here is version 3 of the patch:
- Some documentation (NEWS.Debian and README.Debian)
still TODO: full example on how to setup an encrypted root system
- Minor code cleanup (unused function removed)
Package: partman-crypto
Version: 9
Severity: wishlist
The entropy plugin required me to type randomly for about
six minutes while it generated the key. This is quite long and
tiresome. While it only needs to be done at install time and
only once for each partition, something should be done to
Package: partman-crypto
Version: 9
Severity: important
Nothing in partman-crypto prevented me from setting up an
unencrypted swap space AFTER encrypted volumes had been setup. The
installation continued without warning and the installed system
booted with encrypted loops and unencrypted swap.
Package: partman-crypto
Version: 9
Mountpoints and other options for encrypted volumes are not
remembered when partman restarts. For example: Setting up an
encryption volume, setting the mountpoint and afterwards
configuring LVM makes the mountpoint get lost.
cheers,
Max
--
To UNSUBSCRIBE,
Package: partman-crypto
Version: 9
Severity: wishlist
partman-crypto should allow de-allocation of encrypted volumes if
one changes their mind during partitioning.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: installation-reports
Boot method: businesscard ISO
Image version: 2006-08-07 build from
http://cdimage.debian.org/cdimage/daily-builds/sid_d-i/arch-latest/i386/iso-cd/debian-testing-i386-businesscard.iso
Machine: VMWare Player 1.0.1 build-19317
Memory: 128MB
Partitions:
Filesystem
Package: cdebconf-entropy
Severity: wishlist
cdebconf-entropy should support frontends other than newt.
Currently setup of encrypted volumes with random keys is not
possible in partman-crypto if the frontend is non-newt.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
Package: partman-crypto
Version: 9
Severity: wishlist
It would be useful and provide increased security if it was
possible to store encrypted keyfiles on removable media. It
should also be possible to use existing keyfiles.
cheeers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
Package: partman-crypto
Severity: wishlist
Partition erase can take a very long time. Since it is not
strictly required and we already allow users to skip partition
erase before setting up encrypted volumes, there should be a
way to cancel the erase while it happens.
cheers,
Max
--
To
Package: partman-crypto
Version: 9
Severity: wishlist
It would be great if partman-crypto could be used to install
onto a loop-AES encrypted root partition. This requires support
hooks in initramfs-tools (#378488).
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
Package: installation-reports
Boot method: businesscard ISO
Image version: 2006-08-07 build from
http://cdimage.debian.org/cdimage/daily-builds/sid_d-i/arch-latest/i386/iso-cd/debian-testing-i386-businesscard.iso
Machine: VMWare Player 1.0.1 build-19317
Memory: 128MB
Partitions:
Filesystem
block 381960 by 365308
thanks
On Tue, Aug 08, 2006 at 01:39:35AM +0200, Max Vozeler wrote:
2. For the encrypted device crypt1 on /dev/sda3 I entered a
passphrase that included two umlauts. The first odd thing was that
the asterisk usually shown in the passphrase entry field was shown
Package: cryptsetup
Version: 2:1.0.3-3
Hi cryptsetup maintainers,
I noticed this problem while testing dm-crypt support in
partman-crypto. I'm not completely sure if the parameters have
supported values (keysize, etc.).
Since this is a combination currently offered for users in
partman-crypto,
Package: installation-reports
Boot method: businesscard ISO
Image version: 2006-08-07 build from
http://cdimage.debian.org/cdimage/daily-builds/sid_d-i/arch-latest/i386/iso-cd/debian-testing-i386-businesscard.iso
Machine: VMWare Player 1.0.1 build-19317
Memory: 128MB
Partitions:
Filesystem
reassign 381981 partman-crypto
retitle 381981 Configuration fails with blowfish / 448 bits
block 381981 by 381973
thanks
On Tue, Aug 08, 2006 at 05:30:41AM +0200, Max Vozeler wrote:
1. For dm-crypt I could choose the blowfish cipher with a
keysize of 448 bits. The blowfish kernel module
tags 382388 + unreproducible
thanks
I tried to reproduce this problem with the same image Martin
used but had no luck. Our discussion on IRC includes some more
information, sending it to the bug.
09:38 _Max morning :)
09:38 _Max madduck: I'm looking at #382388; can't seem to reproduce it
09:39
Hi Martin,
On Thu, Aug 10, 2006 at 04:14:44PM +0100, martin f krafft wrote:
Package: partman-crypto
Severity: minor
On creation of a regular ext3 filesystem, if I choose a predefined
mount point, the filesystem's label will also be set automatically
upon entering the options dialog. This
tags 382398 + pending
thanks
On Thu, Aug 10, 2006 at 06:10:45PM +0100, martin f krafft wrote:
Package: partman-crypto
Severity: wishlist
If I look at the output of /proc/mounts, I really would like to
know which partitions are mounted where. Unfortunately,
/dev/mapper/crypt3 gives me no
Hi Julien,
Thanks for your report.
On Sat, Aug 12, 2006 at 01:14:59AM +0200, Julien Danjou wrote:
There was a problem while autobuilding your package:
Automatic build of loop-aes-modules_3.1d+3+3 on avidan by sbuild/i386 0.49
Build started at 20060812-0033
: #382605
- -- Max Vozeler [EMAIL PROTECTED] Fri, 11 Aug 2006 13:52:38 +0200
+ -- Max Vozeler [EMAIL PROTECTED] Sun, 13 Aug 2006 19:18:12 +0200
partman-crypto (9) unstable; urgency=low
Index: debian/partman-crypto.templates
retitle 382840 Installs via serial console do not get enough entropy
reassign 382840 partman-crypto
severity 382840 normal
thanks
Hi Thomas Arendsen Hein,
On Sun, Aug 13, 2006 at 07:03:36PM +0200, Thomas Arendsen Hein wrote:
With debian-installer etch beta3 (full CD, x86) I wanted to setup two
Hi all,
On Mon, Aug 14, 2006 at 09:26:04AM +0200, Lionel Elie Mamane wrote:
On Sat, Aug 12, 2006 at 10:43:16AM +0200, maximilian attems wrote:
also loop-aes is quite a specific use case,
so i'm not in big favour of setting the umask in general
to the proposed value as in general there is
On Mon, Aug 14, 2006 at 09:39:57AM +0200, Lionel Elie Mamane wrote:
On Sun, Aug 06, 2006 at 05:06:41PM +0200, Lionel Elie Mamane wrote:
On Wed, Jul 26, 2006 at 12:03:23PM +0200, Max Vozeler wrote:
At the start of mkinitramfs umask is initialized to 0022.
I've filed a bug to ask
Hi Cyril,
On Tue, Aug 19, 2008 at 06:32:54PM +0200, Cyril Brulebois wrote:
diverting losetup without implementing losetup -f looks quite a serious
bug to me.
I won't disagree. -f is rather recent and hasn't been
picked up by the loop-AES fork so far. Let me check how it
can be enabled, and
Hi Jari,
some of our users [in Debian] are starting to expect new
options that have been added to losetup in util-linux-ng to
work with the loop-AES version of losetup as well.
This is starting to cause other packages and scripts to
break when users use loop-AES patched losetup. In particular,
Package: drbd8-source
Version: 2:8.0.7-1
Severity: important
Hi maintainer(s),
drbd8-source fails to build with 2.6.24-rc8 from the
kernel snapshot archive [1].
The build failure looks like a genuine problem in the
Makefile that is likely to persist in 2.6.24 final:
| dh_testdir
|
Package: iscsitarget-source
Version: 0.4.15+svn145-1
Severity: important
Hi maintainer(s),
iscsitarget-source fails to build with 2.6.24-rc8 from
the kernel snapshot archive [1].
| make: Entering directory `/usr/src/linux-headers-2.6.24-rc8-486'
| LD
Package: linux-modules-extra-2.6
Severity: wishlist
Tags: patch
The attached patch adds loop-aes modules - tested
with r10149 and 2.6.24-rc8.
Max
=== linux-modules-extra-2.6/debian/changelog
==
---
Hi Daniel,
On Sun, Jan 20, 2008 at 04:31:57PM +0100, Daniel Baumann wrote:
Max Vozeler wrote:
The attached patch adds loop-aes modules - tested
with r10149 and 2.6.24-rc8.
thanks for integrating loop-aes into l-m-e.
Why do you override stuff in loop-aes/rules?
I'm preparing a small
Hi Daniel,
On Sun, Jan 20, 2008 at 05:44:26PM +0100, Daniel Baumann wrote:
Max Vozeler wrote:
I'm preparing a small kbuild-based source tree in the
setup target override because it is not possible to
get the loop-AES build system to work here (see below).
Maybe it would make sense
tags 414448 + wontfix
thanks
I feel that this is too dangerous an option to allow
without requiring the user to jump through hoops to
configure it themselves.
There is no way this can be safe, and thus no way for it
to make sense except for test setups where you don't really
care if the
On Thu, Dec 13, 2007 at 10:54:44AM +0100, Torsten Neumann wrote:
The setup I tried is a md setup with everything crypted except /boot
..
Examining the install I found out that there was only an empty
/etc/crypttab, adding the entry for /dev/md1 manually I could mount
all the devices and then
Hi Anno,
On Sat, May 21, 2005 at 12:08:42AM +0200, Anno wrote:
Package: loop-aes-utils
Version: 2.12a-3
Severity: important
short version:
Problem: Unable to losetup an encrypted filesystem.
Error: ioctl: LOOP_MULTI_KEY_SETUP_V3: invalid argument
TEMPORARY FIX: downgrade from 2.12p-4
On Sat, May 21, 2005 at 11:30:40PM +0200, Anno wrote:
# gpg --decrypt keyfile-v3 | head -n 64 | gpg --symmetric -a keyfile-v2
(try losetup again with this keyfile-v2; It should work with 2.12a
and 2.12p; losetup -a from 2.12p should show multi-key-v2)
With loop-aes-utils -a from 2.12p I
Hi Thomas,
(once again sorry for my slowness. I have split your bug report
into bugs #302324 and #310381 because these are different issues.)
On Mon, Apr 04, 2005 at 06:04:10PM +0200, Thomas Braun wrote:
These seems to be the consequence of the last bugfix.
Going to
Hi Stefan,
Stefan-W. Hahn [EMAIL PROTECTED] wrote:
Also sprach Max Vozeler am Tue, 22 Feb 2005 at 20:30:48 +0100:
Hello Max,
I'm wondering BTW why this works as expected when you remove
loop-aes-utils. Here the original mount 2.12 behaves the same way
and refuses user umount when mtab
Hi Basil,
Basilius [EMAIL PROTECTED] wrote:
Update russian templates file (fix some typos)
I apologize.
No problem! But I only noticed after uploading cdtool with the last
version you sent.
How important do you consider these fixed typos? I would wait with
another upload until 2.1.5-12
Hi Thomas,
[EMAIL PROTECTED] wrote:
seems that I'm the only user of loop-aes ;)
Dunno, but you have a good touch for shaking out the corner
cases :-)
When I now install the kernel-image (before I have purged the same
version) I get the following message:
[...]
Setting up
tags 305765 +patch
thanks
Hi Eduard,
On Fri, Apr 22, 2005 at 03:13:33AM +0200, Eduard Bloch wrote:
when I try to umount a partition mounted by the same user before, the
operation fails and I get a segmentation fault. On partitions mounted by
root, there is a proper message:
$ umount /mnt/c
Package: module-assistant
Version: 0.7.5
Severity: wishlist
Tags: patch
Hi blade,
inserting a module built against a fakesource tree taints the kernel
here, because the __versions section is empty and so the symbol version
for struct_module is not available.
This could be remedied by copying
Package: ftp.debian.org
Please remove loop-aes-modules from the archive. It has been
superseded by other packages (loop-aes and linux-modules-di-*)
and as such is no longer useful.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
reassign 414309 partman-crypto
thanks
Hi Stephen,
Thanks for your bug report.
On Sat, Mar 10, 2007 at 03:03:20PM -0500, Stephen Gildea wrote:
In the Partition disks step, using the Manual partitioning method,
I cannot configure encrypted volumes.
I create a partition, for use as a physical
reassign 302324 initrd-tools
retitle 302324 Misleading error message for files in /lib/modules/$KVERS/kernel
that have non-.o/.ko suffix
severity 302324 minor
thanks
This bug included a number of different issues. Summarizing the
relevant point for initrd-tools:
If an admin or package creates a
severity 403974 important
thanks
On Sun, Feb 18, 2007 at 09:39:54PM +0100, Thomas Weinbrenner wrote:
James Westby wrote:
On (17/02/07 19:51), Thomas Weinbrenner wrote:
[...]
But if it is meant to help building modules for other kernel, then it
should support them and this bug should
Hey Riku,
On Sun, Jan 28, 2007 at 02:52:19PM +0200, Riku Voipio wrote:
Package: loop-aes-modules
Severity: wishlist
Tags: patch
User: debian-arm@lists.debian.org
Usertags: eabi
Please add support for arm eabi[1] and bigendian ports. In this packages
case it only needs adding armel and
tags 400055 + confirmed pending
thanks
On Thu, Nov 23, 2006 at 06:09:24PM +0100, Lucas Nussbaum wrote:
During a rebuild of all packages in etch, I discovered that your
package failed to build on i386.
Your package depends on loop-aes-source (= 3.1d-3), but this package
was removed from
Package: initramfs-tools
Version: 0.87b
Severity: wishlist
It would be nice if hook scripts could access the MODULES=
setting to include/exclude things accordingly.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
tags 430687 + confirmed
thanks
Hi Marko,
On Tue, Jun 26, 2007 at 05:59:35PM +0200, Marko Randjelovic wrote:
When you decrypt a file, it is not same as original, because it has
additional bytes at the end. If you know the length of original file,
than you can reconstruct it with program dd.
Package: wnpp
I find that I don't actually play audio CDs much anymore and I now
have only occasional access to a machine that cdtool works on (one
that can play audio CDs without DAE), so I'm sure there is someone
out there who can do a better job maintaining it :-)
It would be ideal if
Hi Michelle,
Am 2006-07-10 18:59:22, schrieb Michelle Konzack:
cdvolume works curently if the parameter is an integer of 0 to 255.
Please add the option +/- to the parameter to let $USER increase or
decrease the volume like
cdvolume -10
cdvolume +5
...
But since the
Hi Michelle,
Am 2006-07-10 19:16:20, schrieb Michelle Konzack:
I am using ATA and SCSI Cd-Drives which are /dev/hdc or /dev/scd0.
Now if I try 'cdctrl e' it access the drive and nothing happen.
I must use ^C to interupt the operation, because other programs
like eject can not access the
1 - 100 of 237 matches
Mail list logo