Okay, I'm forwarding this upstream and assigning to myself.

I think that there are two parts to this bug...

 1) Key adding on underpowered cpu's (arms and atoms in netbooks) is
simply a slow process due to the 64K rounds of key strengthening.  I
think we should make that configurable for Karmic, but there's nothing
we can really for this on Jaunty.

 2) We should clean up the error messages thrown to the log files.
  a) if the user doesn't have an ecryptfs setup, let's short circuit 
pam_ecryptfs and bail out without spamming the logs with error messages
  b) if the key is already in the keyring, great, no need to gripe about it.

:-Dustin

** Also affects: ecryptfs
   Importance: Undecided
       Status: New

** Changed in: ecryptfs
   Importance: Undecided => Medium

** Changed in: ecryptfs
       Status: New => Triaged

** Changed in: ecryptfs
     Assignee: (unassigned) => Dustin Kirkland (kirkland)

** Changed in: ecryptfs-utils (Ubuntu)
   Importance: Undecided => Medium

** Changed in: ecryptfs-utils (Ubuntu)
       Status: New => Triaged

** Changed in: ecryptfs-utils (Ubuntu)
     Assignee: (unassigned) => Dustin Kirkland (kirkland)

-- 
Error attempting to add passphrase key to user session keyring
https://bugs.launchpad.net/bugs/313330
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to