Your message dated Fri, 26 Aug 2005 03:32:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#324871: fixed in libpam-mount 0.9.25-3
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Aug 2005 14:57:52 +0000
>From [EMAIL PROTECTED] Wed Aug 24 07:57:52 2005
Return-path: <[EMAIL PROTECTED]>
Received: from master.debian.org [146.82.138.7]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E7whM-0004hL-00; Wed, 24 Aug 2005 07:57:52 -0700
Received: from pcp0012006544pcs.selrsv01.pa.comcast.net
(noteboy.private.network) [68.37.176.114]
by master.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1E7whL-0002ws-00; Wed, 24 Aug 2005 09:57:51 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Bob Skaroff <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libpam-mount: Does not mount dm-cyrpt volume as ext3
X-Mailer: reportbug 3.15
Date: Wed, 24 Aug 2005 10:57:32 -0400
X-Debbugs-Cc: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham
version=2.60-bugs.debian.org_2005_01_02
Package: libpam-mount
Version: 0.9.25-1
Severity: wishlist
Is it possible to code pam_mount.conf so that mount.crypt will
mount a dm-crypted volume as ext3 rather than ext2?
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-20050218-rds-01
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages libpam-mount depends on:
ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an
ii libglib2.0-0 2.6.5-1 The GLib library of C routines
ii libssl0.9.7 0.9.7e-3 SSL shared libraries
ii mount 2.12p-4 Tools for mounting and manipulatin
ii zlib1g 1:1.2.2-4 compression library - runtime
libpam-mount recommends no packages.
-- no debconf information
---------------------------------------
Received: (at 324871-close) by bugs.debian.org; 26 Aug 2005 10:38:35 +0000
>From [EMAIL PROTECTED] Fri Aug 26 03:38:35 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E8bVF-0006IN-00; Fri, 26 Aug 2005 03:32:05 -0700
From: Bastian Kleineidam <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#324871: fixed in libpam-mount 0.9.25-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 26 Aug 2005 03:32:05 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Source: libpam-mount
Source-Version: 0.9.25-3
We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:
libpam-mount_0.9.25-3.diff.gz
to pool/main/libp/libpam-mount/libpam-mount_0.9.25-3.diff.gz
libpam-mount_0.9.25-3.dsc
to pool/main/libp/libpam-mount/libpam-mount_0.9.25-3.dsc
libpam-mount_0.9.25-3_i386.deb
to pool/main/libp/libpam-mount/libpam-mount_0.9.25-3_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 26 Aug 2005 12:09:20 +0200
Source: libpam-mount
Binary: libpam-mount
Architecture: source i386
Version: 0.9.25-3
Distribution: unstable
Urgency: low
Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]>
Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]>
Description:
libpam-mount - a PAM module that can mount volumes for a user session
Closes: 324871 325028
Changes:
libpam-mount (0.9.25-3) unstable; urgency=low
.
* Added option to mount.crypt to specify filesystem type.
Use like this:
$ mount.crypt -o fstype=ext3
Or in pam_mount.conf add "fstype=ext3" to the crypt mount options.
Note that you only need this if mount(8) does not detect the file
system type automatically.
(Closes: #324871)
* Add cryptsetup LUKS support to (u)mount.crypt. Thanks Florian Frank
for the patch (Closes: #325028)
Files:
9a29b575a884f3df7743cdbadd5bd30f 678 admin extra libpam-mount_0.9.25-3.dsc
a03a7883d54eec62bbb813150928c29c 29487 admin extra
libpam-mount_0.9.25-3.diff.gz
4c7f91ba595b16fe0615cb84ad35e0a4 101260 admin extra
libpam-mount_0.9.25-3_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDDu1veBwlBDLsbz4RAgTPAKCjsMlIvmyhl2+rI/yWLFEbAR+BggCfRbuS
op+ZCnlhhWqZNppEsPhE5t0=
=OWCJ
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]