Your message dated Sun, 18 Mar 2012 11:02:12 +0000
with message-id <[email protected]>
and subject line Bug#641476: fixed in cryptmount 4.3-1
has caused the Debian Bug report #641476,
regarding cryptmount: "permission denied" when writing to vfat partition
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
641476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=641476
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: cryptmount
Version: 4.2-1
Severity: normal

Hello,

Hello,

I am having a problem writing to a LUKS-encrypted VFAT partition on my USB 
flash drive.

The drive mounts OK, but the permissions on the mount directory don't appear to 
be correct - the user is set to "root".

Here are the steps I used, which should illustrate the problem:
---
### Mounting with cryptmount ###

george@deli:~ $ cryptmount imation
Enter password for target "imation": 
dosfsck 3.0.9, 31 Jan 2010, FAT32, LFN
/dev/mapper/imation: 1 files, 1/263481 clusters

george@deli:~ $ cat /etc/mtab | grep imation
/dev/mapper/imation /media/imation vfat rw 0 0

george@deli:~ $ cat /etc/cryptmount/cmtab
[...]
imation {
        keyformat=luks
        dev=/dev/disk/by-uuid/0ab3d88f-0730-4837-a95f-2732e1824200
        dir=/media/imation
        fstype=vfat
    }

george@deli:~ $ ls -ld /media/imation/
drwxr-xr-x 2 root george 4096 Jan  1  1970 /media/imation/

george@deli:~ $ touch /media/imation/test.txt
touch: cannot touch `/media/imation/test.txt': Permission denied
---

This is what happens when mounting with 'mount' command:
---
### Mounting with mount ###

george@deli:~ $ su

deli:/home/george# cryptmount -p imation
Enter password for target "imation":

deli:/home/george# exit

george@deli:~ $ mount /media/imation/

george@deli:~ $ cat /etc/mtab | grep imation
/dev/mapper/imation /media/imation vfat rw,noexec,nosuid,nodev,user=george 0 0

george@deli:~ $ ls -ld /media/imation/
drwxr-xr-x 2 george george 4096 Jan  1  1970 /media/imation/

george@deli:~ $ touch /media/imation/test.txt
george@deli:~ $
---


Thanks,

George


-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.0.0-1-686-pae (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages cryptmount depends on:
ii  libc6                              2.13-16    
ii  libdevmapper1.02.1 [libdevmapper]  2:1.02.65-1
ii  libgcrypt11                        1.4.6-9    
ii  libuuid1                           2.19.1-5   

cryptmount recommends no packages.

Versions of packages cryptmount suggests:
ii  dmsetup  2:1.02.65-1
ii  openssl  1.0.0e-2   

-- Configuration Files:
/etc/cryptmount/cmtab changed [not included]

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: cryptmount
Source-Version: 4.3-1

We believe that the bug you reported is fixed in the latest version of
cryptmount, which is due to be installed in the Debian FTP archive:

cryptmount_4.3-1.debian.tar.gz
  to main/c/cryptmount/cryptmount_4.3-1.debian.tar.gz
cryptmount_4.3-1.dsc
  to main/c/cryptmount/cryptmount_4.3-1.dsc
cryptmount_4.3-1_amd64.deb
  to main/c/cryptmount/cryptmount_4.3-1_amd64.deb
cryptmount_4.3.orig.tar.gz
  to main/c/cryptmount/cryptmount_4.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
RW Penney <[email protected]> (supplier of updated cryptmount 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 18 Mar 2012 08:00:00 +0000
Source: cryptmount
Binary: cryptmount
Architecture: source amd64
Version: 4.3-1
Distribution: unstable
Urgency: low
Maintainer: RW Penney <[email protected]>
Changed-By: RW Penney <[email protected]>
Description: 
 cryptmount - Management of encrypted file systems
Closes: 641476
Changes: 
 cryptmount (4.3-1) unstable; urgency=low
 .
   * Closes: bug#641476 (Setting owner permissions on mounting vfat partitions)
Checksums-Sha1: 
 8cede51e56a0a07c096af0e76dcb3382171ae2a1 1159 cryptmount_4.3-1.dsc
 4658c99bc130c5c15d015afbd0bb65b61b140384 572971 cryptmount_4.3.orig.tar.gz
 21dcdd857c60326fb8e9081687c9e307557ea169 6220 cryptmount_4.3-1.debian.tar.gz
 968d45c2c322ac17972a4cadf4ba958822708ec9 160546 cryptmount_4.3-1_amd64.deb
Checksums-Sha256: 
 0b6ee1ebbe9f08e3914c55d9400b0b76dc6589aa065d00acb06a88055ab25709 1159 
cryptmount_4.3-1.dsc
 d55c0d9a11ef35fbbf7fd3a4557f43d670069ca55b97907fda8e756b11c3812d 572971 
cryptmount_4.3.orig.tar.gz
 fbca3de65cd9e77d1389f45978c8060a0f7b7d5f50f2027d47d137011db92a7d 6220 
cryptmount_4.3-1.debian.tar.gz
 196255244cc9ce4ed4530db22d2cd4a138f7c1225d2c08732e3101fa955da10b 160546 
cryptmount_4.3-1_amd64.deb
Files: 
 1a810025ae5a0d392a9928099c206e94 1159 admin extra cryptmount_4.3-1.dsc
 7a22e540a898afd1168ceaf348132f52 572971 admin extra cryptmount_4.3.orig.tar.gz
 2581b617b90ac64c5ac2262b6011ae7c 6220 admin extra 
cryptmount_4.3-1.debian.tar.gz
 61bf4f8b50add54c61de49bd67ded78d 160546 admin extra cryptmount_4.3-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAk9lvoQACgkQMDatjqUaT92dLQCfdpL6GIDz5rm1VUUEan/T4Bzx
4FkAoICWZsXU0fHZKvo7erBsmABpCq7U
=Qlqp
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to