Your message dated Tue, 01 Nov 2016 09:48:37 +0000 with message-id <[email protected]> and subject line Bug#628238: fixed in encfs 1.9.1-1 has caused the Debian Bug report #628238, regarding encfs don't work anymore after sid update to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 628238: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628238 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: encfs Version: 1.7.4-2.1+b1 Severity: normal Being away for one month, I updated sid yesterday and found encfs unusable. * Using the '-s' switch don't change anything. * Root don't mount anything, even with the '--public' switch: # encfs -v -s --public /OTHER/.YI_encfs/ /OTHER/TST3/ 14:42:32 (main.cpp:523) Root directory: /OTHER/.YI_encfs/ 14:42:32 (main.cpp:524) Fuse arguments: (daemon) (UP) (keyCheck) (ownerCreate) encfs /OTHER/TST3/ -o allow_other -s -o use_ino -o default_permissions 14:42:32 (FileUtils.cpp:177) version = 20 14:42:32 (FileUtils.cpp:181) found new serialization format 14:42:32 (FileUtils.cpp:199) subVersion = 20100713 14:42:32 (Interface.cpp:165) checking if ssl/aes(3:0:2) implements ssl/aes(3:0:0) 14:42:32 (SSL_Cipher.cpp:370) allocated cipher ssl/aes, keySize 32, ivlength 16 14:42:32 (Interface.cpp:165) checking if ssl/aes(3:0:2) implements ssl/aes(3:0:0) 14:42:32 (SSL_Cipher.cpp:370) allocated cipher ssl/aes, keySize 32, ivlength 16 14:42:32 (FileUtils.cpp:1620) useStdin: 0 EncFS Password: 14:42:37 (Interface.cpp:165) checking if ssl/aes(3:0:2) implements ssl/aes(3:0:0) 14:42:37 (SSL_Cipher.cpp:370) allocated cipher ssl/aes, keySize 32, ivlength 16 14:42:40 (FileUtils.cpp:1628) cipher key size = 52 14:42:40 (Interface.cpp:165) checking if nameio/block(3:0:1) implements nameio/block(3:0:0) fuse failed. Common problems: - fuse kernel module not installed (modprobe fuse) - invalid options -- see usage message ls -al /OTHER => drwxr-xr-w 2 user1 user1 4096 27 mai 02:55 TST3 * User (owner) seems to mount but mounted directory is unreacheable: $ encfs -v -s /OTHER/.YI_encfs/ /OTHER/TST3/ 14:45:55 (main.cpp:523) Root directory: /OTHER/.YI_encfs/ 14:45:55 (main.cpp:524) Fuse arguments: (daemon) (UP) (keyCheck) encfs /OTHER/TST3/ -s -o use_ino -o default_permissions 14:45:55 (FileUtils.cpp:177) version = 20 14:45:55 (FileUtils.cpp:181) found new serialization format 14:45:55 (FileUtils.cpp:199) subVersion = 20100713 14:45:55 (Interface.cpp:165) checking if ssl/aes(3:0:2) implements ssl/aes(3:0:0) 14:45:55 (SSL_Cipher.cpp:370) allocated cipher ssl/aes, keySize 32, ivlength 16 14:45:55 (Interface.cpp:165) checking if ssl/aes(3:0:2) implements ssl/aes(3:0:0) 14:45:55 (SSL_Cipher.cpp:370) allocated cipher ssl/aes, keySize 32, ivlength 16 14:45:55 (FileUtils.cpp:1620) useStdin: 0 EncFS Password: 14:45:59 (Interface.cpp:165) checking if ssl/aes(3:0:2) implements ssl/aes(3:0:0) 14:45:59 (SSL_Cipher.cpp:370) allocated cipher ssl/aes, keySize 32, ivlength 16 14:46:02 (FileUtils.cpp:1628) cipher key size = 52 14:46:02 (Interface.cpp:165) checking if nameio/block(3:0:1) implements nameio/block(3:0:0) fusermount: failed to access mountpoint /OTHER/TST3: Permission denied fuse failed. Common problems: - fuse kernel module not installed (modprobe fuse) - invalid options -- see usage message ls -al /OTHER => d????????? ? ? ? ? ? TST3 * root can umount what has been "mounted" by user1 but issue an error msg: # fusermount -u TST3 /bin/umount: unrecognized option '--no-canonicalize' Usage: umount -h | -V umount -a [-d] [-f] [-r] [-n] [-v] [-t vfstypes] [-O opts] umount [-d] [-f] [-r] [-n] [-v] special | node... * user1 can't umount and receive a failure msg: $ fusermount -u TST3 fusermount: entry for /OTHER/TST3 not found in /etc/mtab * The fuse module is loaded (and indicates 1 use before tests). * Directory was NOT created by hand but with 'cryptkeeper'. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.38.2 (PREEMPT) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages encfs depends on: ii fuse-utils 2.8.5-2 Filesystem in Userspace (transitio ii libboost-filesystem1.42.0 1.42.0-4+b1 filesystem operations (portable pa ii libboost-serialization1.42.0 1.42.0-4+b1 serialization library for C++ ii libboost-system1.42.0 1.42.0-4+b1 Operating system (e.g. diagnostics ii libc6 2.13-4 Embedded GNU C Library: Shared lib ii libfuse2 2.8.5-2 Filesystem in Userspace (library) ii libgcc1 1:4.6.0-10 GCC support library ii librlog5 1.4-1 flexible message logging library ii libssl1.0.0 1.0.0d-2 SSL shared libraries ii libstdc++6 4.6.0-10 The GNU Standard C++ Library v3 encfs recommends no packages. encfs suggests no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: encfs Source-Version: 1.9.1-1 We believe that the bug you reported is fixed in the latest version of encfs, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Eduard Bloch <[email protected]> (supplier of updated encfs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 30 Oct 2016 23:37:46 +0100 Source: encfs Binary: encfs Architecture: source amd64 Version: 1.9.1-1 Distribution: experimental Urgency: low Maintainer: Eduard Bloch <[email protected]> Changed-By: Eduard Bloch <[email protected]> Description: encfs - encrypted virtual filesystem Closes: 628238 805568 822102 828293 842287 Changes: encfs (1.9.1-1) experimental; urgency=low . * New upstream release + handles recursive directory traversal (closes: #805568) * watch file update (closes: #842287) * debian/patches/libssl1.1 -- Experimental SSL 1.1 support from master branch (closes: #828293) * Swedish debconf translation by Jonatan Nyberg (closes: #822102) * Require non-ancient version of mount (closes: #628238) Checksums-Sha1: 2cb3d7fc254d9b6286632fb72e1578f4d7fb5c6a 1899 encfs_1.9.1-1.dsc 59c595aa64068f79185fb87e4d98ada7e57bbc09 362104 encfs_1.9.1.orig.tar.xz f7c9f8eae06c869105c24982ab2869ebb0642ce3 24024 encfs_1.9.1-1.debian.tar.xz 71e5a0a320ec6cf33ae836de6ec66e2180e089e9 1574096 encfs-dbgsym_1.9.1-1_amd64.deb 545ed36d98a0d0a646e637ae02295c437d1bec08 379678 encfs_1.9.1-1_amd64.deb Checksums-Sha256: ae6e15c2cb2e8f737fc6fce8fd7e8c7ec9b550c5fafbaac1896878a5e3a6a03d 1899 encfs_1.9.1-1.dsc 91034ed73637eafc712b94b92d295ae7f3b45aa5fa026f8455d0a54004ea86d5 362104 encfs_1.9.1.orig.tar.xz a77492f9aa09906059be29a807e6ffd2edc5dd70b6c649130327587f4c37d129 24024 encfs_1.9.1-1.debian.tar.xz 95bf74f58d38403276aeb3fa150a3540d78ad9e19894f93b650886ce4efe2bc0 1574096 encfs-dbgsym_1.9.1-1_amd64.deb 865fe89bad7312eb0932c4f1126ded8940f36a14bddb945507ed53e63f777f51 379678 encfs_1.9.1-1_amd64.deb Files: 6429f9e1cfe87eae53260bb4fd1f4fc1 1899 utils optional encfs_1.9.1-1.dsc 4fa13b14b778dd6f1e303d1796cedfc8 362104 utils optional encfs_1.9.1.orig.tar.xz 483e6d799da012a7ddbd56e7322ea326 24024 utils optional encfs_1.9.1-1.debian.tar.xz fd31fc1ddcc8cd973318e7c551c668d7 1574096 debug extra encfs-dbgsym_1.9.1-1_amd64.deb 46aa5b458c9e54a3c670eb5214e92380 379678 utils optional encfs_1.9.1-1_amd64.deb -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJYGGDbAAoJEGl0DlyzX+w8CpEQAJIKUk0lIL/SiiCfucNsisa7 lPjuGYmtx2f8K0rr1/gOqnEUQlnig7Md5VUe/AsWejTUemND6mUT5E54p55WNBOW wPgXLPhzNBnQVae2T3sTh8UCNUfuDwMgw4pbv5ELLfLOLvJGq+nvMJGXWFNZd4UM bmU/q5TW2xk1J2C7sHCZc4mhm3QEiECQ3/d6XhN28RtSliyb+/pJ4uFDf5YYy05e MS1B1leguRbBtnKiztAYGJkOPMG8nMn+/gIzJuDKSr151ZkboD0jgkw00IQSkBxn 3632Qjwf2FpU+hClIfITfGBtujtouvUhkeHOrbrow669sNO/6VcQj1WIKNsFf0Q+ aUKbGWbTD+9S7NYyD5nL/OzTwryVKDu7XN0xHs4Oq6pk9lWy3DBG7fhh5wlA/VRp 9IpTKdANhyFNrC+lFFbjRGj9XtRRXtfXxDaHvv0nSAkqf9dMEkzEkc+XXfH5PC3S mhw5bpSOCToICiubivJ5z2AXj6jfMfNQ7Zm0DgEunicr0PQFEsFCsugjFYe7IQOm 0AwyynlxEtQ0hBHvx1TVwweJXOkU+oku2hCRLuWh4OiBblKb7BbRj5XF/u1y7fTv CcL83juftuKiyhZquA/jnyyS5PqMJ3uiiRqDu+7IlblENh0Hi6mw4qs+RRwUUY8x g/YZMhYqsDMWMRYDT77Q =gbxf -----END PGP SIGNATURE-----
--- End Message ---

