Package: libpam-mount Version: 0.9.22-5 Severity: grave Justification: renders package unusable
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the encrypted partition is not mounted (and decrypted) on login. Up to version 0.9.22-4 there was no such problem. I attached my config and the (hopefully correct copy-n-wasted) debug output. Kiro - --- /etc/security/pam_mount.conf --- # i cutted the standard-statements volume kiro crypt - /dev/hdb5 /home/kiro "cipher=aes,exec,nodev,nosuid" aes-256-ecb /mnt/usb/kiro.key - --- login --- pam_mount: reading options_allow... pam_mount: reading options_require... pam_mount: back from global readconfig pam_mount: per-user configurations not allowed by pam_mount.conf pam_mount: real and effective user ID are 0 and 0. pam_mount: checking sanity of volume record (/dev/hdb5) pam_mount: about to perform mount operations pam_mount: information for mount: pam_mount: -------- pam_mount: (defined by globalconf) pam_mount: user: kiro pam_mount: server: pam_mount: volume: /dev/hdb5 pam_mount: mountpoint: /home/kiro pam_mount: options: cipher=aes,exec,nodev,nosuid pam_mount: fs_key_cipher: aes-256-ecb pam_mount: fs_key_path: /mnt/usb/kiro.key pam_mount: use_fstab: 0 pam_mount: -------- pam_mount: checking to see if /dev/mapper/_dev_hdb5 is already mounted at /home/kiro pam_mount: checking for encrypted filesystem key configuration pam_mount: decrypting FS key using system auth. token and aes-256-ecb pam_mount: about to start building mount command pam_mount: command: /bin/mount -t crypt -ocipher=aes,exec,nodev,nosuid /dev/hdb5 /home/kiro pam_mount: mount errors (should be empty): pam_mount: pam_mount: setting uid to 0 pam_mount: pam_mount: real and effective user ID are 0 and 0. pam_mount: pam_mount: real and effective group ID are 1000 and 1000. pam_mount: /sbin/mount.crypt: line 141: /sbi: No such file or directory pam_mount: mount.crypt: error creating _dev_hdb5 pam_mount: waiting for mount pam_mount: mount of /dev/hdb5 failed pam_mount: clean system authtok (0) pam_mount: command: /usr/sbin/pmvarrun -u kiro -d -o 1 pam_mount: setting uid to 0 pam_mount: real and effective user ID are 0 and 0. pam_mount: real and effective group ID are 1000 and 1000. pam_mount: pmvarrun says login count is 1 pam_mount: done opening session - --- logout --- pam_mount: received order to close things pam_mount: real and effective user ID are 0 and 0. pam_mount: user is kiro pam_mount: command: /usr/sbin/pmvarrun -u kiro -d -o -1 pam_mount: setting uid to 0 pam_mount: real and effective user ID are 0 and 0. pam_mount: real and effective group ID are 1000 and 1000. pam_mount: pmvarrun says login count is 0 pam_mount: going to unmount pam_mount: information for mount: pam_mount: -------- pam_mount: (defined by globalconf) pam_mount: user: kiro pam_mount: server: pam_mount: volume: /dev/hdb5 pam_mount: mountpoint: /home/kiro pam_mount: options: cipher=aes,exec,nodev,nosuid pam_mount: fs_key_cipher: aes-256-ecb pam_mount: fs_key_path: /mnt/usb/kiro.key pam_mount: use_fstab: 0 pam_mount: -------- pam_mount: command: /usr/sbin/lsof /home/kiro pam_mount: setting uid to 0 pam_mount: real and effective user ID are 0 and 0. pam_mount: real and effective group ID are 1000 and 1000. pam_mount: lsof output (should be empty)... pam_mount: COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME pam_mount: artsd 10021 kiro cwd DIR 3,6 4096 33407 /home/kiro pam_mount: waiting for lsof pam_mount: command: /usr/bin/umount.crypt /home/kiro pam_mount: umount errors (should be empty): pam_mount: pam_mount: setting uid to 0 pam_mount: pam_mount: real and effective user ID are 0 and 0. pam_mount: pam_mount: real and effective group ID are 1000 and 1000. pam_mount: /usr/bin/umount.crypt: line 46: /bi: No such file or directory pam_mount: /usr/bin/umount.crypt: line 48: /sbi: No such file or directory pam_mount: /usr/bin/umount.crypt: line 50: /bi: No such file or directory pam_mount: umount.crypt: error unmounting /home/kiro pam_mount: waiting for umount pam_mount: unmount of /dev/hdb5 failed pam_mount: pam_mount execution complete pam_mount: clean system authtok (0) - -- System Information: Debian Release: sid APT prefers unstable APT policy: (990, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11-nitro2 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages libpam-mount depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libglib2.0-0 2.6.3-1 The GLib library of C routines ii libssl0.9.7 0.9.7e-3 SSL shared libraries ii mount 2.12p-4 Tools for mounting and manipulatin ii zlib1g 1:1.2.2-4 compression library - runtime - -- no debconf information -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCSYfHYWOj0axvMcURAg08AJ9EKApdDieQY5Nszh2KAXqNyQAnkQCgxq0A Unj7IdLpWsBKSCPYDi7RbyQ= =6Hwi -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]