Package: mandos-client
Version: 1.0.12-1
Severity: grave
Justification: renders package unusable

After installing mandos I tested my configuration as described in
README.Debian. That worked successfully. However, booting a
mandos-enabled kernel, mandos will not run. The cryptsetup password
prompt appears and I have to type in the crypt volume's password
manually to make the system continue to boot.
At virtually the same time the cryptsetup password prompt appears,
an error message is printed on the console:
Fatal: no entropy gathering module detected

According to google that message seems to be related to gnutls.
However, as mandos-client doesn't seem to have a debug mode when run
from initrd, I wasn't able to dig deeper. There is no such error
message when testing mandos-client as described in README.Debian

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mandos-client depends on:
ii  adduser                       3.111      add and remove users and groups
ii  cryptsetup                    2:1.0.7-2  configures encrypted block devices
ii  libavahi-common3              0.6.25-1   Avahi common library
ii  libavahi-core6                0.6.25-1   Avahi's embeddable mDNS/DNS-SD lib
ii  libc6                         2.9-27     GNU C Library: Shared libraries
ii  libgnutls26                   2.8.4-1    the GNU TLS library - runtime libr
ii  libgpg-error0                 1.6-1      library for common error values an
ii  libgpgme11                    1.2.0-1    GPGME - GnuPG Made Easy

mandos-client recommends no packages.

mandos-client suggests no packages.

-- no debconf information


Regards,
C. Dominik Bodi



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to