Bug#995986: simple-cdd: Firmware not being included in installer image

2023-05-22 Thread R.Penney
I can confirm that this issue still seems to affect simple-cdd 0.6.9 on 
bookworm as of mid-May 2023 (including debian-cd version 3.2.1).


I too have tried 'export FORCE_FIRMWARE=1' together with 'export 
NONFREE_COMPONENTS="non-free non-free-firmware"', 
'mirror_components="main non-free non-free-firmware"' and various 
combinations thereof within my profile.default, all without success.


It would be great to see a working example of how to get firmware 
packages managed by simple-cdd. Thanks.




Bug#1019550: cryptmount: [INTL:de] updated German po file translation

2022-09-12 Thread R.Penney

Thanks, Helge - that's very helpful.

I'll roll this into the next release of cryptmount.

Your changes should also be visible in the (new) GitHub repository at 
https://github.com/rwpenney/cryptmount/commit/e631e0d98238618c455f409292618f624ab80c3a




Bug#978114: cryptmount: [INTL:de] updated German po file translation

2020-12-27 Thread R.Penney

Danke, Helge.

I'll include your updated translations in the next (bugfix) release of 
cryptmount.


Kind regards,

RW Penney



Bug#888444: cryptmount: Got errno=95 when run as not-root

2018-01-27 Thread R.Penney
I think I've found the origin of the problem, and this is related to a
change made within libcryptsetup during January 2017, in the function
device_internal_prepare(). This now checks that both getuid() and
geteuid() return zero before attempting to configure a loopback device.
Other areas of libcryptsetup will check getuid() and geteuid() after an
operation fails in order to provide a warning message about lack of
root privileges. I'm not convinced that checking getuid() is necessary,
if geteuid() already returns zero.

I have a provisional fix for cryptmount, which I intend to roll into
the forthcoming release 5.3.



Bug#888444: cryptmount: Got errno=95 when run as not-root

2018-01-26 Thread R.Penney
Hello Andrey,
Thanks for finding this issue with cryptmount, and for your helpful
stack traces and configuration information.

I am still investigating this issue, and have created a new test
specifically for LUKS partitions within ordinary files to help
narrow-down the source of the problem.

Could you confirm that in your case, the LUKS container is in an
ordinary file on a local filesystem (e.g. there are no NFS/SSHFS/NTFS
filesystems involved)?

I've confirmed that cryptmount does handle these files as intended on
debian-jessie, debian-stretch, ubuntu-artful, but there do seem to be
issues with debian-buster and fedora-27. All functionality relating to
handling LUKS containers within ordinary block devices (e.g. hard-disk
partitions), or filesystems in ordinary files managed by other
cryptmount keymanagers (e.g. "builtin", "libgcrypt") seems to be
working as it should.

I hope to be able to provide a fix soon.

RW Penney



Bug#823076: cryptmount: Fix LSB init output

2016-06-07 Thread R.Penney
Hello Guillem,
Thanks for your suggested improvement to the cryptmount init.d script,
and for your helpful patch.

I have just released version 5.2.1 of cryptmount, which incorporates
your improvements. I hope this will soon be available as a Debian
package.

Kind regards,
RW Penney



Bug#779851: cryptmount: Me neither, but different failure mode

2015-10-05 Thread R.Penney
Thanks for reporting this bug.

I think I have diagnosed the problem - this is probably due to a change
in behaviour of /sbin/fsck, where it now relies on the PATH
environmental variable to find /sbin/fsck.ext3 etc. instead of just
searching /sbin and a few other standard places. That is a significant
difference from the version of fsck in Jessie.

I'm currently working on a fix for this, which will probably form part
of (upstream) release cryptmount-5.2. As a work-around, you could
temporarily disable fsck by using "flags=nofsck"
in /etc/cryptmount/cmtab.



Bug#798358: cryptmount: fails to install: cryptmount.postinst: deb-systemd-helper: not found

2015-09-19 Thread R.Penney
cryptmount-5.1-3 is available now at
http://www.rwpenney.org.uk/software/index.html#cryptmount .
I am hoping my sponsor will be able to upload it into Sid soon.



Bug#798358: cryptmount: fails to install: cryptmount.postinst: deb-systemd-helper: not found

2015-09-08 Thread R.Penney
Hello Andreas,
Thanks for reporting this bug.

I have already been working on a cleaner version of the postinst script
making better use dh-systemd, which should fix other piuparts problems
relating to unwanted files left after uninstallation.

I hope to have a 5.1-3 available very soon.
Thanks,
RW Penney



Bug#795440: cryptmount-setup fails and can't recover when user mistypes initial passphrase

2015-08-16 Thread R.Penney
David,
Thanks for finding this issue with the cryptmount-setup script.
I'm currently looking into a fix that will form part of the next
upstream release of cryptmount.

In case you haven't already found a work-around, the cryptmount
man-page describes (in the example usage section) a recipe that
roughly matches the steps in the setup script. If you follow that
man-page entry from the line cryptmount --generate-key 32 opaque
(changing opaque to the name of your encrypted filesystem),
that should allow the setup process to complete.

Cheers,
RW Penney



Bug#795322: cryptmount: FTBFS: assumes automake-1.14

2015-08-14 Thread R.Penney
For info, attached is a patch (relative to cryptmount-5.1-1)
which I believe fixes the automake issue, as well as the outstanding
lintian warnings.

diff --git a/debian/changelog b/debian/changelog
index 86f7fa1..eba7e8b 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,15 @@
+cryptmount (5.1-2) unstable; urgency=medium
+
+  * Patched installation path for cryptmount.service to be beneath /lib/systemd
+
+  * Improved postinst/postrm support for systemd
+
+  * Removed duplicated example configuration file
+
+  * Rebuilt debian/rules script to use debhelper v7 and dh_autoreconf
+
+ -- RW Penney rwpen...@users.sourceforge.net  Sun, 26 Jul 2015 12:00:00 +
+
 cryptmount (5.1-1) unstable; urgency=low
 
   * Updated to version 5.1 of upstream package
diff --git a/debian/control b/debian/control
index 10ec589..50e11b6 100644
--- a/debian/control
+++ b/debian/control
@@ -4,7 +4,7 @@ Priority: extra
 Maintainer: RW Penney rwpen...@users.sourceforge.net
 Homepage: http://cryptmount.sourceforge.net
 Build-Depends: debhelper (= 9.0.0), dpkg-dev (=1.16.1),
-automake, autotools-dev,
+automake, dh-autoreconf,
 libcryptsetup-dev (= 1.6), libdevmapper-dev,
 libgcrypt20-dev (= 1.5), pkg-config
 Standards-Version: 3.9.6
diff --git a/debian/cryptmount.lintian-overrides b/debian/cryptmount.lintian-overrides
new file mode 100644
index 000..698a82d
--- /dev/null
+++ b/debian/cryptmount.lintian-overrides
@@ -0,0 +1,4 @@
+# lintian-override for cryptmount
+
+# cryptmount needs to have setuid privileges to be usable by ordinary users:
+cryptmount: setuid-binary usr/bin/cryptmount 4755 root/root
diff --git a/debian/dirs b/debian/dirs
index e453b9c..fa9d077 100644
--- a/debian/dirs
+++ b/debian/dirs
@@ -1,7 +1,6 @@
 etc/cryptmount
-etc/init.d
 etc/modules-load.d
-usr/lib/systemd/system
+lib/systemd/system
 usr/share/doc/cryptmount/examples
 usr/share/man
 usr/share/lintian/overrides
diff --git a/debian/lintian-override b/debian/lintian-override
deleted file mode 100644
index 698a82d..000
--- a/debian/lintian-override
+++ /dev/null
@@ -1,4 +0,0 @@
-# lintian-override for cryptmount
-
-# cryptmount needs to have setuid privileges to be usable by ordinary users:
-cryptmount: setuid-binary usr/bin/cryptmount 4755 root/root
diff --git a/debian/patches/autotools-fixes.patch b/debian/patches/autotools-fixes.patch
new file mode 100644
index 000..90e16e2
--- /dev/null
+++ b/debian/patches/autotools-fixes.patch
@@ -0,0 +1,38 @@
+--- a/Makefile.am
 b/Makefile.am
+@@ -5,7 +5,6 @@
+ 		-DCM_SYSRUN_DIR=\$(CM_SYSRUN_DIR)\ \
+ 		-DCM_MODULE_DIR=\$(pkglibdir)\
+ 
+-ACLOCAL_AMFLAGS = #-I m4
+ bin_PROGRAMS=cryptmount
+ cryptmount_SOURCES=cryptmount.c cryptmount.h \
+ 	armour.c armour.h \
+@@ -30,7 +29,7 @@
+ EXTRA_DIST = config.rpath mkinstalldirs cmtab.example \
+ 	README.OpenSSL RELNOTES ToDo cryptmount.spec \
+ 	debian/changelog debian/compat debian/control debian/copyright \
+-	debian/dirs debian/docs debian/rules debian/lintian-override \
++	debian/dirs debian/docs debian/rules debian/cryptmount.lintian-overrides \
+ 	debian/postinst debian/postrm debian/watch debian/source/format \
+ 	debian/upstream/signing-key.asc
+ 
+--- a/Makefile.in
 b/Makefile.in
+@@ -358,7 +358,6 @@
+ 		-DCM_SYSRUN_DIR=\$(CM_SYSRUN_DIR)\ \
+ 		-DCM_MODULE_DIR=\$(pkglibdir)\
+ 
+-ACLOCAL_AMFLAGS = #-I m4
+ cryptmount_SOURCES = cryptmount.c cryptmount.h \
+ 	armour.c armour.h \
+ 	armour-builtin.c armour-gcry.c armour-luks.c \
+@@ -376,7 +375,7 @@
+ EXTRA_DIST = config.rpath mkinstalldirs cmtab.example \
+ 	README.OpenSSL RELNOTES ToDo cryptmount.spec \
+ 	debian/changelog debian/compat debian/control debian/copyright \
+-	debian/dirs debian/docs debian/rules debian/lintian-override \
++	debian/dirs debian/docs debian/rules debian/cryptmount.lintian-overrides \
+ 	debian/postinst debian/postrm debian/watch debian/source/format \
+ 	debian/upstream/signing-key.asc
+ 
diff --git a/debian/patches/series b/debian/patches/series
index 57f58cd..5aca477 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,2 +1,4 @@
+systemd-paths.patch
 install-example-cmtab.patch
 init.d-script.patch
+autotools-fixes.patch
diff --git a/debian/patches/systemd-paths.patch b/debian/patches/systemd-paths.patch
new file mode 100644
index 000..28d0c4c
--- /dev/null
+++ b/debian/patches/systemd-paths.patch
@@ -0,0 +1,17 @@
+--- a/sysinit/Makefile.am
 b/sysinit/Makefile.am
+@@ -26,11 +26,11 @@
+ 
+ install-inits:	cryptmount.service initscript
+ if USE_SYSTEMD
+-	test -d ${DESTDIR}/usr/lib/systemd/system || mkdir -p ${DESTDIR}/usr/lib/systemd/system
++	test -d ${DESTDIR}/lib/systemd/system || mkdir -p ${DESTDIR}/lib/systemd/system
+ 	test -d ${DESTDIR}/etc/modules-load.d || mkdir -p ${DESTDIR}/etc/modules-load.d
+ endif	# USE_SYSTEMD
+-	if test -d ${DESTDIR}/usr/lib/systemd/system ; then \
+-	${INSTALL_PROGRAM_ENV} ${INSTALL_DATA} cryptmount.service ${DESTDIR}/usr/lib/systemd/system; \
++	if 

Bug#795322: cryptmount: FTBFS: assumes automake-1.14

2015-08-13 Thread R.Penney
Thanks for your bug-report.

I have already been working on fix for this issue, and have
cryptmount-5.1-2 awaiting upload with the support of my sponsor.

For the time being, these packages are available at
http://www.rwpenney.org.uk/software

The new build-system uses debhelper v7 and dh-autoreconf, so should
be a more robust solution in the long term.

RW Penney



Bug#779851: cryptmount: Cannot mount as non-root user

2015-03-05 Thread R.Penney
Hello Gilles,
Thanks for your bug report about cryptmount, and the
helpful reference to bug #759263.

I've just re-run the cryptmount test-suite on my Jessie test
system, and all the tests seem to pass. I suspect this means that the
problem you're having is not related to bug #759263, which was caught
by the test-suite.

From your description, I'm guessing that your encrypted
filesystem may live on a network share (mounted
under /home/gilles/mnt ?). This isn't a use-case that I've tried,
especially with LUKS encrypted filesystems, and I'm not sure whether
it's an intended use-case for libcryptsetup.
If you are indeed using a network share, it might be worth
trying the same setup steps, but with the encrypted container somewhere
on your local disk. If the network share is the source of problems,
then you might like to try a different keymanager within cryptmount.

Perhaps you can let me know the result of those experiments?

Thanks,
RW Penney


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#759263: cryptmount: Failed to initialize device for LUKS keyfile

2014-08-30 Thread R.Penney
This bug seems to be related to apparent incompatibilities between the
latest libcryptsetup and libgcrypt11. Preliminary experiments with
libgcrypt20 indicate that the problems with non-privileged access to
LUKS partitions can be fixed simply by compiling with libgcrypt20-dev
in place of libgcrypt11-dev.

The attached patch describes these changes. After a bit more testing,
I hope to have an updated (minor) release available soon.

RW Penney
diff --git a/debian/control b/debian/control
index 245d9d6..de31c79 100644
--- a/debian/control
+++ b/debian/control
@@ -4,12 +4,12 @@ Priority: extra
 Maintainer: RW Penney rwpen...@users.sourceforge.net
 Homepage: http://cryptmount.sourceforge.net
 Build-Depends: debhelper (= 9.0.0), dpkg-dev (=1.16.1), autotools-dev,
-libcryptsetup-dev (= 1.4), libdevmapper-dev,
-libgcrypt11-dev (= 1.1), pkg-config, uuid-dev
+libcryptsetup-dev (= 1.6), libdevmapper-dev,
+libgcrypt20-dev (= 1.1), pkg-config
 Standards-Version: 3.9.5
 
 Package: cryptmount
-Architecture: any
+Architecture: linux-any
 Depends: ${shlibs:Depends}, ${misc:Depends}
 Recommends: udev
 Suggests: openssl, dmsetup


Bug#759263: cryptmount: Failed to initialize device for LUKS keyfile

2014-08-26 Thread R.Penney
Hello Dave,
Thanks for your helpful bug report.

It would appear that this issue is related to changes in libcryptsetup
between versions 1.6.4 and 1.6.6 (which has just entered
debian-testing). The issue you've identified may be related to changes
in libcryptsetup connected with allowing non-privileged users to
access certain LUKS functions provided that they have read access to the
given device.

I'll need to do some investigation to see whether this is something
that is triggered by cryptmount misusing the cryptsetup API,
or whether there is some form of workaround.

Kind regards,

RW Penney


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#738736: cryptmount: Placeholder @ETCDIR@ appears in /usr/sbin/cryptmount-setup

2014-02-12 Thread R.Penney
Hello Steve,
Thanks for identifying this issue with @ETCDIR@,
and for filing a bug-report.

I've attached a patch which should sort out the issue.
I hope to have an updated release of cryptmount available soon.

Kind regards,
RW Penney
diff --git a/sysinit/Makefile.am b/sysinit/Makefile.am
index 8e1e044..f42ede6 100644
--- a/sysinit/Makefile.am
+++ b/sysinit/Makefile.am
@@ -5,7 +5,7 @@ EXTRA_DIST = cryptmount.service.in modules-load.conf \
 	setupscript.sh.in initscript.in
 
 scripttransform='s,@EXENAME@,$(bindir)/cryptmount$(EXEEXT),g; \
-		s,@CM_SYSCONF_DIR@,$(CM_SYSCONF_DIR),g; \
+		s,@SYSCONF_DIR@,$(CM_SYSCONF_DIR),g; \
 		s,@PKG_NAME@,$(PACKAGE_NAME),g; \
 		s,@PKG_VERSION@,$(VERSION),g; \
 		s,@LCL_DIR@,$(localedir),g'
diff --git a/sysinit/initscript.in b/sysinit/initscript.in
index 98df30f..409407e 100644
--- a/sysinit/initscript.in
+++ b/sysinit/initscript.in
@@ -77,7 +77,7 @@ dofilesys() {
 doALL() {
 if test -n ${CM_BOOTDV} -o -n ${CM_BOOTSW} \
 -o -n ${CM_BOOTFS} -o -n ${CM_EARLYDV}; then
-echo Using /etc/default/cryptmount is DEPRECATED - please use 'bootaction={mount|swap|prepare}' flags within /etc/cryptmount/cmtab
+echo Using /etc/default/cryptmount is DEPRECATED - please use 'bootaction={mount|swap|prepare}' flags within @SYSCONF_DIR@/cmtab
 fi
 
 case $1 in
diff --git a/sysinit/setupscript.sh.in b/sysinit/setupscript.sh.in
index 308586a..511adf8 100755
--- a/sysinit/setupscript.sh.in
+++ b/sysinit/setupscript.sh.in
@@ -8,7 +8,7 @@
 # for further information.
 
 CM_BINEXE=@EXENAME@
-CM_CFGDIR=@ETCDIR@
+CM_CFGDIR=@SYSCONF_DIR@
 
 
 # prepare gettext internationalization:


Bug#672678: cryptmount: diff for NMU version 4.3-1.1

2012-05-25 Thread R.Penney
Hi Don,
Thanks for your efforts in patching this bug in cryptmount.

As maintainer, I'm sorry that I wasn't able to get a full version
of the package uploaded to the Debian servers as promptly as I would
have liked. Hopefully version 4.3.1-1 will be available in sid within
the next day or so, with thanks to my Debian sponsor, Laszlo Boszormenyi.

Even if your patch wasn't used directly, I really appreciate
your taking the time to resolve this release-critical bug.
Kind regards,
Richard.

+--   on Thu, May 24, 2012 at 10:53:25AM -0700, Don Armstrong wrote:   ---+
 tags 672678 + pending
 thanks
 
 Dear maintainer,
 
 I've prepared an NMU for cryptmount (versioned as 4.3-1.1) and
 uploaded it to DELAYED/2. Please feel free to tell me if I
 should delay it longer.
 
 Regards.
 
 
 Don Armstrong



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672678: cryptmount: unmet dependency on libdevmapper

2012-05-13 Thread R.Penney
Hello Teodor,
Thanks for finding this issue with the cryptmount build-system.

I believe the problem is easily fixed by removing the explicit
dependency on 'libdevmapper' within the debian/control file.

I've attached a patch which seems to sort out the problem on
my debian-sid system, and doesn't seem to have any side effects under
lenny or squeeze.

I hope to have cryptmount-4.3.1 available soon which will incorporate
this fix.

Kind regards,
RW Penney
diff --git a/Makefile.am b/Makefile.am
index 8241c21..2cf9b49 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -116,7 +116,6 @@ clean-local:
 	-rm -f ${CM_MODULES}
 	-rm -f ${man_MANS} initscript initscript-early setupscript testing/mudslinger-*-*.log
 	-rm -f splint.log
-	${MAKE} -C luks clean
 
 dist-hook:
 	mkdir ${distdir}/testing/keys; cp -p ${srcdir}/testing/keys/[0-9]* ${distdir}/testing/keys/
diff --git a/Makefile.in b/Makefile.in
index 4799d95..c9c303f 100644
--- a/Makefile.in
+++ b/Makefile.in
@@ -906,7 +906,6 @@ clean-local:
 	-rm -f ${CM_MODULES}
 	-rm -f ${man_MANS} initscript initscript-early setupscript testing/mudslinger-*-*.log
 	-rm -f splint.log
-	${MAKE} -C luks clean
 
 dist-hook:
 	mkdir ${distdir}/testing/keys; cp -p ${srcdir}/testing/keys/[0-9]* ${distdir}/testing/keys/
diff --git a/debian/control b/debian/control
index e5ec6af..883ce28 100644
--- a/debian/control
+++ b/debian/control
@@ -8,7 +8,7 @@ Standards-Version: 3.9.3
 
 Package: cryptmount
 Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, libdevmapper
+Depends: ${shlibs:Depends}, ${misc:Depends}
 Recommends: udev
 Suggests: openssl, dmsetup
 Description: Management of encrypted file systems


Bug#656346: Bug fixed

2012-01-21 Thread R.Penney
severity 656346 fixed
thanks

It would appear that the symptoms may have been caused by attempting
to execute 'cryptmount --prepare' on a device that already had a
mounted filesystem. This condition is apparently trapped by
the device-mapper library.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#656346: cryptmount --prepare fails

2012-01-18 Thread R.Penney
Hello,
Thanks for your bug report.

I think you'll need to provide some basic information about how
you're using cryptmount before I can make any attempt to resolve
this bug report.

I have frequently tested 'cryptmount --prepare' on a wide range
of linux distros, including a broad cross-section of debian systems. Indeed,
I have run a pretty extensive testing suite on a debian-6.0.3 system
with exactly the same versions of libc6, libgcrypt11, libuuid1 that you
cite in your bug report. Those tests have not shown any sign of the problem
you mention, nor any sign that cryptmount is generally unusable.

Obviously, if you are running into problems with cryptmount,
I am keen to understand whether there are bugs that need fixing. However,
without more details of how to reproduce the symptoms you are seeing,
I cannot make any progress. If you need evidence of the tests that are
regularly preformed on cryptmount, you may like to refer to the 'mudslinger'
testing program within the cryptmount source distribution. If you can
suggest an additional test that should be included in there,
that would be especially helpful.

Kind regards,

RW Penney

+--   on Wed, Jan 18, 2012 at 11:55:27AM -0500, gds...@tx.rr.com wrote:   ---+
 Subject: cryptmount --prepare fails
 Package: cryptmount
 Version: 4.1-2
 Justification: renders package unusable
 Severity: grave
 Tags: l10n
 
 *** Please type your report below this line ***
 
 Here are the error messages from syslog:
 
 Jan 16 20:33:04 far-star kernel: [  690.357274] device-mapper: table: 254:0: 
 crypt: Error allocating crypto tfm
 Jan 16 20:33:04 far-star kernel: [  690.357284] device-mapper: ioctl: error 
 adding target to table
 
 And here are the relevant messages from strace:
 
 munmap(0xb78b1000, 4096)= 0
 ioctl(3, DM_VERSION, 0x9a6d5c0) = 0
 ioctl(3, DM_DEV_CREATE, 0x9a6d5c0)  = 0
 ioctl(3, DM_TABLE_LOAD, 0x9a6d5c0)  = -1 EINVAL (Invalid argument)
 open(/usr/share/locale/en_US.UTF-8/LC_MESSAGES/libc.mo, O_RDONLY) = -1 
 ENOENT (No such file or directory)
 open(/usr/share/locale/en_US.utf8/LC_MESSAGES/libc.mo, O_RDONLY) = -1 
 ENOENT (No such file or directory)
 open(/usr/share/locale/en_US/LC_MESSAGES/libc.mo, O_RDONLY) = -1 ENOENT (No 
 such file or directory)
 open(/usr/share/locale/en.UTF-8/LC_MESSAGES/libc.mo, O_RDONLY) = -1 ENOENT 
 (No such file or directory)
 open(/usr/share/locale/en.utf8/LC_MESSAGES/libc.mo, O_RDONLY) = -1 ENOENT 
 (No such file or directory)
 open(/usr/share/locale/en/LC_MESSAGES/libc.mo, O_RDONLY) = -1 ENOENT (No 
 such file or directory)
 write(2, device-mapper: reload ioctl fail..., 52device-mapper: reload ioctl 
 failed: Invalid argument) = 52
 write(2, \n, 1
 )
 
 In a normal workstation/GUI US English installation libc.mo is not in the 
 /usr/share/locale/en/LC_MESSAGES or /usr/share/locale/en_US/LC_MESSAGES 
 directories in Squeeze or Lenny. It is in all (?) the other non-english 
 directories.
 
 -- System Information:
 Debian Release: 6.0.3
   APT prefers stable
   APT policy: (500, 'stable')
 Architecture: i386 (i686)
 
 Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
 Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/dash
 
 Versions of packages cryptmount depends on:
 ii  libc62.11.2-10   Embedded GNU C Library: Shared 
 lib
 ii  libdevmapper1.02.1 [libdevma 2:1.02.48-5 The Linux Kernel Device Mapper 
 use
 ii  libgcrypt11  1.4.5-2 LGPL Crypto library - runtime 
 libr
 ii  libuuid1 2.17.2-9Universally Unique ID library
 
 cryptmount recommends no packages.
 
 Versions of packages cryptmount suggests:
 ii  dmsetup 2:1.02.48-5  The Linux Kernel Device Mapper 
 use
 ii  openssl 0.9.8o-4squeeze5 Secure Socket Layer (SSL) binary 
 a
 
 -- Configuration Files:
 /etc/cryptmount/cmtab changed [not included]
 
 -- no debconf information
 
 
 



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#641476: cryptmount: permission denied when writing to vfat partition

2012-01-01 Thread R.Penney
Hi George,
You may like to know that cryptmount-4.3 will now have
support for simple environmental variables within /etc/cryptmount/cmtab
so that you can use something like 'mountoptions=uid=$(USERNAME)' to
give you slightly more flexibility when mounting VFAT partitions.

This feature is still in its testing phase, but if you'd
like to try it out then there's an alpha release of cryptmount-4.3
available via http://www.sourceforge.net/projects/cryptmount/files/unstable.

Kind regards,
RWP



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#641476: cryptmount: permission denied when writing to vfat partition

2011-09-14 Thread R.Penney
Hi George,
Thanks for your feedback on cryptmount.

Have you tried using the 'mountoption' parameter in your
/etc/cryptmount/cmtab? One of the options for mounting fat/vfat
filesystems is uid=???, which looks like it might be suitable for
setting the ownership of the mounted filesystem.

If this works, I hope it will be sufficient as a fix for
your bug report. I realise that setting 'mountoptions=uid=george'
would not work well for other users of your system with whom you
might want to share your encrypted filesystem. Perhaps that
is a feature I'll look into adding to cryptmount at some stage.

Perhaps you can try out the 'mountoptions' idea, and let me know
whether it helps?

Kind regards,
RWP



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#615865: cryptmount gets device size wrong with optical media

2011-03-26 Thread R.Penney
Hello Paul,
Thanks for spotting this issue, and for your patch.

As this may affect the interpretation of the 'startsector' and
'numsectors' parameters in users' /etc/cryptmount/cmtab files, I think
it safest to incorporate this fix into the next release of cryptmount
rather than an updated version of the 4.1 series. I've updated the
documentation to make clear that these parameters will in future refer
exclusively to 512-byte sectors.

I've just released an alpha version of cryptmount-4.2 on
www.sourceforge.net/projects/cryptmount, which I hope will behave
correctly on optical media.

Kind regards,
RW Penney

+--   on Mon, Feb 28, 2011 at 02:42:01PM +, Paul Martin wrote:   ---+
 Package: cryptmount
 Version: 4.1-2
 Severity: important
 Tags: patch
 
 When using optical media (sector size 2048 bytes), cryptmount guesses 
 the device size as a quarter of its actual size.

 Index: cryptmount-4.1/cryptmount.c
 ===
 --- cryptmount-4.1.orig/cryptmount.c  2011-02-28 14:20:50.867166060 +
 +++ cryptmount-4.1/cryptmount.c   2011-02-28 14:21:24.236073480 +
 @@ -196,9 +196,8 @@
  if (fd  0) return (int64_t)-1;
  
  #ifdef BLKGETSIZE64
 -if (ioctl(fd, BLKGETSIZE64, count) == 0
 - ioctl(fd, BLKSSZGET, blklen) == 0) {
 -count /= (int64_t)blklen;
 +if (ioctl(fd, BLKGETSIZE64, count) == 0) {
 +count /= 512;
  } else {
  count = -1;
  }




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#562680: installing cryptmount in chroot woes

2010-01-10 Thread R.Penney
Hello Harri,

Thanks for flagging this issue with cryptmount  chroot.

As per previous correspondence on bug#551533, I don't think this causes
failure of cryptmount's postinst script, but merely leads to modprobe reporting
that is was unable to run successfully.

Based on a recipe within the udev package, I've drafted a patch which should
avoid even this warning message. Perhaps you could try this patch,
and let me know whether it represents an acceptable solution?

Regards,

RW Penney

+--   on Sat, Dec 26, 2009 at 10:34:19PM +0100, Harald Dunkel wrote:   ---+
 Package: cryptmount
 Version: 4.0.2-1
 Severity: important


 Trying to update cryptount within a chroot (on an external
 disk) fails with:

 :
 Setting up cryptmount (4.0.2-1) ...
 Installing new version of config file /etc/init.d/cryptmount ...
 FATAL: Could not load /lib/modules/2.6.32.2/modules.dep: No such file or 
 directory


 Of course there is no kernel 2.6.32.2 in the chroot installed,
 but the official Debian kernel. The postinst script should not
 look at the the output of uname.


 Regards

 Harri


diff -Nuar cryptmount-4.0.2/debian/postinst cryptmount-patched/debian/postinst
--- cryptmount-4.0.2/debian/postinst	2009-08-07 05:52:53.0 +0100
+++ cryptmount-patched/debian/postinst	2010-01-10 14:09:56.0 +
@@ -19,9 +19,14 @@
 
 case $1 in
 configure)
-	update-rc.d cryptmount-early start 26 S . stop 59 0 6 .  /dev/null
-	update-rc.d cryptmount defaults 28  /dev/null
-	modprobe -q -a dm-mod dm-crypt || true
+update-rc.d cryptmount-early start 26 S . stop 59 0 6 .  /dev/null
+update-rc.d cryptmount defaults 28  /dev/null
+
+if [ -r /proc/1/root -a /proc/1/root/ -ef /proc/self/root/ ]; then
+modprobe -q -a dm-mod dm-crypt || true
+else
+echo A chroot environment has been detected - not running 'modprobe dm-crypt'
+fi
 ;;
 
 abort-upgrade|abort-remove|abort-deconfigure)


Bug#558347: cryptmount init script should unmount and deconfigure all known encryptedfilesystems at shutdown

2009-12-06 Thread R.Penney
Hello Vefa,
Thanks for your bug report, and for your helpful patch.

I'll make sure your patch is included in future releases
of cryptmount, and hope that you will remain a mostly happy cryptmount
user at least until then.

Kind regards,

RW Penney



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#551533: installing cryptmount in chroot failed

2009-10-19 Thread R.Penney
Harri,
Thanks for your bug-report.

It's not clear that this is a bug in cryptmount, and it
likely that the problems you're having are very dependent on the
details of your 'chroot' filesystem.

It would appear that the absence of the '/lib/modules/...' files
within your chroot filesystem is confusing the cryptmount postinst script,
probably when it calls 'modprobe'. Clearly, it is not cryptmount's
responsibility to setup /lib/modules/...' directly.

Before I investigate further, could you give details about
how you have setup your chroot filesystem?

RW Penney



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#546502: cryptmount: Incorrect dependencies in init.d script

2009-09-17 Thread R.Penney
Hello Petter,
Thank you for finding this bug in cryptmount's init.d scripts,
and for your helpful patches.

I have now merged your patches (with minor modifications
to the dependency on $syslog) to create a new upstream version, 4.0.1,
which should now be available at http://www.sourceforge.net/projects/cryptmount
I have asked my Debian sponsor to upload this to the Debian servers
on my behalf.  

Thanks,

RW Penney



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#529566: cryptmount: cannot handle equal mark when setting mount option like uid=1000

2009-05-20 Thread R.Penney
Hello Ryo,
Could you check that you are using fsoptions=uid=1000
rather than opts=... in your /etc/cryptmount/cmtab?

I've had a quick look at the parser within cryptmount-4.0
and can't see any obvious reasons why using fsoptions with a parameter
that includes an equals sign shouldn't work. I've also tried a test
on my installation of cryptmount-4.0, which produced no parser complaints.

If you can try with the fsoptions used as specified in
the cmtab manual-page, and give me a few more details about *how* that fails
(e.g. parser failure, mount failure, mount options not correctly applied, etc.)
that would be very helpful.

Thanks,
RW Penney

+--   on Wed, May 20, 2009 at 04:10:05PM +0900, Ryo IGARASHI wrote:   ---+
 Package: cryptmount
 Version: 4.0-1
 Severity: normal
 
 Hi,
 
 I found that I cannot set mount option which has equal mark inside.
 I don't dig into the code yet, but it seems that the problem
 arises from the option parser.
 For example, neither setting /etc/cryptmount/cmtab as
 
 LUKS {
  keyformat=luks
  dev=/home/XXX/luks.vol
  keyfile=/home/XXX/luks.vol
  cipher=aes-cbc-plain
  dir=/home/xxx/luks
  fstype=vfat
  opt=uid=1000
 } 
 
 nor
 
 opt=uid=1000
 
 worked.
 
 I want to share this volume file even in the Windows world using
 FreeOTFEExplorer so that I must use vfat for the filesystem.
 
 -- 
 Ryo IGARASHI, Ph.D.
 rigar...@gmail.com
 
 -- System Information:
 Debian Release: squeeze/sid
   APT prefers proposed-updates
   APT policy: (500, 'proposed-updates'), (500, 'unstable'), (500, 'stable'), 
 (1, 'experimental')
 Architecture: amd64 (x86_64)
 
 Kernel: Linux 2.6.26-2-amd64 (SMP w/8 CPU cores)
 Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/bash
 
 Versions of packages cryptmount depends on:
 ii  libc62.9-12  GNU C Library: Shared libraries
 ii  libdevmapper1.02.1 [libdevma 2:1.02.30-3 The Linux Kernel Device Mapper 
 use
 ii  libgcrypt11  1.4.4-2 LGPL Crypto library - runtime 
 libr
 ii  libuuid1 1.41.5-1universally unique id library
 
 cryptmount recommends no packages.
 
 Versions of packages cryptmount suggests:
 ii  dmsetup  2:1.02.30-3 The Linux Kernel Device Mapper 
 use
 ii  openssl  0.9.8g-16   Secure Socket Layer (SSL) binary 
 a
 
 -- no debconf information
 
 



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#516922: cryptmount: Resolved?

2009-03-16 Thread R.Penney
Hi Dan,
Could you check that you are using cryptmount-3.1.2, which still
hasn't entered the 'testing' release yet? (Only 3.1.1 is in 'testing'
as of 16th March.) Running 'cryptmount --version' should confirm this.

I've just re-run cryptmount's 'mudslinger' testing routings from
version 3.1.2 on my (virtualized) Debian-testing installation, and found
that it seems to cope perfectly with using the 'blowfish' cipher in
libgcyppt-1.4.4-2, and other tests related to OpenSSL compatibility that
also use blowfish from libgcrypt seem to work fine.

If you really need to access your filesystem urgently, you could
try compiling other recent releases of cryptmount from source, as released
via http://www.sourceforge.net/projects/cryptmount. If you really want
to downgrade, perhaps you could try version 3.0.2. All recent releases,
3.0.2, 3.1.2 and 4.0beta1 should contain the same fix for the
libgcrypt-initialization issue. I'd really welcome any clues if
additional fixing is needed.

Thanks,
RWP

+--   on Sun, Mar 15, 2009 at 10:16:46PM +0100, Dan H. wrote:   ---+
 Package: cryptmount
 Version: 3.1.1-1
 Followup-For: Bug #516922
 
 reportbug shows this bug as resolved; however, on my freshly-updated
 testing box it isn't.
 
 This is bad because I need to access some encrypted filesystems. Can I
 somehow downgrade cryptmount?
 
 -- System Information:
 Debian Release: squeeze/sid
   APT prefers testing
   APT policy: (500, 'testing')
 Architecture: i386 (i686)
 
 Kernel: Linux 2.6.18-6-k7 (SMP w/1 CPU core)
 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/dash
 
 Versions of packages cryptmount depends on:
 ii  libc62.9-4   GNU C Library: Shared libraries
 ii  libdevmapper1.02.1 [libdevma 2:1.02.27-4 The Linux Kernel Device Mapper 
 use
 ii  libgcrypt11  1.4.4-2 LGPL Crypto library - runtime 
 libr
 ii  libuuid1 1.41.3-1universally unique id library
 
 cryptmount recommends no packages.
 
 Versions of packages cryptmount suggests:
 ii  dmsetup  2:1.02.27-4 The Linux Kernel Device Mapper 
 use
 ii  openssl  0.9.8g-15   Secure Socket Layer (SSL) binary 
 a
 
 -- no debconf information
 
 



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#516922: cryptmount: couldn't find libgcrypt cipher blowfish

2009-02-24 Thread R.Penney
This is pretty easy to fix with a call to gcry_check_version() within
kmgrcy_init_algs().
I've attached a patch that should be a temporary fix for version 3.1.1.

I'm in the process of preparing an updated release (3.1.2), together with an
improved version 4.0.

RWP
+--   on Tue, Feb 24, 2009 at 04:19:39PM +0100, Agustin Martin wrote:   ---+
 reassign 516922 cryptmount
 found 516922 3.1.1-1
 thanks
 
 On Tue, Feb 24, 2009 at 03:36:21PM +0100, Werner Koch wrote:
  On Tue, 24 Feb 2009 15:09, agustin.mar...@hispalinux.es said:
  
   Last libgcrypt11 seems to have added a problem regarding cryptmount. 
   Since I
  
  Cryptmount does not properly initialize Libgcrypt.  From the NEWS file:
 ...
  Please fix Cryptmout.
 
 Thanks a lot for the really quick reply.
 
 Reassigning to cryptmount alone and setting found version. 
 
 -- 
 Agustin
 
 
diff -Nuar cryptmount-3.1.1/armour-gcry.c cryptmount-3.1.1-patched/armour-gcry.c
--- cryptmount-3.1.1/armour-gcry.c	2008-10-03 12:39:16.0 +0100
+++ cryptmount-3.1.1-patched/armour-gcry.c	2009-02-24 20:18:34.0 +
@@ -384,7 +384,8 @@
 
 static int kmgcry_init_algs()
 {
-/* Nothing needed */
+(void)gcry_check_version(NULL);	/* Initializes library as side-effect */
+
 return 0;
 }
 


Bug#479682: cryptmount: Clarification for Debconf string needed

2008-05-06 Thread R.Penney
Dear Kai,
Many thanks for your email - I would be delighted to support any
effort to produce a German localization of cryptmount.

As regards the user-%lu string, this is issued when someone
tries to unmount a filesystem that was mounted by a different user. The
message is supposed to give the numerical user identity (as provided by
getuid()). So, only the '%lu' part should be the numerical UID, and a
typical output might be 'only user-16 can unmount opaque'.

If you do manage to produce a German set of translations, I
would be very grateful if you could send me a copy for inclusion future
releases of cryptmount.

Kind regards,
Richard


+--   on Tue, May 06, 2008 at 08:31:34AM +0200, Kai Wasserbäch wrote:   ---+
 Package: cryptmount
 Version: 2.1-1
 Severity: minor
 Tags: l10n
 
 Hello,
 during the discussion of the German translation of your Debconf template I 
 came
 accross the following line:
  #: cryptmount.c:453
  #, c-format
  msgid only user-%lu can unmount \%s\\n
 
 It is unclear whether the »user-« part is also part of the user id or only the
 replaced part (%lu). After checking the French translation and having a (very)
 short look into the source code, I'm of the opinion that only the part after 
 the
 hyphen is the actual uid, but it is not clear. If the whole thing would be the
 uid, then I shouldn't translate the »user-«. If only the part after the hyphen
 is the actual uid, then I should (and can) translate it (in which case I would
 get rid of the hyphen).
 Please add a comment for translators or change the string to make it more 
 clear
 what is meant (e.g. by adding quotes).
 
 Thank you in advance.
 
 Kind regards,
 Kai Wasserbäch
 
 
 
 -- 
 
 Kai Wasserbäch (Kai Wasserbaech)
 
 E-Mail: [EMAIL PROTECTED]
 Jabber (debianforum.de): Drizzt
 URL: http://wiki.debianforum.de/Drizzt_Do%27Urden
 GnuPG: 0xE1DE59D2  0600 96CE F3C8 E733 E5B6 1587 A309 D76C E1DE 59D2
 (http://pgpkeys.pca.dfn.de/pks/lookup?search=0xE1DE59D2fingerprint=onhash=onop=vindex)
 





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#436676: cryptmount: not handling nostrip build option (policy 10.1) sid/i386

2007-08-08 Thread R.Penney
Hello Julien,
Thanks for your suggestion about cryptmount.

I'm not convinced that this is a problem with either the
upstream package, or with the debian build. I can find no reference
to any strip/ld -s/install -s in the upstream package; an ordinary
make install of the upstream package does not strip the executable;
and my debian/rules file does already contain 'dh_strip'
in the binary-arch target.

Could you possibly give me some more information about where
within the cryptmount package you believe the fault might lie?

Thanks,
Richard


+--   on Wed, Aug 08, 2007 at 03:13:22PM +0200, Julien Danjou wrote:   ---+
 Package: cryptmount
 Version: 2.1-1
 Severity: wishlist
 User: [EMAIL PROTECTED]
 Usertags: nostrip
 
 Hello,
 
 There was a problem while autobuilding your package with 
 DEB_BUILD_OPTIONS=nostrip.
 Final binaries are still stripped.
 
 If you call dh_strip correctly in debian/rules, this may mean that upstream
 is stripping anyway.
 You should look for call to strip, ld -s or install -s which may strip 
 binaries.
 
 
  Automatic build of cryptmount_2.1-1 on octave for sid/i386 by rebuildd 0.2.1
  Build started at 2007-08-08 12:56:41.875112
  **
  Reading package lists...
  Building dependency tree...
  Reading state information...
  Need to get 262kB of source archives.
  Get:1 http://ftp.fr.debian.org sid/main cryptmount 2.1-1 (dsc) [659B]
  Get:2 http://ftp.fr.debian.org sid/main cryptmount 2.1-1 (tar) [246kB]
  Get:3 http://ftp.fr.debian.org sid/main cryptmount 2.1-1 (diff) [15.1kB]
  Fetched 262kB in 0s (451kB/s)
  Download complete and in download only mode
  W: /home/staff/jd/.pbuilderrc does not exist
  I: using fakeroot in build.
  Current time: Wed Aug  8 12:56:46 UTC 2007
  pbuilder-time-stamp: 1186577806
  Building the build Environment
   - extracting base tarball [/var/cache/pbuilder/sid.tgz]
   - creating local configuration
   - copying local configuration
   - mounting /proc filesystem
   - mounting /dev/pts filesystem
   - policy-rc.d already exists
  Obtaining the cached apt archive contents
  Installing the build-deps
   - Attempting to parse the build-deps 
   - Considering build-dep debhelper (= 4.0.0)
 - Trying debhelper
   - Considering build-dep autotools-dev
 - Trying autotools-dev
   - Considering build-dep libdevmapper-dev
 - Trying libdevmapper-dev
   - Considering build-dep libssl-dev (= 0.9.7)
 - Trying libssl-dev
   - Considering build-dep libgcrypt11-dev (= 1.1)
 - Trying libgcrypt11-dev
   - Installing  debhelper autotools-dev libdevmapper-dev libssl-dev 
  libgcrypt11-dev
  Reading package lists...
  Building dependency tree...
  Reading state information...
  The following extra packages will be installed:
file gettext gettext-base html2text intltool-debian libgpg-error-dev
libmagic1 libssl0.9.8 po-debconf zlib1g-dev
  Suggested packages:
dh-make cvs gettext-doc libgcrypt11-doc
  Recommended packages:
curl wget lynx libmail-sendmail-perl libcompress-zlib-perl
  The following NEW packages will be installed:
autotools-dev debhelper file gettext gettext-base html2text 
  intltool-debian
libdevmapper-dev libgcrypt11-dev libgpg-error-dev libmagic1 libssl-dev
libssl0.9.8 po-debconf zlib1g-dev
  0 upgraded, 15 newly installed, 0 to remove and 0 not upgraded.
  Need to get 63.9kB/8882kB of archives.
  After unpacking 24.3MB of additional disk space will be used.
  Get:1 http://ftp.fr.debian.org sid/main libdevmapper-dev 2:1.02.20-2 
  [63.9kB]
  debconf: delaying package configuration, since apt-utils is not installed
  Fetched 63.9kB in 0s (195kB/s)
  Selecting previously deselected package libssl0.9.8.
  (Reading database ... 8965 files and directories currently installed.)
  Unpacking libssl0.9.8 (from .../libssl0.9.8_0.9.8e-5_i386.deb) ...
  Selecting previously deselected package libmagic1.
  Unpacking libmagic1 (from .../libmagic1_4.21-2_i386.deb) ...
  Selecting previously deselected package file.
  Unpacking file (from .../archives/file_4.21-2_i386.deb) ...
  Selecting previously deselected package gettext-base.
  Unpacking gettext-base (from .../gettext-base_0.16.1-2_i386.deb) ...
  Selecting previously deselected package autotools-dev.
  Unpacking autotools-dev (from .../autotools-dev_20070306.1_all.deb) ...
  Selecting previously deselected package html2text.
  Unpacking html2text (from .../html2text_1.3.2a-3_i386.deb) ...
  Selecting previously deselected package gettext.
  Unpacking gettext (from .../gettext_0.16.1-2_i386.deb) ...
  Selecting previously deselected package intltool-debian.
  Unpacking intltool-debian (from 
  .../intltool-debian_0.35.0+20060710.1_all.deb) ...
  Selecting previously deselected package po-debconf.
  Unpacking po-debconf (from .../po-debconf_1.0.9_all.deb) ...
  Selecting previously deselected package debhelper.
  Unpacking debhelper 

Bug#420066: Cryptmount loop devices can prevent root from being umounted on shutdown

2007-04-28 Thread R.Penney
Hi Carl,
Thanks for your bug report.

This is indeed a sensible feature request, and your suggested fix
is a workable solution. My slight reservation is that 'cryptmount -ua'
will only deal with targets that are listed in /etc/cryptmount/cmtab
(ignoring any created via the --config-fd option), and will complain
about targets that weren't mounted at all.

I'll have a think about whether there's any neater way
of getting round the issue you've identified. This may have to wait
for a future (?minor) release of the upstream package.

Thanks,
RW Penney

+--   on Thu, Apr 19, 2007 at 02:50:55PM -0400, Carl Banks wrote:   ---+
 Package: cryptmount
 Version: 1.2-1
 
 Hi: this is a wishlist item.  I use cryptmount with a loopback drive 
 that is NOT automounted at boot (that is, it is not listed in 
 /etc/default/cryptmount).  I manually mount and umount it as necessary.
 
 However, the Debian shutdown scripts fail to umount it, which in turn 
 prevents the root partition from being umounted, which in turn causes an 
 fsck on the next boot.
 
 Perhaps it's a bug in initscripts.  Regardless, it'd be nice if 
 /etc/init.d/cryptmount could optionally run cryptmount -u -a to umount 
 any manually mounted cryptmounts, or at least allow for targets that are 
 automatically umounted though not automatically mounted.
 
 Thanks
 
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#385157: cryptmount: Bashism in init script

2006-08-30 Thread R.Penney
Erich,
Thanks for reporting the non-compliances in cryptmount's init-script,
and for your helpful patch. I've incorporated your patch and tried to
make the script more LSB compliant in its support for the 'status'
argument and in its return-codes.

Before I issue a revised version of the cryptmount Debian
package, I'd be very grateful if you had any comments on the attached
version of the script.

As regards your nautilus/pmount question, I'm afraid I don't use
either of these, so I'm afraid I can't offer you any quick answers there.

Thanks,
Richard

+--   on Tue, Aug 29, 2006 at 03:23:25PM +0200, Erich Schubert wrote:   ---+
 Package: cryptmount
 Version: 1.1-1
 Severity: serious
 Tags: patch
 Justification: Policy 10.4
 
 /etc/init.d/cryptmount: 16: source: not found
 /etc/init.d/cryptmount: 19: Syntax error: ( unexpected
 
 Please use POSIX shell (s/source/./; s/^function //;) or specify
 /bin/bash as interpreter. A patch to fix the init script is attached;
 but I didn't check the other scripts for similar problems.
 
 Maybe you could make the init-script LSB compliant, too.
 
 Btw, do you have a hint for me on how to have nautilus/pmount ask for
 the luks passphrase with a graphical prompt?
 
 -- System Information:
 Debian Release: testing/unstable
   APT prefers unstable
   APT policy: (500, 'unstable'), (1, 'experimental')
 Architecture: i386 (i686)
 Shell:  /bin/sh linked to /bin/dash
 Kernel: Linux 2.6.17.7
 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8)
 
 Versions of packages cryptmount depends on:
 ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
 ii  libdevmapper1.02 [libdevmapp 2:1.02.08-1 The Linux Kernel Device Mapper 
 use
 ii  libssl0.9.8  0.9.8b-2SSL shared libraries
 ii  openssl  0.9.8b-2Secure Socket Layer (SSL) binary 
 a
 
 Versions of packages cryptmount recommends:
 ii  dmsetup  2:1.02.08-1 The Linux Kernel Device Mapper 
 use
 
 -- no debconf information

 --- /tmp/cryptmount   2006-08-29 15:17:51.0 +0200
 +++ /etc/init.d/cryptmount2006-08-29 15:18:21.0 +0200
 @@ -12,11 +12,11 @@
  
  test -x ${CM_EXE} || exit 0
  if [ -f /etc/default/cryptmount ]; then
 -source /etc/default/cryptmount
 +. /etc/default/cryptmount
  fi
  
  
 -function configured() {
 +configured() {
  # check if any of the targets needed at boot has been configured:
  for target in ${CM_BOOTDV} ${CM_BOOTFS} ${CM_BOOTSW}; do
  if [ -b ${DMPATH}/${target} ]; then
 @@ -28,7 +28,7 @@
  }
  
  
 -function dodevices() {
 +dodevices() {
  case $1 in
  start)  test -z ${CM_BOOTDV} || ${CM_EXE} --prepare ${CM_BOOTDV}
  ;;
 @@ -38,7 +38,7 @@
  }
  
  
 -function doswaps() {
 +doswaps() {
  case $1 in
  start)  test -z ${CM_BOOTSW} || ${CM_EXE} --swapon ${CM_BOOTSW}
  ;;
 @@ -48,7 +48,7 @@
  }
  
  
 -function dofilesys() {
 +dofilesys() {
  case $1 in
  start)  test -z ${CM_BOOTFS} || ${CM_EXE} --mount ${CM_BOOTFS}
  ;;
 @@ -58,7 +58,7 @@
  }
  
  
 -function doALL() {
 +doALL() {
  case $1 in
  start)
  dodevices start

#!/bin/sh
# boot-time init script for cryptmount
# $Revision: 119 $, $Date: 2006-08-14 17:05:02 +0100 (Mon, 14 Aug 2006) $
# RW Penney, August 2006

CM_EXE=/usr/bin/cryptmount
DMPATH=/dev/mapper

CM_BOOTDV=
CM_BOOTSW=
CM_BOOTFS=

test -x ${CM_EXE} || exit 5
if [ -f /etc/default/cryptmount ]; then
. /etc/default/cryptmount
fi


configured() {
# check if any of the targets needed at boot has been configured:
for target in ${CM_BOOTDV} ${CM_BOOTFS} ${CM_BOOTSW}; do
if [ -b ${DMPATH}/${target} ]; then
true
return
fi
done
false
}


dodevices() {
case $1 in
start)  test -z ${CM_BOOTDV} || ${CM_EXE} --prepare ${CM_BOOTDV}
;;
stop)   test -z ${CM_BOOTDV} || ${CM_EXE} --release ${CM_BOOTDV}
;;
esac
}


doswaps() {
case $1 in
start)  test -z ${CM_BOOTSW} || ${CM_EXE} --swapon ${CM_BOOTSW}
;;
stop)   test -z ${CM_BOOTSW} || ${CM_EXE} --swapoff ${CM_BOOTSW}
;;
esac
}


dofilesys() {
case $1 in
start)  test -z ${CM_BOOTFS} || ${CM_EXE} --mount ${CM_BOOTFS}
;;
stop)   test -z ${CM_BOOTFS} || ${CM_EXE} --unmount ${CM_BOOTFS}
;;
esac
}


doALL() {
case $1 in
start)
dodevices start
doswaps start
dofilesys start
;;
stop)
dofilesys stop
doswaps stop
dodevices stop
;;
esac
}


case $1 in
start)
if configured; then
echo cryptmount auto-filesystems seem to be already configured
else
echo Starting cryptmount targets (hit shift/ctrl if short of 
entropy):
 

Bug#375008: ITP: cryptmount - user-mode mounting of dm-crypt filesystems

2006-06-22 Thread R.Penney
Package: wnpp
Version: 1.0
Severity: wishlist

I would like to propose the package 'cryptmount' (version 1.0.1) for
inclusion in the debian distributions.

cryptmount is a utility for on-demand user-mode mounting of
encrypted filesystems based on the device-mapper (dm-crypt) infrastructure
of the 2.6 kernel series. cryptmount also assists the system administrator
in setting-up new encrypted filesystems, e.g. through automatic key generation.

cryptmount is licensed under the GPL v2 (with an exemption for linkage
against the OpenSSL library).

Debian-specific sources are available via
http://www.pianofaulty.org.uk/software/software.html
The packages have been checked with lintian  linda and are clean apart
from the necessary presence of a setuid binary.
(The package is also listed on SourceForge  Freshmeat.)

Thanks,
RW Penney


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]