[fixed] Re: cryptoloop confusion
Peter Cordes, 2002-Aug-30 22:16 -0300: > On Fri, Aug 30, 2002 at 02:20:36PM -0700, Jeff wrote: > > > > Does anyone know how I can create an encrypted filesystem on a file in > > my home directory, non-root? I'm using the loop-aes system and I can > > create everything but I have to chown the file and mount point to > > change the owner and group to my user. But, when I mount the > > filesystem the mount point directory is changed back to owner=root and > > group=root and I can't create directories and files in the mounted > > filesystem since I don't have permission. > > Are you aware that when you mount a filesystem on a directory, the > mountpoint is hidden, so not only are files in it not accessable by name, > the ownership and permissions are hidden as well? The new filesystem's root > directory ownership and permissions are what you see when you ls -ld /mnt/foo > (after mounting something on /mnt/foo). > > mke2fs creates the root directory with ownership=0:0, so you need to change > it. If you mount the filesystem and chmod it to what you want it to be, it > will stay that way across mounts and unmounts, just like /usr stays owned by > root. > > If you already knew that, and the problem is something else, then I don't > know how to help. I didn't know that this was the caseq. After your explanation above I went back and mounted the filesystem and then chown'd it and now it is retaining the proper ownership through umount/mount. I was doing the chown prior to mounting it, so as you explain above I was chown'ing the hidden mountpoint. Thanks alot...jc -- Jeff CoppockSystems Engineer Diggin' Debian Admin and User
Re: Converting Users from Solaris to (Debian-)Linux
On Fri, Aug 30, 2002 at 06:16:09PM +0200, Jan-Hendrik Palic wrote: > >Your solaris hashes arent MD5. > > is it not possible to upgrade to MD5 on Solaris? Whether or not it is possible, it's not a good solution to the original problem (migrating users from Solaris to Debian). Remember, we want the users to have the exact same password that they've already set. We can't decrypt the crypt() hash and retrieve the cleartext password so that we can automatically convert it to an MD5 hash. Now, if one system or the other *did* support MD5, I'd think any existing crypt() passwords would be converted to MD5 as soon as the user changed their password. But that's not the current problem: if they were willing to change their passwords as part of the migration, why worry about the format of the password files at all? -- Mike Renfro / R&D Engineer, Center for Manufacturing Research, 931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]
UNSUBSCRIBE
- Mit der GREENCARD nach Amerika! Anmelden, mitmachen und gewinnen! Wir helfen deinem Glück auf die Sprünge - zum Sonderpreis! Nutze diese Chance! Alles weitere unter: http://www.firstcampus.de
Re: Virus Alert - ScanMail for Lotus Notes-->A very nice game
[EMAIL PROTECTED] wrote: ScanMail has detected a virus during a real-time scan of the email traffic. Date: 8/31/2002 10:27:8 Subject: A very nice game Virus: WORM_KLEZ.H File:picacu.exe From: debian-security To: [EMAIL PROTECTED]; Action: Uncleanable, Deleted; Scanned by ScanMail for Lotus Notes 2.5 with scanengine 6.150-1001 and patternfile lpt$vpn.339 http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KLEZ.H&VSect=T Abstract: Similar to the other KLEZ variants, this worm can change or spoof the original email address in the FROM: field. It obtains the email addresses that it places in the FROM: field from the infected user's address book. This causes a non-infected user to appear as the person who has sent this worm's malicious email. It does this to hide the real sender of the infected email. The actual email address of the sender is found in the Envelope From field. So it doesn't come from debian-security, sorry. Phil
Virus Alert - ScanMail for Lotus Notes-->A very nice game
ScanMail has detected a virus during a real-time scan of the email traffic. Date: 8/31/2002 10:27:8 Subject: A very nice game Virus: WORM_KLEZ.H File:picacu.exe From: debian-security To: [EMAIL PROTECTED]; Action: Uncleanable, Deleted; Scanned by ScanMail for Lotus Notes 2.5 with scanengine 6.150-1001 and patternfile lpt$vpn.339