[Bug 760142] Re: Several Ubuntu-certified Dell laptops: ImPS/2 ALPS GlidePoint configure as PS/2 mouse instead of proper touchpad

2011-06-15 Thread Kalisto
Same issue here on 5 year old Dell Latitude D610

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/760142

Title:
  Several Ubuntu-certified Dell laptops: ImPS/2 ALPS GlidePoint
  configure as PS/2 mouse instead of proper touchpad

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/760142/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 486960] Re: Brasero disk burner won't get past "Preparing to write."

2010-01-11 Thread Kalisto
I can confirm this bug, on 2.6.31-17-generic #54-Ubuntu Karmic

With Brasero version: 2.28.2

Workaround: launch brasero from console as root.

-- 
Brasero disk burner won't get past "Preparing to write."
https://bugs.launchpad.net/bugs/486960
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 247027] Re: initramfs prompts because of dmraid

2009-08-25 Thread Kalisto
*** This bug is a duplicate of bug 315735 ***
https://bugs.launchpad.net/bugs/315735

I can confirm this bug still exists in 9.04

-- 
initramfs prompts because of dmraid
https://bugs.launchpad.net/bugs/247027
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 203782] Re: Support low color depth to improve speed

2009-04-27 Thread Kalisto
It has been a year since this issue was first brought up and nothing had
changed. I accept that these things take time but it should not be
included in Ubuntu releases until it works.

Some may argue that it does work but it is just bandwidth intensive. It
is however unusable as numerous people have stated above.

Please fix or remove from further releases.

-- 
Support low color depth to improve speed
https://bugs.launchpad.net/bugs/203782
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 117736] Re: pam_mount unable to unmount needs root priv

2007-06-01 Thread Kalisto
Bug is caused by pam dropping root priv on pam_mount routine too early.

** Changed in: pam (Ubuntu)
Sourcepackagename: libpam-mount => pam

-- 
pam_mount unable to unmount needs root priv
https://bugs.launchpad.net/bugs/117736
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 117736] Re: pam_mount unable to unmount needs root priv

2007-06-01 Thread Kalisto
Confirmed!

>Dameon Wagner schrieb:
>> pam_mount(misc.c:264) command: /usr/local/sbin/pmvarrun [-u] [tester]
>> [-o] [-1]
>> pam_mount(misc.c:341) set_myuid(pre): real uid/gid=1004:1004,
>> effective uid/gid=1004:1004
>> pam_mount(misc.c:346) error setting uid to 0
>> pam_mount(pam_mount.c:360) pmvarrun says login count is 1

>Before unmount, the login count must be zero, not 1. This is the reason
>pam_mount does no unmount.

But the problem is that the effective gid is not 0 anymore. I think this
privilegue-dropping is a bug ('feature gone wrong') in ubuntu.

>To reset the login count, remove the file /var/run/pam_mount/$USER. Then
>a login as $USER should increase the value in this file to one, and the
>logout decreases it again to zero. Then the volumes will be unmounted.
>
>Regards,
> Bastian
>pam-mount-user mailing list
>[EMAIL PROTECTED]
>https://lists.sourceforge.net/lists/listinfo/pam-mount-user
>

** Changed in: libpam-mount (Ubuntu)
   Status: Unconfirmed => Confirmed

-- 
pam_mount unable to unmount needs root priv
https://bugs.launchpad.net/bugs/117736
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 117736] pam_mount unable to unmount needs root priv

2007-05-30 Thread Kalisto
Public bug reported:

Binary package hint: libpam-mount

>From pam_mount developer Jan Engelhard sourceforge mailing list:
"pam_mount *needs* the root privileges, but Ubuntu's PAM configuration
decided to throw them away after the login sequence completed."

>From Ubuntu Feisty Fawn user Kalisto:

"When using loopback encrypted file systems this is a security issue, user logs 
out but the device is not umounted!!
Without pam_mount debug option set this is not immediately apparent to the user!

I have followed the instructions on: http://felipe-
alfaro.org/blog/2006/08/19/encrypted-home-on-ubuntu-using-cryptoloop/

To create a loopback encrypted home directory with pam_mount.
The dir mounts ok and seemes to work however on logout I get " error setting 
uid to 0"
lsof -n | grep /home/crypto comes up empty.

I have included a pam_mount debug output for the login and logout process:
For easier viewing: http://rafb.net/p/HLVzwm40.nln.html

[EMAIL PROTECTED]:su crypto
pam_mount(pam_mount.c:461) pam_sm_open_session: real uid/gid=0:1001, effective 
uid/gid=0:1001
pam_mount(readconfig.c:418) checking sanity of volume record (/home/crypto.img)
pam_mount(pam_mount.c:476) about to perform mount operations

pam_mount(mount.c:368) information for mount:
pam_mount(mount.c:369) --
pam_mount(mount.c:370) (defined by globalconf)
pam_mount(mount.c:373) user:  crypto
pam_mount(mount.c:374) server:

pam_mount(mount.c:375) volume:/home/crypto.img
pam_mount(mount.c:376) mountpoint:/home/crypto
pam_mount(mount.c:377) options:   loop,user,exec,encryption=aes,keybits=128
pam_mount(mount.c:378) fs_key_cipher: aes-128-ecb

pam_mount(mount.c:379) fs_key_path:   /home/crypto.key
pam_mount(mount.c:380) use_fstab:   0
pam_mount(mount.c:381) --
pam_mount(mount.c:177) realpath of volume "/home/crypto" is "/home/crypto"

pam_mount(mount.c:182) checking to see if /home/crypto.img is already mounted 
at /home/crypto
pam_mount(mount.c:755) /home/crypto.img already seems to be mounted at 
/home/crypto, skipping
pam_mount(pam_mount.c:123) clean system authtok (0)

pam_mount(misc.c:264) command: /usr/sbin/pmvarrun [-u] [crypto] [-o] [1] 
pam_mount(misc.c:341) set_myuid(pre): real uid/gid=0:1001, effective 
uid/gid=0:1001
pam_mount(misc.c:376) set_myuid(post): real uid/gid=0:1001, effective 
uid/gid=0:1001

pam_mount(pam_mount.c:360) pmvarrun says login count is 3
pam_mount(pam_mount.c:493) done opening session
pam_mount(pam_mount.c:106) Clean global config (0)
 
===

[EMAIL PROTECTED]:exit
 
exit
pam_mount(pam_mount.c:535) received order to close things
pam_mount(pam_mount.c:536) real and effective user ID are 1001 and 1001.
pam_mount(misc.c:264) command: /usr/sbin/pmvarrun [-u] [crypto] [-o] [-1] 

pam_mount(misc.c:341) set_myuid(pre): real uid/gid=1001:1001, effective 
uid/gid=1001:1001
pam_mount(misc.c:346) error setting uid to 0
pam_mount(pam_mount.c:360) pmvarrun says login count is 2
pam_mount(pam_mount.c:564) crypto seems to have other remaining open sessions

pam_mount(pam_mount.c:569) pam_mount execution complete
pam_mount(pam_mount.c:535) received order to close things
pam_mount(pam_mount.c:536) real and effective user ID are 1001 and 1001.
pam_mount(misc.c:264) command: /usr/sbin/pmvarrun [-u] [crypto] [-o] [-1] 

pam_mount(misc.c:341) set_myuid(pre): real uid/gid=1001:1001, effective 
uid/gid=1001:1001
pam_mount(misc.c:346) error setting uid to 0
pam_mount(pam_mount.c:360) pmvarrun says login count is 1
pam_mount(pam_mount.c:564) crypto seems to have other remaining open sessions

pam_mount(pam_mount.c:569) pam_mount execution complete
pam_mount(pam_mount.c:106) Clean global config (0)
 
===
Entry in /etc/security/pam_mount.conf

 
volume crypto auto - /home/crypto.img /home/crypto 
loop,user,exec,encryption=aes,keybits=128 aes-128-ecb /home/crypto.key

/Kalisto"

** Affects: libpam-mount (Ubuntu)
 Importance: Undecided
 Status: Unconfirmed

** Visibility changed to: Public

-- 
pam_mount unable to unmount needs root priv
https://bugs.launchpad.net/bugs/117736
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs