Package: gnome-disk-utility
Version: 3.22.1-1
Severity: important
Tags: security
X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org
--- Please enter the report below this line. ---
Hi and thanks for your work,
If one configure gnome disks to automount LUKS partition (encryption
options, désactivating automatic encryption options, selecting unlock on
start, entering the passphrase in the filed below) the passphrase ends
up in cleartext in a file on /etc/luks-keys/luks-UUID-OF-PARTITION
In my opinion this is bad because it makes it easy to recover. This
makes the encryption itself useless and mislead the user into thinking
that his data is secured.
- Ideally my suggestion would be that the password should go through the
default password keyring software, and the partition should be mounted
at user level.
- If this is not possible I suggest removing the auto-mount option.
- At the very least I think that the user should be informed of this
issue when he activates that functionality.
Thanks,
Jean-Louis Biasini
--- System information. ---
Architecture:
Kernel: Linux 4.9.0-8-amd64
Debian Release: 9.6
500 stable-updates ftp.fr.debian.org
500 stable security.debian.org
500 stable ftp.fr.debian.org
--- Package information. ---
Depends (Version) | Installed
====================================================-+-=========================
udisks2 (>= 2.1.1) | 2.1.8-1
dconf-gsettings-backend | 0.26.0-2+b1
OR gsettings-backend |
libatk1.0-0 (>= 1.12.4) | 2.22.0-1
libc6 (>= 2.10) |
libcairo-gobject2 (>= 1.10.0) |
libcairo2 (>= 1.2.4) |
libcanberra-gtk3-0 (>= 0.25) |
libcanberra0 (>= 0.2) |
libdvdread4 (>= 4.1.3) |
libgdk-pixbuf2.0-0 (>= 2.22.0) |
libglib2.0-0 (>= 2.39.90) |
libgtk-3-0 (>= 3.16.2) |
liblzma5 (>= 5.1.1alpha+20120614) |
libnotify4 (>= 0.7.0) |
libpango-1.0-0 (>= 1.18.0) |
libpangocairo-1.0-0 (>= 1.14.0) |
libpwquality1 (>= 1.1.0) |
libsecret-1-0 (>= 0.7) |
libsystemd0 (>= 209) |
libudisks2-0 (>= 2.1.1) |
libx11-6 |
Package's Recommends field is empty.
Package's Suggests field is empty.