Package: fscrypt
Version: 0.2.5-2
Severity: normal
Tags: upstream

I have a pc backup script running rsync that runs as root. As a normal user I 
created
a protected directory call it mysafe.

When I do as a normal user ($USER)

fscrypt unlock /home/$USER/mysafe

I open the safe almost the fisrt time (pasword is long and I may make a typo 
once).

When in the backup script, run as root I do:

fscrypt unlock /home/$USER/mysafe --user=$USER

I can enter the password twenty time without sucess.

It was working well before I switched to fscrypt 2.5 and 5.4 kernel. I often 
need to log
in and open safe as $USER as the script does:

fscrypt status ${SAFE_LOCATION} | grep -q "Unlocked: Yes"

before trying to unlock...

I reported this upstream.

NB: a 2.6 version as been published January 30.

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.20 (SMP w/8 CPU cores; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=fr_FR.UTF8, LC_CTYPE=fr_FR.UTF8 (charmap=UTF-8), LANGUAGE= 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages fscrypt depends on:
ii  libc6     2.30-0experimental2
ii  libpam0g  1.3.1-5

fscrypt recommends no packages.

Versions of packages fscrypt suggests:
pn  libpam-fscrypt  <none>

-- no debconf information

Reply via email to