Package: gnome-mount Version: 0.7-2 Followup-For: Bug #440453 Hello,
Any updates about this bug? The patch in question is really simple, and it would be great to have keyfile support for encrypted removable media. The respective launchpad bug can be found here: https://launchpad.net/bugs/133520 Current ubuntu packages with the patch applied can be found here: http://ppa.launchpad.net/intuitivenipple/ubuntu/pool/main/g/gnome-mount/ I extraced the patch in question. It's appended it to this mail. greetigns, jonas -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-4-amd64-resivo (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages gnome-mount depends on: ii eject 2.1.5+deb1-3 ejects CDs and operates CD-Changer ii gconf2 2.22.0-1 GNOME configuration database syste ii hal 0.5.11-3 Hardware Abstraction Layer ii libart-2.0-2 2.3.20-2 Library of functions for 2D graphi ii libatk1.0-0 1.22.0-1 The ATK accessibility toolkit ii libbonobo2-0 2.22.0-1 Bonobo CORBA interfaces library ii libbonoboui2-0 2.22.0-1 The Bonobo UI library ii libc6 2.7-13 GNU C Library: Shared libraries ii libcairo2 1.6.4-6 The Cairo 2D vector graphics libra ii libdbus-1-3 1.2.1-3 simple interprocess messaging syst ii libdbus-glib-1-2 0.76-1 simple interprocess messaging syst ii libeel2-2.20 2.20.0-7 Eazel Extensions Library (for GNOM ii libgail-common 1.22.3-1 GNOME Accessibility Implementation ii libgail18 1.22.3-1 GNOME Accessibility Implementation ii libgconf2-4 2.22.0-1 GNOME configuration database syste ii libglade2-0 1:2.6.2-1 library to load .glade files at ru ii libglib2.0-0 2.16.6-1 The GLib library of C routines ii libgnome-keyring0 2.22.3-2 GNOME keyring services library ii libgnome2-0 2.20.1.1-1 The GNOME 2 library - runtime file ii libgnomecanvas2-0 2.20.1.1-1 A powerful object-oriented display ii libgnomeui-0 2.20.1.1-2 The GNOME 2 libraries (User Interf ii libgnomevfs2-0 1:2.22.0-5 GNOME Virtual File System (runtime ii libgtk2.0-0 2.12.11-3 The GTK+ graphical user interface ii libhal-storage1 0.5.11-3 Hardware Abstraction Layer - share ii libhal1 0.5.11-3 Hardware Abstraction Layer - share ii libice6 2:1.0.4-1 X11 Inter-Client Exchange library ii libnautilus-extension1 2.20.0-7 libraries for nautilus components ii libnotify1 [libnotify1-gtk 0.4.4-3 sends desktop notifications to a n ii liborbit2 1:2.14.13-0.1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.20.5-2 Layout and rendering of internatio ii libpopt0 1.14-4 lib for parsing cmdline parameters ii libsm6 2:1.0.3-2 X11 Session Management library ii libxml2 2.6.32.dfsg-4 GNOME XML library gnome-mount recommends no packages. Versions of packages gnome-mount suggests: ii cryptsetup 2:1.0.6-7 configures encrypted block devices -- no debconf information
# Description: Enable LUKS keyfiles --- gnome-mount-0.8~svn20080225.orig/configure.in 2008-02-25 21:54:20.000000000 +0000 +++ gnome-mount-0.8~svn20080225/configure.in 2008-07-09 00:24:48.000000000 +0100 @@ -83,6 +83,17 @@ fi AM_CONDITIONAL(ENABLE_NAUTILUS_EXTENSION, test "x$enable_nautilus_extension" = "xyes") +dnl Whether to support LUKS key-files +AC_MSG_CHECKING(whether to support LUKS key-files) +AC_ARG_ENABLE(luks_keyfiles, AS_HELP_STRING([--enable-luks-keyfiles],[Support LUKS key-files]),,[enable_luks_keyfiles=yes]) +if test "x$enable_luks_keyfiles" = "xyes"; then + AC_DEFINE([ENABLE_LUKS_KEYFILES],[],[Enable LUKS key-files]) + AC_MSG_RESULT(yes) +else + AC_MSG_RESULT(no) +fi +AM_CONDITIONAL(ENABLE_LUKS_KEYFILES, test "x$enable_luks_keyfiles" = "xyes") + GLIB_REQUIRED=2.15.0 NAUTILUS_REQUIRED=2.21.2 @@ -125,6 +125,7 @@ Build Nautilus extension: $enable_nautilus_extension Use libnotify: $enable_notify +Support LUKS key-files: $enable_luks_keyfiles gnome-mount has been configured. " --- gnome-mount-0.8~svn20080225.orig/src/gnome-mount.c 2008-02-25 21:15:27.000000000 +0000 +++ gnome-mount-0.8~svn20080225/src/gnome-mount.c 2008-07-09 00:22:11.000000000 +0100 @@ -3066,6 +3066,12 @@ /* we need to catch this if the backing device is removed (to remove the password dialog) */ libhal_ctx_set_device_removed (hal_ctx, crypto_setup_device_removed); +// #ifdef ENABLE_LUKS_KEYFILES + password = ""; + setup_success = setup_crypto (udi, volume, drive, password, &password_error); + if (setup_success) goto mounted_crypto; +// #endif + password_retry = FALSE; password_num_tries = 0; retry_password: @@ -3087,6 +3093,10 @@ } } +// #ifdef ENABLE_LUKS_KEYFILES + mounted_crypto: +// #endif + /* mount the clear volume except if --connect-crypto was explicitly passed */ if (setup_success && !opt_connect_crypto) {
signature.asc
Description: Digital signature