Your message dated Tue, 29 Mar 2005 15:52:30 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#302006: fixed in libpam-mount 0.9.22-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 29 Mar 2005 16:52:30 +0000
>From [EMAIL PROTECTED] Tue Mar 29 08:52:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from p54833e70.dip.t-dialin.net (x101.hackers.homelinux.com) 
[84.131.62.112] (foobar)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DGJx6-0004Un-00; Tue, 29 Mar 2005 08:52:29 -0800
Received: from kiro by x101.hackers.homelinux.com with local (Exim 4.50)
        id 1DGJx1-0003Q6-TM; Tue, 29 Mar 2005 18:52:23 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Kiro Zimmer <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libpam-mount doesn't work after update
X-Mailer: reportbug 3.9
Date: Tue, 29 Mar 2005 18:52:23 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: libpam-mount
Version: 0.9.22-5
Severity: grave
Justification: renders package unusable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

the encrypted partition is not mounted (and decrypted) on login.
Up to version 0.9.22-4 there was no such problem. I attached my
config and the (hopefully correct copy-n-wasted) debug output.

Kiro


- --- /etc/security/pam_mount.conf ---
# i cutted the standard-statements
volume kiro crypt - /dev/hdb5 /home/kiro "cipher=aes,exec,nodev,nosuid" 
aes-256-ecb /mnt/usb/kiro.key

- --- login ---
pam_mount: reading options_allow...
pam_mount: reading options_require...
pam_mount: back from global readconfig
pam_mount: per-user configurations not allowed by pam_mount.conf
pam_mount: real and effective user ID are 0 and 0.
pam_mount: checking sanity of volume record (/dev/hdb5)
pam_mount: about to perform mount operations
pam_mount: information for mount:
pam_mount: --------
pam_mount: (defined by globalconf)
pam_mount: user:          kiro
pam_mount: server:
pam_mount: volume:        /dev/hdb5
pam_mount: mountpoint:    /home/kiro
pam_mount: options:       cipher=aes,exec,nodev,nosuid
pam_mount: fs_key_cipher: aes-256-ecb
pam_mount: fs_key_path:   /mnt/usb/kiro.key
pam_mount: use_fstab:   0
pam_mount: --------
pam_mount: checking to see if /dev/mapper/_dev_hdb5 is already mounted at 
/home/kiro
pam_mount: checking for encrypted filesystem key configuration
pam_mount: decrypting FS key using system auth. token and aes-256-ecb
pam_mount: about to start building mount command
pam_mount: command: /bin/mount -t crypt -ocipher=aes,exec,nodev,nosuid 
/dev/hdb5 /home/kiro
pam_mount: mount errors (should be empty):
pam_mount: pam_mount: setting uid to 0
pam_mount: pam_mount: real and effective user ID are 0 and 0.
pam_mount: pam_mount: real and effective group ID are 1000 and 1000.
pam_mount: /sbin/mount.crypt: line 141: /sbi: No such file or directory
pam_mount: mount.crypt: error creating _dev_hdb5
pam_mount: waiting for mount
pam_mount: mount of /dev/hdb5 failed
pam_mount: clean system authtok (0)
pam_mount: command: /usr/sbin/pmvarrun -u kiro -d -o 1
pam_mount: setting uid to 0
pam_mount: real and effective user ID are 0 and 0.
pam_mount: real and effective group ID are 1000 and 1000.
pam_mount: pmvarrun says login count is 1
pam_mount: done opening session

- --- logout ---
pam_mount: received order to close things
pam_mount: real and effective user ID are 0 and 0.
pam_mount: user is kiro
pam_mount: command: /usr/sbin/pmvarrun -u kiro -d -o -1
pam_mount: setting uid to 0
pam_mount: real and effective user ID are 0 and 0.
pam_mount: real and effective group ID are 1000 and 1000.
pam_mount: pmvarrun says login count is 0
pam_mount: going to unmount
pam_mount: information for mount:
pam_mount: --------
pam_mount: (defined by globalconf)
pam_mount: user:          kiro
pam_mount: server:
pam_mount: volume:        /dev/hdb5
pam_mount: mountpoint:    /home/kiro
pam_mount: options:       cipher=aes,exec,nodev,nosuid
pam_mount: fs_key_cipher: aes-256-ecb
pam_mount: fs_key_path:   /mnt/usb/kiro.key
pam_mount: use_fstab:   0
pam_mount: --------
pam_mount: command: /usr/sbin/lsof /home/kiro
pam_mount: setting uid to 0
pam_mount: real and effective user ID are 0 and 0.
pam_mount: real and effective group ID are 1000 and 1000.
pam_mount: lsof output (should be empty)...
pam_mount: COMMAND   PID USER   FD   TYPE DEVICE SIZE  NODE NAME
pam_mount: artsd   10021 kiro  cwd    DIR    3,6 4096 33407 /home/kiro
pam_mount: waiting for lsof
pam_mount: command: /usr/bin/umount.crypt /home/kiro
pam_mount: umount errors (should be empty):
pam_mount: pam_mount: setting uid to 0
pam_mount: pam_mount: real and effective user ID are 0 and 0.
pam_mount: pam_mount: real and effective group ID are 1000 and 1000.
pam_mount: /usr/bin/umount.crypt: line 46: /bi: No such file or directory
pam_mount: /usr/bin/umount.crypt: line 48: /sbi: No such file or directory
pam_mount: /usr/bin/umount.crypt: line 50: /bi: No such file or directory
pam_mount: umount.crypt: error unmounting /home/kiro
pam_mount: waiting for umount
pam_mount: unmount of /dev/hdb5 failed
pam_mount: pam_mount execution complete
pam_mount: clean system authtok (0)



- -- System Information:
Debian Release: sid
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11-nitro2
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages libpam-mount depends on:
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libglib2.0-0                2.6.3-1      The GLib library of C routines
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries
ii  mount                       2.12p-4      Tools for mounting and manipulatin
ii  zlib1g                      1:1.2.2-4    compression library - runtime

- -- no debconf information


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCSYfHYWOj0axvMcURAg08AJ9EKApdDieQY5Nszh2KAXqNyQAnkQCgxq0A
Unj7IdLpWsBKSCPYDi7RbyQ=
=6Hwi
-----END PGP SIGNATURE-----

---------------------------------------
Received: (at 302006-close) by bugs.debian.org; 29 Mar 2005 20:57:53 +0000
>From [EMAIL PROTECTED] Tue Mar 29 12:57:53 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DGNma-0005jj-00; Tue, 29 Mar 2005 12:57:53 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DGNhO-0007GS-00; Tue, 29 Mar 2005 15:52:30 -0500
From: Bastian Kleineidam <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#302006: fixed in libpam-mount 0.9.22-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 29 Mar 2005 15:52:30 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: libpam-mount
Source-Version: 0.9.22-6

We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:

libpam-mount_0.9.22-6.diff.gz
  to pool/main/libp/libpam-mount/libpam-mount_0.9.22-6.diff.gz
libpam-mount_0.9.22-6.dsc
  to pool/main/libp/libpam-mount/libpam-mount_0.9.22-6.dsc
libpam-mount_0.9.22-6_i386.deb
  to pool/main/libp/libpam-mount/libpam-mount_0.9.22-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 29 Mar 2005 22:18:43 +0200
Source: libpam-mount
Binary: libpam-mount
Architecture: source i386
Version: 0.9.22-6
Distribution: unstable
Urgency: high
Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]>
Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]>
Description: 
 libpam-mount - a PAM module that can mount volumes for a user session
Closes: 302006
Changes: 
 libpam-mount (0.9.22-6) unstable; urgency=high
 .
   * Fix IFS setting in mount.crypt and umount.crypt (Closes: #302006)
Files: 
 6242ed212ca2719763793d94cf3eee00 669 admin extra libpam-mount_0.9.22-6.dsc
 ff7000c89fb14d0427f2fc48cf9193e7 52702 admin extra 
libpam-mount_0.9.22-6.diff.gz
 d316d03066558d071ae299dfd5df14f2 103362 admin extra 
libpam-mount_0.9.22-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCSbk6eBwlBDLsbz4RAmfwAJ9hZGAbk9J1EsH597nKLl4myshqDACeN/26
mw1Zg+e29ERX7UmXr7FfLD8=
=ZTOM
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to