Your message dated Tue, 29 Mar 2005 15:52:30 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#302006: fixed in libpam-mount 0.9.22-6 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 29 Mar 2005 16:52:30 +0000 >From [EMAIL PROTECTED] Tue Mar 29 08:52:29 2005 Return-path: <[EMAIL PROTECTED]> Received: from p54833e70.dip.t-dialin.net (x101.hackers.homelinux.com) [84.131.62.112] (foobar) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DGJx6-0004Un-00; Tue, 29 Mar 2005 08:52:29 -0800 Received: from kiro by x101.hackers.homelinux.com with local (Exim 4.50) id 1DGJx1-0003Q6-TM; Tue, 29 Mar 2005 18:52:23 +0200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Kiro Zimmer <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: libpam-mount doesn't work after update X-Mailer: reportbug 3.9 Date: Tue, 29 Mar 2005 18:52:23 +0200 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: libpam-mount Version: 0.9.22-5 Severity: grave Justification: renders package unusable -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the encrypted partition is not mounted (and decrypted) on login. Up to version 0.9.22-4 there was no such problem. I attached my config and the (hopefully correct copy-n-wasted) debug output. Kiro - --- /etc/security/pam_mount.conf --- # i cutted the standard-statements volume kiro crypt - /dev/hdb5 /home/kiro "cipher=aes,exec,nodev,nosuid" aes-256-ecb /mnt/usb/kiro.key - --- login --- pam_mount: reading options_allow... pam_mount: reading options_require... pam_mount: back from global readconfig pam_mount: per-user configurations not allowed by pam_mount.conf pam_mount: real and effective user ID are 0 and 0. pam_mount: checking sanity of volume record (/dev/hdb5) pam_mount: about to perform mount operations pam_mount: information for mount: pam_mount: -------- pam_mount: (defined by globalconf) pam_mount: user: kiro pam_mount: server: pam_mount: volume: /dev/hdb5 pam_mount: mountpoint: /home/kiro pam_mount: options: cipher=aes,exec,nodev,nosuid pam_mount: fs_key_cipher: aes-256-ecb pam_mount: fs_key_path: /mnt/usb/kiro.key pam_mount: use_fstab: 0 pam_mount: -------- pam_mount: checking to see if /dev/mapper/_dev_hdb5 is already mounted at /home/kiro pam_mount: checking for encrypted filesystem key configuration pam_mount: decrypting FS key using system auth. token and aes-256-ecb pam_mount: about to start building mount command pam_mount: command: /bin/mount -t crypt -ocipher=aes,exec,nodev,nosuid /dev/hdb5 /home/kiro pam_mount: mount errors (should be empty): pam_mount: pam_mount: setting uid to 0 pam_mount: pam_mount: real and effective user ID are 0 and 0. pam_mount: pam_mount: real and effective group ID are 1000 and 1000. pam_mount: /sbin/mount.crypt: line 141: /sbi: No such file or directory pam_mount: mount.crypt: error creating _dev_hdb5 pam_mount: waiting for mount pam_mount: mount of /dev/hdb5 failed pam_mount: clean system authtok (0) pam_mount: command: /usr/sbin/pmvarrun -u kiro -d -o 1 pam_mount: setting uid to 0 pam_mount: real and effective user ID are 0 and 0. pam_mount: real and effective group ID are 1000 and 1000. pam_mount: pmvarrun says login count is 1 pam_mount: done opening session - --- logout --- pam_mount: received order to close things pam_mount: real and effective user ID are 0 and 0. pam_mount: user is kiro pam_mount: command: /usr/sbin/pmvarrun -u kiro -d -o -1 pam_mount: setting uid to 0 pam_mount: real and effective user ID are 0 and 0. pam_mount: real and effective group ID are 1000 and 1000. pam_mount: pmvarrun says login count is 0 pam_mount: going to unmount pam_mount: information for mount: pam_mount: -------- pam_mount: (defined by globalconf) pam_mount: user: kiro pam_mount: server: pam_mount: volume: /dev/hdb5 pam_mount: mountpoint: /home/kiro pam_mount: options: cipher=aes,exec,nodev,nosuid pam_mount: fs_key_cipher: aes-256-ecb pam_mount: fs_key_path: /mnt/usb/kiro.key pam_mount: use_fstab: 0 pam_mount: -------- pam_mount: command: /usr/sbin/lsof /home/kiro pam_mount: setting uid to 0 pam_mount: real and effective user ID are 0 and 0. pam_mount: real and effective group ID are 1000 and 1000. pam_mount: lsof output (should be empty)... pam_mount: COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME pam_mount: artsd 10021 kiro cwd DIR 3,6 4096 33407 /home/kiro pam_mount: waiting for lsof pam_mount: command: /usr/bin/umount.crypt /home/kiro pam_mount: umount errors (should be empty): pam_mount: pam_mount: setting uid to 0 pam_mount: pam_mount: real and effective user ID are 0 and 0. pam_mount: pam_mount: real and effective group ID are 1000 and 1000. pam_mount: /usr/bin/umount.crypt: line 46: /bi: No such file or directory pam_mount: /usr/bin/umount.crypt: line 48: /sbi: No such file or directory pam_mount: /usr/bin/umount.crypt: line 50: /bi: No such file or directory pam_mount: umount.crypt: error unmounting /home/kiro pam_mount: waiting for umount pam_mount: unmount of /dev/hdb5 failed pam_mount: pam_mount execution complete pam_mount: clean system authtok (0) - -- System Information: Debian Release: sid APT prefers unstable APT policy: (990, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11-nitro2 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages libpam-mount depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libglib2.0-0 2.6.3-1 The GLib library of C routines ii libssl0.9.7 0.9.7e-3 SSL shared libraries ii mount 2.12p-4 Tools for mounting and manipulatin ii zlib1g 1:1.2.2-4 compression library - runtime - -- no debconf information -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCSYfHYWOj0axvMcURAg08AJ9EKApdDieQY5Nszh2KAXqNyQAnkQCgxq0A Unj7IdLpWsBKSCPYDi7RbyQ= =6Hwi -----END PGP SIGNATURE----- --------------------------------------- Received: (at 302006-close) by bugs.debian.org; 29 Mar 2005 20:57:53 +0000 >From [EMAIL PROTECTED] Tue Mar 29 12:57:53 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DGNma-0005jj-00; Tue, 29 Mar 2005 12:57:53 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DGNhO-0007GS-00; Tue, 29 Mar 2005 15:52:30 -0500 From: Bastian Kleineidam <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#302006: fixed in libpam-mount 0.9.22-6 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 29 Mar 2005 15:52:30 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: libpam-mount Source-Version: 0.9.22-6 We believe that the bug you reported is fixed in the latest version of libpam-mount, which is due to be installed in the Debian FTP archive: libpam-mount_0.9.22-6.diff.gz to pool/main/libp/libpam-mount/libpam-mount_0.9.22-6.diff.gz libpam-mount_0.9.22-6.dsc to pool/main/libp/libpam-mount/libpam-mount_0.9.22-6.dsc libpam-mount_0.9.22-6_i386.deb to pool/main/libp/libpam-mount/libpam-mount_0.9.22-6_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 29 Mar 2005 22:18:43 +0200 Source: libpam-mount Binary: libpam-mount Architecture: source i386 Version: 0.9.22-6 Distribution: unstable Urgency: high Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]> Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]> Description: libpam-mount - a PAM module that can mount volumes for a user session Closes: 302006 Changes: libpam-mount (0.9.22-6) unstable; urgency=high . * Fix IFS setting in mount.crypt and umount.crypt (Closes: #302006) Files: 6242ed212ca2719763793d94cf3eee00 669 admin extra libpam-mount_0.9.22-6.dsc ff7000c89fb14d0427f2fc48cf9193e7 52702 admin extra libpam-mount_0.9.22-6.diff.gz d316d03066558d071ae299dfd5df14f2 103362 admin extra libpam-mount_0.9.22-6_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCSbk6eBwlBDLsbz4RAmfwAJ9hZGAbk9J1EsH597nKLl4myshqDACeN/26 mw1Zg+e29ERX7UmXr7FfLD8= =ZTOM -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]