> This is weird, when I last tried I didn't experience any problem and all > required packages were installed. Which install mode did you use, from > what media (if you have the download url that would be even better) ?
I used jigdo-lite to expand the .jigdo file found on the official page, http://www.debian.org/CD/jigdo-cd/#which -> CD i386 http://cdimage.debian.org/debian-cd/6.0.1a/i386/jigdo-cd/debian-6.0.1a-i386-CD-1.jigdo (which has md5sum c29fb09ac0db3c23a95cb236f5adde78 debian-6.0.1a-i386-CD-1.jigdo) it yielded this sha256sum: 8ffbbe6cea9598fe1b964c7d7ff8e7a76871fbc69a439919ade7fbb7b7397f00 debian-6.0.1a-i386-CD-1.iso then I used unetbootin (either 471-2 (stable) or 549-1 (testing), don't remember which) to write it to a USB flash stick, from which I booted my Acer Aspire One D255E netbook. I used the default boot entry, then the manual partitioner. (You can find more details about how I ran the installer on the bug report I linked at the top of this thread.) > No that I know of, and I wouldn't use luks if it was caching the > pass-phrase leaving it accessible for "reuse". I think that would defeat > the purpose. (Well, in an attempt to cut down on the number of passwords that I'm having to deal with, I installed this machine with the luks passphrases == root password. My purpose is to prevent data exposure after theft of the netbook, and I don't care about the risk of recovery from RAM sticks being frozen with liquid nitrogene. Then, assuming that the cache is properly written (only accessible by root), the only risk I see is that a local hijacker that got root access for a short time or with a limited bandwidth connection could just read the passphrase, and then after stealing the laptop decrypt the whole disk at leisure, instead of being limited by the amount of decrypted data he could manage to copy (without discovery) without physical stealing. Fair enough, but I'm currently more worried about my limited brain memory for storing secure passphrases.) > You can use decrypt_derived or random key for the swap > partition for instance, I'm doing that on two other machines, but IIRC this isn't compatible with s2disk, which I might want to use on the netbook. > Or store the key on a different media > plugged-in at boot time Yeah, I'm still sometimes thinking about such solutions, also for normal login; but USB port connectors would be worn out rather quickly I guess, and still less convenient than typing a password. Wondering about bluetooth. I guess near field communication would more appropriate. (I stopped using my fingerprint reader because it wasn't working reliably enough. And I know it's not secure anyway.) Christian. -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/banlktikzvzih_mdih_xyuusdwxffkku...@mail.gmail.com