Bug#846098: Works for me

2016-12-10 Thread Quentin Lefebvre
Dear Maintainer, I've read that Keepass2 is going to be removed from Debian testing. Perhaps I misunderstood this bug report. Anyway, I'm surprised because my keepass2 works perfectly (though much slower to open a database than on Windows). I've an up-to-date Debian testing install, running wi

Bug#768407: [pkg-cryptsetup-devel] Bug#768407: cryptsetup: dm-crypt disk unlocks on older Debian, does not on current testing

2014-12-17 Thread Quentin Lefebvre
Hi Jonas, On 17/12/2014 14:31, Jonas Meurer wrote : Am 17.12.2014 um 12:32 schrieb Quentin Lefebvre: IN my opinion, the problem comes from Debian's askpass utility, as I tried to mention earlier. The point is that the function systemd_read(), which is used by default with a new Debian J

Bug#768407: [pkg-cryptsetup-devel] Bug#768407: cryptsetup: dm-crypt disk unlocks on older Debian, does not on current testing

2014-12-17 Thread Quentin Lefebvre
Hi, Sorry it took me so much time to answer, I have been quite busy these days. On 15/12/2014 21:11, Jonas Meurer wrote : Am 07.11.2014 um 14:56 schrieb Clayton: On Fri, 07 Nov 2014 11:08:31 +0100 Milan Broz wrote: backcrypt /dev/sdb2 none cipher=aes-cbc-plain,size=256,hash=ripemd160,noauto,

Bug#768577: Patch applied upstream

2014-11-24 Thread Quentin Lefebvre
So here is the point of view of the developers. The upstream patch works provided that "hash=plain" is mentioned in /etc/cryptab. To summarize: - when a user creates a plain dm-crypt device providing a --hash parameter along with a key file - he *should* be aware of the fact that the hash par

Bug#768577: Patch applied upstream

2014-11-24 Thread Quentin Lefebvre
Hi, On 24/11/2014 16:37, intrigeri wrote : Quentin Lefebvre wrote (24 Nov 2014 14:35:45 GMT) : For your information, a patch has been applied upstream. Here is the link: http://cgit.freedesktop.org/systemd/systemd/commit/?id=8a52210c93 Congrats! Can you please try to apply the upstream

Bug#768577: Patch applied upstream

2014-11-24 Thread Quentin Lefebvre
Hi, For your information, a patch has been applied upstream. Here is the link: http://cgit.freedesktop.org/systemd/systemd/commit/?id=8a52210c93 Cheers, Quentin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@li

Bug#768407: Bug solved

2014-11-19 Thread Quentin Lefebvre
Hi again, Actually, I could make it work even with blank passwords (or empty key file provided either directly or through STDIN). I'd like to send you a patch. What is the preferred tool to write a patch for cryptsetup? Best, Quentin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lis

Bug#768407: Proposition for a patch for this bug

2014-11-19 Thread Quentin Lefebvre
Hi, I found a bug in askpass and could solve it. This explains why cryptdisks_start command doesn't behave the correct way. In fact, askpass doesn't remove the trailing '\n' character at the end of the input. It works for non-blank passwords, but blank passwords still cause trouble. Are you

Bug#768577: systemd-cryptsetup handles keyfile differently from cryptsetup on plain mode

2014-11-19 Thread Quentin Lefebvre
Hi, On 19/11/2014 10:38, intrigeri wrote : I suggest attaching the patch to the upstream bug, so that it doesn't get lost in the mailing-list archive. I just did that. In the meanwhile, is it useful to patch Debian? I suspect the maintainers will want to see upstream review and ack the pat

Bug#768577: systemd-cryptsetup handles keyfile differently from cryptsetup on plain mode

2014-11-18 Thread Quentin Lefebvre
On 18/11/2014 09:39, intrigeri wrote: 1. The proper solution still seems to patch systemd-cryptsetup so that this workaround isn't needed; may you please send your patch upstream? If not, just tell us and I guess someone here will do it :) I sent the patch today. In the meanwhile, i

Bug#768577: systemd-cryptsetup handles keyfile differently from cryptsetup on plain mode

2014-11-17 Thread Quentin Lefebvre
I could provide a patch so that systemd-cryptsetup behaves the same way as cryptsetup. But actually, there is even an easier way to solve this: change the 'hash' parameter in /etc/crypttab to 'plain'. Doing this, cryptdisks_{start,stop} scripts work well, and so do systemd-cryptsetup (as it wi

Bug#768577: systemd-cryptsetup handles keyfile differently from cryptsetup on plain mode

2014-11-17 Thread Quentin Lefebvre
Hi again, Actually, I solved the bug pretty easily (thanks to your links) by editing cryptsetup.c file in package systemd. What should we do now? Are you interested in a patch for Debian? Best, Quentin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of

Bug#768577: There's also a problem with passphrases on plain mode

2014-11-17 Thread Quentin Lefebvre
Hi intrigeri, First, thanks for your replies and for the links. I have been investigating cryptsetup behavior as you suggested, and I found out that there is also a problem with passphrases in plain mode. I described it here: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768407#20 . This

Bug#768407: Passphrase management problem

2014-11-16 Thread Quentin Lefebvre
Hi, I'm currently investigating such kind of trouble on my laptop. During my tests, I created the following plain partition : dd if=/dev/zero of=/test1.loop bs=10M count=1 cryptsetup open --type plain /test1.loop test1 (I enter a blank password by directly typing enter) mkfs.ext2 /dev/mapper/tes

Bug#699437: /etc/default/grub involved

2013-05-28 Thread Quentin Lefebvre
You can try to uncomment the line GRUB_DISABLE_LINUX_UUID=true in /etc/default/grub, and then run update-grub . You should have linux lines with root=/dev/mapper/... in your /boot/grub/grub.cfg file, which seems to solve the bug. Best regards, Quentin -- To UNSUBSC

Bug#710168: Bug closed ?

2013-05-28 Thread Quentin Lefebvre
Hi, It seems it was a one-time bug. Indeed, now I have modified my grub.cfg by hand, update-grub works fine and writes the good line with linux ... root=/dev/mapper/sil_...2 no more linux ... root=/dev/sdb2 . Sorry for the inconvenience. Best regards, Quentin -- To UNSUBSCRIBE, ema

Bug#710168: grub2: GURB_DISABLE_LINUX_UUID=true not handled properly with /dev/mapper/... (dmraid) devices

2013-05-28 Thread Quentin Lefebvre
to boot computers with RAID (dmraid) devices. As for now, I have to write the grub.cfg file by hand, which is not a proper solution. Thanks for your astounding work. Best regards, Quentin Lefebvre -- System Information: Debian Release: 7.0 APT prefers stable-updates APT policy: (500

Bug#699437: Modifying GRUB config file

2013-05-28 Thread Quentin Lefebvre
Hi again, I found something new. If I modify my /boot/grub/grub.cfg file as follows : linux vmlinuz... root=/dev/mapper/sil_bia...cdf2 ... instead of linux vmlinuz root=UUID=... ... then the bug doesn't occur anymore. Andreas, could you try this and confirm ? It seems to me tha

Bug#699437: Error in /usr/share/initramfs-tools/hooks/dmraid ?

2013-05-28 Thread Quentin Lefebvre
ld be most appreciated. Best regards, Quentin Lefebvre -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#710119: Definitely see bug #699437

2013-05-28 Thread Quentin Lefebvre
regards, Quentin Lefebvre -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#710119: initramfs-tools: Installation with dmraid randomly fails to boot

2013-05-28 Thread Quentin Lefebvre
I'm not completely sure about that, but it seems that the bug only occurs with kernel 3.2 and not with kernel 2.6. A patch to handle dmraid better would be most appreciated. Best regards, Quentin Lefebvre -- /proc/cmdline BOOT_IMAGE=/vmlinuz-3.2.0-4-686-pae root=UUID=... ro dmraid=