This is an improved patch for initramfs-tools, with considerable
assistance from Kees Cook. Thanks Kees!
I have an updated package in my PPA:
* https://launchpad.net/~kirkland/+archive
:-Dustin
** Attachment added: "initramfs-tools.120375.debdiff"
http://launchpadlibrarian.net/16314912/init
And this mdadm patch supercedes the previous one. It uses the new
initramfs-tools interface for adding the fail hook.
Updated package in my PPA:
* https://launchpad.net/~kirkland/+archive
:-Dustin
** Attachment added: "mdadm.120375.debdiff"
http://launchpadlibrarian.net/16314962/mdadm.12037
Testing instructions for Intrepid are available in a wiki page for a
specification covering this bug:
*
https://wiki.ubuntu.com/BootDegradedRaid#head-a5a91db34505d4a047fd7f30e44ac2020da369a6
:-Dustin
--
cannot boot raid1 with only one disk
https://bugs.launchpad.net/bugs/120375
You received t
On Fri, Jul 25, 2008 at 8:08 PM, ceg <[EMAIL PROTECTED]> wrote:
> Instead of fixed sleep 5 in init-premount/mdadm, you could introduce a check
> & timeout loop
> after call_failure_hooks in the local script. (So we can resume booting
> ASAP.) Maybe just copy
> the slumber while loop from above th
On Fri, Jul 25, 2008 at 8:08 PM, ceg <[EMAIL PROTECTED]> wrote:
> "mdadm --run --scan" will start all arrays degraded not only the one needed
> for the rootfs (and
> its lvm and crypt respectively).
> It will start for example a partial array from a removable disk that was
> attatched and hasn't
I have linked this bug to the following Blueprint for Intrepid:
* https://blueprints.launchpad.net/ubuntu/+spec/boot-degraded-raid
And covered it briefly in the specification:
*
https://wiki.ubuntu.com/BootDegradedRaid#head-bad7ecb75ab9cd9fd207658b7aecf983f919e33a
I am working on this for Intr
Patch looks good to me, thanks! I recommend it for upload. Thank you
very much for pushing this back to Debian too ;-)
:-Dustin
--
dbus init script lacks the 'status' action
https://bugs.launchpad.net/bugs/252214
You received this bug notification because you are a member of Ubuntu
Bugs, which
You have bumped the Standards-Version to 3.8.0
Are you sure that this package is compliant with 3.8.0?
:-Dustin
--
acpid init script lacks the 'status' action
https://bugs.launchpad.net/bugs/251681
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
Init script part of the patch looks good.
But you're also bumping the Standards-Version: 3.8.0.
Are you sure that this package is compliant?
:-Dustin
--
brltty init script lacks the 'status' action
https://bugs.launchpad.net/bugs/251626
You received this bug notification because you are a memb
Patch looks good, thanks.
My only minor comment is that we have been adding the "status" to the
end of the list of the available actions on the usage statement.
Changing that might help it be more consistent.
Thanks,
:-Dustin
--
hal init script lacks the 'status' action
https://bugs.launchpad.n
Patch looks good, I recommend it for upload.
Thanks!
:-Dustin
--
lighttpd init script should support the 'status' action
https://bugs.launchpad.net/bugs/251924
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
A bzr branch with these changes, proposed for merging:
* https://code.launchpad.net/~kirkland/usplash/usplash.251656
:-Dustin
--
lsb calls to usplash_write should fail silently
https://bugs.launchpad.net/bugs/251656
You received this bug notification because you are a member of Ubuntu
Bugs, whi
Done. Patch attached.
:-Dustin
** Attachment added: "samba.247087.debdiff"
http://launchpadlibrarian.net/16367257/samba.247087.debdiff
--
samba init script status action
https://bugs.launchpad.net/bugs/247087
You received this bug notification because you are a member of Ubuntu
Bugs, which
On Mon, Jul 28, 2008 at 3:41 PM, RpR <[EMAIL PROTECTED]> wrote:
> How can you install the solution.
> Tried a sudo apt-get -y update && sudo apt-get -y upgrade
This has been fixed in the development tree of Ubuntu Intrepid for
further testing. It's not available for Hardy (or anything prior to
In
On Tue, Jul 29, 2008 at 4:20 AM, Thierry Carrez
<[EMAIL PROTECTED]> wrote:
> Nathan: fyi, 2.1~rc8-1 was synced to intrepid recently to fix a couple
> of bugs. It still misses the status action in the initscript so this bug
> is still open.
Nathan-
Can you re-base your diff against the current ope
On Wed, Jul 30, 2008 at 9:10 AM, tricky1 <[EMAIL PROTECTED]> wrote:
> - When will your work be integrated into the daily iso?
Ideally, sometime before FeatureFreeze, currently set for 28 Aug 2008.
* https://wiki.ubuntu.com/IntrepidReleaseSchedule
> - Did you read my additional comments added at
On Wed, Jul 30, 2008 at 11:04 AM, Bryce Harrington
<[EMAIL PROTECTED]> wrote:
> Is this still an issue with Intrepid?
Sorry, I no longer have access to the hardware :-(
:-Dustin
--
Live CD boots to a black screen on Blueberry G3 iMac
https://bugs.launchpad.net/bugs/22976
You received this bug n
On Thu, Jul 31, 2008 at 7:58 AM, tricky1 <[EMAIL PROTECTED]> wrote:
> a) Even if smart status is not perfect it is a good idea to warn user
> during boot in case of errors detected.
I still don't see this as practical, as it would necessitate moving
smartctl (and dependent .so's) into the initramf
Martin-
Your concerns should be addressed in the latest ecryptfs-utils. Could
you check this again for main inclusion?
:-Dustin
** Changed in: ecryptfs-utils (Ubuntu)
Status: Incomplete => Confirmed
--
main inclusion request: ecryptfs-utils
https://bugs.launchpad.net/bugs/247400
You re
stack in common-password.
:-Dustin
** Affects: ecryptfs-utils (Ubuntu)
Importance: Medium
Assignee: Dustin Kirkland (kirkland)
Status: Triaged
--
pam_ecryptfs needs to be added to the common-password stack by
auth-client-config
https://bugs.launchpad.net/bugs/253816
You
Patch attached.
:-Dustin
** Attachment added: "ecryptfs.253816.debdiff"
http://launchpadlibrarian.net/16462482/ecryptfs.253816.debdiff
** Changed in: ecryptfs-utils (Ubuntu)
Importance: Undecided => Medium
Assignee: (unassigned) => Dustin Kirkland (kirkland)
I can confirm this issue too, but it's unique to the access point.
I have connected successfully to dozens of other access points, but I'm
trying to connect to an SMC Barricade SMC7004AWBR. The wireless
connection is established, and persists (802.11b, no encryption). But I
cannot draw an ipaddr
Martin-
I consciously did *not* edit the postinst to do the grub install, in
order to keep with the rule of "least surprise".
I agree with Steve's comments that it would be quite nice if this
could be done automatically, but I don't think messing with every RAID
user's MBR is something that we sh
; would create an encrypted home directory. What do
> you think about that? (Not a blocker for upload, of course)
Absolutely a good idea. I'm assigning this to myself, and I'll handle
it.
:-Dustin
** Affects: adduser (Ubuntu)
Importance: Medium
Assignee: Dustin Kirkl
Martin,
I actually tested the absence of ecryptfs-setup-private... It's sort of
handled by:
my $ecryptfs_setup_private = &which('ecryptfs-setup-private')
It says:
adduser: Could not find program named 'ecryptfs-setup-private' in $PATH
We could emit another message, about apt-get install e
Updated patch attached.
This patch introduces two changes based on Martin's feedback...
1) drops ecryptfs-utils from a Recommends to a Suggests
2) moves the &which() call to the parameter sanity checking section, such that
calling adduser --encrypt-home when ecryptfs-setup-private is not instal
** Also affects: user-setup (Ubuntu)
Importance: Undecided
Status: New
** Changed in: user-setup (Ubuntu)
Importance: Undecided => High
Assignee: (unassigned) => Dustin Kirkland (kirkland)
Status: New => In Progress
Target: None => jaunty-alpha-2
--
ecryptfs kernel module needed in the installer for the user-setup
changes.
:-Dustin
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Importance: Undecided => High
Status: New => Confirmed
Target: None => jaunty-alpha-2
**
Patch attached for user-setup. This patch adds support for adduser
--encrypt-home, and the corresponding dialog. It also drastically
simplifies the process by removing the more complicated encrypted-
private support.
Note that the sponsor should run debconf-updatepo (or the like) to
update the t
Public bug reported:
Please package pwrkap, from IBM.
*
http://publib.boulder.ibm.com/infocenter/systems/topic/liaai/energymgmt/liaaienergypowercap.htm
:-Dustin
** Affects: ubuntu
Importance: Wishlist
Assignee: Dustin Kirkland (kirkland)
Status: In Progress
** Changed in
Package available in my PPA.
:-Dustin
--
please package pwrkap
https://bugs.launchpad.net/bugs/306423
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mai
What group is it set to?
ls -alF /dev/kvm?
Also, are you using the Ubuntu server, or desktop?
:-Dustin
--
Wrong group for /dev/kvm
https://bugs.launchpad.net/bugs/296072
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
Interesting proposition, Paulo. I am running an Intel Core2 Duo in 64
bit mode, and I have not been able to reproduce this on my hardware,
or in KVM's on this machine.
I will try it on an amd64 machine.
:-Dustin
--
Error when copying directory tree with Nautilus to ~/Private using ecryptfs
htt
On Tue, Nov 11, 2008 at 11:47 AM, Paulo J. S. Silva <[EMAIL PROTECTED]> wrote:
> Yes, I tried all nautilus, "cp -r", "cp -a", and a hand made Python
> script that calls shutils.copyfile recursively in a tree. All fail.
Hmm, this definitely sounds like a kernel issue. mhalcrow is
subscribed to thi
** Changed in: mythtv (Ubuntu)
Assignee: (unassigned) => Dustin Kirkland (kirkland)
--
mythtv-setup: unable to connect to database
https://bugs.launchpad.net/bugs/243504
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubu
http://docs.info.apple.com/article.html?path=Mac/10.5/en/8736.html
It looks like it's an optional configuration parameter, rather than
being done by default...
:-Dustin
--
anyone with a livecd can acces data on ubuntu -- encrypt home directories
https://bugs.launchpad.net/bugs/277894
You receiv
My most sincere apologies are offered for any offense taken...
This should absolutely be handled in the official documentation, most
likely in the Ubuntu Server Guide.
:-Dustin
** Also affects: ubuntu-docs (Ubuntu)
Importance: Undecided
Status: New
--
SRU: Backport of Boot Degraded R
Also, do you see this same problem if you use "cp -a" on the command
line, rather than through Nautilus?
:-Dustin
--
Error when copying directory tree with Nautilus to ~/Private using ecryptfs
https://bugs.launchpad.net/bugs/292429
You received this bug notification because you are a member of U
Paul-
I think I understand the wrinkle you're seeing here...
mdadm will only fail to construct a "newly" degraded array.
So the *first* time you boot with a missing disk, mdadm expects the
RAID to be fully operational, notices it's missing a disk, and the new
code we have in the initramfs takes
On Tue, Nov 11, 2008 at 8:12 PM, Ryan Giobbi <[EMAIL PROTECTED]> wrote:
> Yes, I was. I have since reinstalled but I can test again in a virtual
> machine - please let me know if you'd like me to.
Please do. Please make sure you do an apt-get update && apt-get
upgrade, as I think I have fixed thi
Adding a task to update the Ubuntu Server Guide for Hardy/Intrepid to
clearly explain the new degraded RAID behavior. Specifically, we need
to clearly explain that there's a significant difference to mdadm
between a "newly degraded RAID event", and subsequent boots on "a RAID
that is known to be d
As I have said above, I'm work on seamless home directory encryption for
Jaunty.
I have it working in several virtual machines, and on my primary
laptop. I'm still bringing together the pieces to automate the setup
thereof.
It will *not* be the default. However, I do hope that it is an option
o
** Changed in: ecryptfs-utils (Ubuntu)
Assignee: (unassigned) => mhalcrow (mhalcrow)
Status: New => Triaged
** Also affects: ecryptfs
Importance: Undecided
Status: New
** Changed in: ecryptfs
Status: New => Triaged
** Also affects: linux (Ubuntu)
Importance: Undec
On Wed, Nov 12, 2008 at 2:50 AM, Jessie Lawrence <[EMAIL PROTECTED]> wrote:
> ok, cool. but i think that there should be a way to enable this through the
> gui, like in mac
Perhaps. There's some problems with this, at least in my head, that I
don't know how to solve yet. We'll see.
> also, is t
Martin-
The fix, as proposed, will only solve this comprehensively for *newly*
created encrypted-private setups, with the patched
ecryptfs-setup-private.
I didn't think it appropriate for upgrading the package to go digging
in user's unmounted ~/Private directory, creating symlinks to the
readme.
One update to my last post... That hack might actually have to go
into pam_ecryptfs.so.
:-Dustin
--
Cannot open Private directory after a reboot when "Automatic Login" enabled
https://bugs.launchpad.net/bugs/259631
You received this bug notification because you are a member of Ubuntu
Bugs, whic
I'm adding a task for Nautilus, as I'm not sure that there's something I
can do about this in ecryptfs.
Nautilus developers-
Ideas?
:-Dustin
** Also affects: nautilus (Ubuntu)
Importance: Undecided
Status: New
--
Cannot clear the ~/Private/.Trash-
https://bugs.launchpad.net/bugs
You don't have to do this as root, you can do this as the
non-privileged user with:
$ ecryptfs-umount-private
$ chmod 700 Private
$ rm -rf ~/.ecryptfs ~/.Private ~/Private
Understanding, of course, that you're blowing away any and all data in
those directories.
I don't think that I'm going to pr
The kernel patches required to solve this problem were accepted by
Andrew Morton into the Linux -mm experimental tree. They're going to
bake there for a little while and hopefully be merged by Linus into a
stable Linux kernel release soon. At which point, we will ask the
Ubuntu kernel team to bum
Okay, I'm adding a gvfs task.
gvfs-developers-
Any suggestions?
:-Dustin
** Also affects: gvfs (Ubuntu)
Importance: Undecided
Status: New
--
Cannot clear the ~/Private/.Trash-
https://bugs.launchpad.net/bugs/297993
You received this bug notification because you are a member of U
I have documented this procedure here:
https://help.ubuntu.com/community/EncryptedPrivateDirectory
:-Dustin
--
Cannot delete a single user ~/Private folder
https://bugs.launchpad.net/bugs/298421
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I'll create an ecryptfs-delete-private utility that prints the
instructions to screen.
:-Dustin
** Also affects: ecryptfs
Importance: Undecided
Status: New
** Changed in: ecryptfs
Assignee: (unassigned) => Dustin Kirkland (kirkland)
Status: New => Triaged
Documented manually adding the symlinks to a legacy-installed
encrypted private directory here:
https://help.ubuntu.com/community/EncryptedPrivateDirectory
:-Dustin
--
Cannot open Private directory after a reboot when "Automatic Login" enabled
https://bugs.launchpad.net/bugs/259631
You received
Thierry-
Can you scp your entire merge tree to your people.ubuntu.com:public_html
directory for examination?
Thanks,
:-Dustin
--
Please merge pure-ftpd 1.0.21-11.4 (universe) from Debian unstable (main)
https://bugs.launchpad.net/bugs/298080
You received this bug notification because you are a
What version of ecryptfs-utils are you using? That functionality is
deprecated and fixed in a new version.
dpkg -l | grep ecryptfs-utils
:-Dustin
--
ecryptfs-utils "ecryptfs-umount-private" don't work
https://bugs.launchpad.net/bugs/299216
You received this bug notification because you are a
in: ecryptfs-utils (Ubuntu)
Assignee: (unassigned) => Dustin Kirkland (kirkland)
Status: New => Confirmed
--
Cannot delete a single user ~/Private folder
https://bugs.launchpad.net/bugs/298421
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
*** This bug is a duplicate of bug 106621 ***
https://bugs.launchpad.net/bugs/106621
Thanks for the pointer!
I'm going to mark as duplicate.
:-Dustin
** This bug has been marked a duplicate of bug 106621
GNOME Trash doesn't show deleted files on fuse partitions (ecryptfs / encfs
/ Priva
Adding ecryptfs-utils for tracking purposes, since we've gotten a few
reports.
:-Dustin
** Also affects: ecryptfs-utils (Ubuntu)
Importance: Undecided
Status: New
** Changed in: ecryptfs-utils (Ubuntu)
Status: New => Invalid
--
GNOME Trash doesn't show deleted files on fuse pa
I moved much more robust instance counting code into
mount.ecryptfs_private and umount.ecryptfs_private themselves. They
keep track of successful and unsuccessful mounts in a tempfile.
The 'whoami' code was flimsy and buggy, and never quite worked
correctly. And with a better built-in counter, c
Thanks for the report.
Chris is absolutely right...
Typo on my part. I have updated the wiki page accordingly.
:-Dustin
--
ecryptfs-utils version 53-1ubuntu14 unavailable on AMD-64
https://bugs.launchpad.net/bugs/299442
You received this bug notification because you are a member of Ubuntu
Bug
Tony-
Check that you have:
$ dpkg -l | grep ecryptfs-utils
ii ecryptfs-utils 53-1ubuntu13
And then:
$ dpkg -L ecryptfs-utils | grep /usr/share/ecryptfs-utils
/usr/share/ecryptfs-utils
/usr/share/ecryptfs-utils/ecryptfs-mount-private.desktop
/usr/share/ecryptfs-utils/
-13 is in the intrepid-proposed repository.
Check that you have -proposed enabled.
$ grep proposed /etc/apt/sources.list
:-Dustin
--
ecryptfs-utils version 53-1ubuntu14 unavailable on AMD-64
https://bugs.launchpad.net/bugs/299442
You received this bug notification because you are a member of
It should be promoted from -proposed to -updates any day now.
:-Dustin
--
ecryptfs-utils version 53-1ubuntu14 unavailable on AMD-64
https://bugs.launchpad.net/bugs/299442
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs m
** Changed in: ecryptfs
Status: Fix Committed => Fix Released
** Changed in: ecryptfs-utils (Ubuntu)
Status: Triaged => Fix Committed
--
ecryptfs-utils does not work with LDAP/Kerberos users
https://bugs.launchpad.net/bugs/293433
You received this bug notification because you are a
** Changed in: ecryptfs
Status: Fix Committed => Fix Released
--
ecryptfs MAN as duplicated content
https://bugs.launchpad.net/bugs/286265
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@li
** Changed in: ecryptfs
Status: Fix Committed => Fix Released
--
Cannot open Private directory after a reboot when "Automatic Login" enabled
https://bugs.launchpad.net/bugs/259631
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
** Changed in: ecryptfs-utils (Ubuntu)
Status: Incomplete => Invalid
--
~/Private: one file visible/readable when not mounted
https://bugs.launchpad.net/bugs/290983
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs ma
I've fixed this upstream in ecryptfs-utils-66, which supports encryption
of all of home directories.
I'm leaving the Ubuntu task open for now, as there's a bit more work to
be done at the distribution level, to get this working in the installer,
etc.
:-Dustin
** Also affects: ecryptfs
Importa
Assignee: (unassigned) => Dustin Kirkland (kirkland)
Status: New => Fix Released
--
ecryptfs-utils private directory should support translations of "Private"
https://bugs.launchpad.net/bugs/247421
You received this bug notification because you are a member of Ubuntu
Bugs, which
yptfs
Assignee: (unassigned) => Dustin Kirkland (kirkland)
Status: New => Fix Released
--
Cannot specify location of Private directory
https://bugs.launchpad.net/bugs/294888
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
Public bug reported:
Binary package hint: ecryptfs-utils
The newly merged ecryptfs-utils for jaunty fails to build due to missing
python dependencies.
:-Dustin
** Affects: ecryptfs-utils (Ubuntu)
Importance: Undecided
Status: New
--
ecryptfs-utils-66 FTBFS
https://bugs.launchpad
Patch attached, sponsorship requested.
:-Dustin
** Attachment added: "299888.debdiff"
http://launchpadlibrarian.net/19786054/299888.debdiff
--
ecryptfs-utils-66 FTBFS
https://bugs.launchpad.net/bugs/299888
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Stefano-
No, this is only intended to solve the situation where you need to
boot your system from a degraded RAID.
:-Dustin
--
SRU: Backport of Boot Degraded RAID functionality from Intrepid to Hardy
https://bugs.launchpad.net/bugs/290885
You received this bug notification because you are a mem
On Thu, Nov 20, 2008 at 11:33 AM, Stefano Garavaglia
<[EMAIL PROTECTED]> wrote:
> I have a machine with non-raid root partition (indeed it's hw raid) and
> some extra software raid space which is in fstab to be mounted on pass
> 2.
See http://manpages.ubuntu.com/manpages/hardy/en/man5/fstab.html
r
Ah, okay. Yes, you're exactly right, you're speaking of Bug #259145.
The current stack of SRU's is not claiming to solve that bug, while
that bug is valid, confirmed and important. It will be addressed
separately.
:-Dustin
--
SRU: Backport of Boot Degraded RAID functionality from Intrepid to
d get merged into Jaunty thereafter.
:-Dustin
** Also affects: ecryptfs
Importance: Undecided
Status: New
** Changed in: ecryptfs
Importance: Undecided => High
Assignee: (unassigned) => Dustin Kirkland (kirkland)
Status: New => Fix Committed
** Changed in: ecryptfs
+1, thanks for the patch, Steven. Hopefully, someone can get this
sponsored for you soon.
:-Dustin
** Changed in: smartmontools (Ubuntu)
Importance: Undecided => Wishlist
Status: Incomplete => In Progress
Target: None => jaunty-alpha-2
--
smartmontools init scripts lacks the '
Thanks for the bug report.
I have committed a fix for this issue upstream. We're just waiting on
the merge into Jaunty. This should be fixed very soon.
:-Dustin
** Changed in: ecryptfs-utils (Ubuntu)
Importance: Undecided => High
Assignee: (unassigned) => Dustin Kirklan
** Changed in: ecryptfs
Status: Fix Committed => Fix Released
--
~/Private unmounts at random times
https://bugs.launchpad.net/bugs/304043
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@li
** Changed in: ecryptfs
Status: In Progress => Fix Released
--
add support for setting up encrypted home directory on user creation
https://bugs.launchpad.net/bugs/302870
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-
** Changed in: ecryptfs
Status: Fix Committed => Fix Released
--
Cannot delete a single user ~/Private folder
https://bugs.launchpad.net/bugs/298421
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubun
** Changed in: ecryptfs
Status: Fix Committed => Fix Released
--
ecryptfs-setup-private fails if passphrase contains character "%"
https://bugs.launchpad.net/bugs/290445
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-b
I'm adding a task for system-tools-backends, as the graphical "add user"
utility should also support this feature.
Reading my process table, it looks to me like this is handled by:
/usr/bin/perl
/usr/share/system-tools-backends-2.0/scripts/SystemToolsBackends.pl -m
UserConfig
:-Dustin
** Also
Hmm, actually, it looks like it might be /usr/bin/users-admin provided
by gnome-system-tools?
:-Dustin
--
add support for setting up encrypted home directory on user creation
https://bugs.launchpad.net/bugs/302870
You received this bug notification because you are a member of Ubuntu
Bugs, which
Marking system-tools-backends invalid. Adding gnome-system-tools. I
suppose we need the KDE equivalent as well...
:-Dustin
** Changed in: system-tools-backends (Ubuntu)
Importance: High => Undecided
Status: Triaged => Invalid
Target: jaunty-alpha-2 => None
** Also affects: gno
Martin-
Would would you think of adding a bit to the grub postinst that
detected if you were upgrading from a certain version, and if you have
root (or /boot) on a RAID device, and if so, run grub-install on that
device?
:-Dustin
--
SRU: Backport of Boot Degraded RAID functionality from Intrepi
Hi Yann-
I think your issue sounds like a different one. The previous posters
found that kvm-68 "solved" the issue for them, and that it was kvm62
that had problems.
Would you mind filing a new bug with some additional information, such
as the guest os and host os, exact kernel version, loaded m
** Changed in: ecryptfs-utils (Ubuntu)
Status: In Progress => Fix Released
--
add support for setting up encrypted home directory on user creation
https://bugs.launchpad.net/bugs/302870
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
Attaching an updated adduser debdiff, recommending on the ecryptfs-utils
that was uploaded today.
This is ready for upload. Requesting sponsorship...
:-Dustin
** Attachment added: "adduser.2.debdiff"
http://launchpadlibrarian.net/20216067/adduser.2.debdiff
--
add support for setting up enc
Thanks for the bug report!
Any chance you have a patch that adds the status action?
:-Dustin
--
smartmontools init scripts lacks the 'status' action
https://bugs.launchpad.net/bugs/300535
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Michael-
It doesn't look like you're running the -proposed kernel, which is
2.6.27-10.20.
https://edge.launchpad.net/ubuntu/intrepid/+source/linux/2.6.27-10.20
:-Dustin
--
Error when copying directory tree with Nautilus to ~/Private using ecryptfs
https://bugs.launchpad.net/bugs/292429
You rec
Michael-
And one more followup...
2.6.27-10.20 isn't built yet. It should be in place by Monday, Nov
24th. That's the one we'll need to verify, as it contains the proposed
fix for this bug.
Cheers,
:-Dustin
--
Error when copying directory tree with Nautilus to ~/Private using ecryptfs
https:
Updated patch attached, per feedback.
:-Dustin
** Attachment added: "282784.debdiff"
http://launchpadlibrarian.net/19849520/282784.debdiff
--
select-editor needs fully qualified path to "update-alternatives"
https://bugs.launchpad.net/bugs/282784
You received this bug notification because yo
I added a linux-image task.
It appears to me that the iscsi_trgt.ko provided by the Ubuntu kernel is
buggy, and won't unload properly.
This is causing a nasty problem on package upgrade of iscsitarget in
Jaunty (I'm working on the merge), because the initscript is "stopped"
in the prerm, but this
Public bug reported:
Binary package hint: ecryptfs-utils
author Dustin Kirkland <[EMAIL PROTECTED]>
Fri, 21 Nov 2008 21:52:07 + (15:52 -0600)
committer Dustin Kirkland <[EMAIL PROTECTED]>
Fri, 21 Nov 2008 21:52:07 + (15:52 -
Patch attached. Please sponsor.
:-Dustin
** Attachment added: "301085.debdiff"
http://launchpadlibrarian.net/19866390/301085.debdiff
--
broken mount counter
https://bugs.launchpad.net/bugs/301085
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Also, I just merged iscsitarget_0.4.16+svn162-2ubuntu1 for Jaunty.
But package upgrades will fail until we get the module unloading working
properly.
As a workaround in the meantime in Jaunty, you can:
$ sudo service iscsitarget stop
$ sudo mv /etc/init.d/iscitarget /tmp
$ sudo apt-get update
And using the new, Jaunty init script, module unload failures are
reported by the init script, but are not FATAL. ie, they do not exit 1.
:-Dustin
--
[intrepid] Can not stop iscsitarget
https://bugs.launchpad.net/bugs/278625
You received this bug notification because you are a member of Ubuntu
Jim-
I have posted instructions at:
* https://help.ubuntu.com/community/EncryptedPrivateDirectory
As to how to add links to your unmounted Private directory, that would
allow you to double click on "Access Your Private Data" link, enter
your password, and then mount your private directory.
:-Du
Could you guys post your:
* /etc/pam.d/common-auth
* /etc/pam.d/common-login
* /etc/pam.d/common-session
files?
There might be something else odd going on in there ...
:-Dustin
--
pam_encryptfs.so causes authentication to be slow
https://bugs.launchpad.net/bugs/295429
You received this bug
1 - 100 of 6654 matches
Mail list logo