Thanks for the reply. > Which man page? I don't see that stated in any of the 12.10 man pages.
Sorry, I played with this at home (12.10) but I am at an old version (at work) now. :P I just assumed the manual was the same as here. It's too bad there is little to no interest. Ecryptfs is really great technology. I am using it for encrypting mountable OTFE remote backups, and I like to use a simple password at the safe local site, yet have strong key based encryption on the files. Because, as the ecryptfs manual puts it (or used to put it): Cryptographic keys derived from passphrases are generally worthless. It could be that I am using ecryptfs in a silly way, because otherwise, given the popularity of key+password based ssh login to servers for maintenance, one would think that typical devs would actually prefer keys over passwords. Am I missing a trick? Is it possible to use a crazy password and store it in your keyring permanently so the ecryptfs will mount without a password dialog when logged in and keyring opened? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/741364 Title: libecryptfs_key_mod_openssl.so does not exist in ecryptfs-utils To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/741364/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs