Thanks for the reply.

> Which man page? I don't see that stated in any of the 12.10 man pages.

Sorry, I played with this at home (12.10) but I am at an old version (at
work) now. :P I just assumed the manual was the same as here.

It's too bad there is little to no interest. Ecryptfs is really great
technology. I am using it for encrypting mountable OTFE remote backups,
and I like to use a simple password at the safe local site, yet have
strong key based encryption on the files. Because, as the ecryptfs
manual puts it (or used to put it): Cryptographic keys derived from
passphrases are generally worthless.

It could be that I am using ecryptfs in a silly way, because otherwise,
given the popularity of key+password based ssh login to servers for
maintenance, one would think that typical devs would actually prefer
keys over passwords.

Am I missing a trick? Is it possible to use a crazy password and store
it in your keyring permanently so the ecryptfs will mount without a
password dialog when logged in and keyring opened?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/741364

Title:
  libecryptfs_key_mod_openssl.so does not exist in ecryptfs-utils

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/741364/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to