63
|
|
[ David Planella ] * Makefile.am, configure.ac, debian/control, debian/po/POTFILES.sh, debian/po/ecryptfs-utils.pot, debian/po/fr.po, debian/rules, po/POTFILES.in, src/desktop/Makefile.am, src/desktop/ecryptfs-mount-private.desktop, src/desktop/ecryptfs-mount-private.desktop.in, src/desktop/ecryptfs-record-passphrase, src/desktop/ecryptfs-setup-private.desktop, src/desktop/ecryptfs-setup-private.desktop.in: - internationalization work for LP: #358283 * po/LINGUAS, po/ca.po: Catalan translation
[ Yan Li <yan.i.li@intel.com> ] * src/pam_ecryptfs/pam_ecryptfs.c, src/utils/Makefile.am, src/utils/ecryptfs-migrate-home: add a script and pam hooks to support automatic migration to encrypted home directory
[ Dustin Kirkland ] * src/utils/ecryptfs-migrate-home: clean up for merge - use $() rather than `` - drop set -u - use = and !=, and quote vars, rather than testing with -ne, -eq, for better shell portability - improve usage statement and error text - check if already encrypted - handle migration of multiple users on boot - fix all whitespace, use tabs for indents - use quotes around variables, rather than ${} (stylistic preference) - major simplification for immediate release + remove boot and user modes; only support administrator mode for security reasons and to avoid race conditions + other modes can be re-added, if necessary, and if security concerns can be addressed - ensure running as root - drop VERBOSE option, always print useful info messages - call the user $USER_NAME rather than $USER_ID since id implies number, and here we're deailing with names - no decimals on awk calculation - mktemp on the target user, not root - check that there is enough disk space available to do the migration - ensure the user's homedir group is correct - add critical instructions, user *must* login after the migration and before the reboot, as their wrapped passphrase will be cleared on reboot (possible we should use an init script to move these to /var/tmp on reboot) - ensure permissions are set correctly - improve text at the end of the migration, organize into notes * ecryptfs-utils.ecryptfs-utils-restore.upstart, ecryptfs-utils.ecryptfs-utils-save.upstart, rules: - try to protect migrating users who don't login before the next reboot * debian/ecryptfs-utils.install: install the locale messages * src/desktop/ecryptfs-record-passphrase: improve dialog text * src/desktop/ecryptfs-record-passphrase: revert the _ bit, as it's not quite working yet, will need to talk to David to fix * Mark LP: #471725 as fixed
|
Dustin Kirkland |
83-0ubuntu1 |
14 years ago
|
|
|
56
|
|
|
Dustin Kirkland |
79-0ubuntu1 |
14 years ago
|
|
|
51
|
|
[ Dustin Kirkland ] * src/utils/ecryptfs-setup-swap: switch from vol_id to blkid, LP: #376486 * debian/ecryptfs-utils.postinst, src/utils/ecryptfs-setup-private: don't echo mount passphrase if running in bootstrap mode; prune potential leakages from install log, LP: #383650 * SECURITY UPDATE: mount passphrase recorded in install log (LP: #383650). - debian/ecryptfs-utils.postinst: prune private information from installer log - src/utils/ecryptfs-setup-private: don't echo passphrase if running in bootstrap mode - CVE-2009-1296 * src/utils/ecryptfs-setup-private: make some of the lanuage more readable, (thanks, anrxc) * README, configure.ac, debian/control, debian/rules, doc/sourceforge_webpage/README, src/libecryptfs-swig/libecryptfs.py, src/libecryptfs-swig/libecryptfs_wrap.c, src/libecryptfs/key_management.c, src/libecryptfs/libecryptfs.pc.in, src/libecryptfs/main.c, src/pam_ecryptfs/Makefile.am, src/utils/manager.c, src/utils/mount.ecryptfs.c: move build from gcrypt to nss (this change has been pending for some time) * src/utils/ecryptfs-dot-private: dropped, was too hacky * ecryptfs-mount-private.1, ecryptfs-setup-private.1: align the documentation and implementation of the wrapping-independent feature, LP: #383746 * src/utils/ecryptfs-umount-private: use keyctl list @u, since keyctl show stopped working, LP: #400484, #395082 * src/utils/mount.ecryptfs_private.c: fix counter file locking; solves a longstanding bug about "random" umount caused by cronjobs, LP: #358573
[ Michal Hlavinka (edits by Dustin Kirkland) ] * doc/manpage/ecryptfs-mount-private.1, doc/manpage/ecryptfs-rewrite-file.1, doc/manpage/ecryptfs-setup-private.1, doc/manpage/ecryptfs.7, doc/manpage/mount.ecryptfs_private.1, doc/manpage/umount.ecryptfs_private.1: documentation updated to note possible ecryptfs group membership requirements; Fix ecrypfs.7 man page and key_mod_openssl's error message; fix typo * src/libecryptfs/decision_graph.c: put a finite limit (5 tries) on interactive input; fix memory leaks when asking questions * src/libecryptfs/module_mgr.c: Don't error out with EINVAL when verbosity=0 and some options are missing. * src/utils/umount.ecryptfs.c: no error for missing key when removing it * src/libecryptfs-swig/libecryptfs.i: fix compile werror, cast char* * src/utils/ecryptfs_add_passphrase.c: fix/test/use return codes; return nonzero for --fnek when not supported but used * src/include/ecryptfs.h, src/key_mod/ecryptfs_key_mod_openssl.c, src/libecryptfs/module_mgr.c: refuse mounting with too small rsa key (key_mod_openssl) * src/utils/ecryptfs_insert_wrapped_passphrase_into_keyring.c: fix return codes * src/utils/ecryptfs-rewrite-file: polish output * src/libecryptfs/key_management.c: inform about full keyring; insert fnek sig into keyring if fnek support check fails; don't fail if key already exists in keyring * src/utils/ecryptfs-setup-private: if the ecryptfs group exists, restrict ecryptfs-setup-private to members of this group * src/pam_ecryptfs/pam_ecryptfs.c: dynamically load ecryptfs module by checking ecryptfs version * src/libecryptfs/decision_graph.c, src/utils/io.c, src/utils/mount.ecryptfs.c: fix EOF handling, LP: #371587 * src/desktop/Makefile.am: make desktop files trusted, LP: #371426
[ Dustin Kirkland and Daniel Baumann ] * debian/control, debian/copyright, debian/ecryptfs-utils.dirs, debian/ecryptfs-utils.install, debian/ecryptfs-utils.postinst, debian/rules, ecryptfs-utils.pam-auth-update: sync Ubuntu's packaging with Debian; drop dpatch, drop libssl build dep, clean up extraneous debhelper bits, match cflags; remaining diff is only ecryptfs-utils.prerm
[ Arfrever Frehtes Taifersar Arahesis ] * key_mod/ecryptfs_key_mod_gpg.c, key_mod/ecryptfs_key_mod_pkcs11_helper.c, libecryptfs/key_management.c, utils/ecryptfs_unwrap_passphrase.c: Fix warnings, initialize a few variables, drop unused ones
[ David Hicks ] * src/lib/key_management.c: fix stray semicolon that prevents .ecryptfsrc files from working properly, LP: #372709
[ Michael Rooney ] * src/python/ecryptfsapi.py: added python api
|
Dustin Kirkland |
76-0ubuntu1 |
14 years ago
|
|
|
43
|
|
|
Dustin Kirkland |
73-0ubuntu1 |
15 years ago
|
|
|
39
|
|
|
Dustin Kirkland |
70-0ubuntu1 |
15 years ago
|
|
|
37
|
|
|
Dustin Kirkland |
69-0ubuntu1 |
15 years ago
|
|
|
35
|
|
|
Dustin Kirkland |
68-1ubuntu1 |
15 years ago
|
|
|
34
|
|
|
Dustin Kirkland |
67-1ubuntu1 |
15 years ago
|
|
|
31
|
|
* Merge from debian unstable, (LP: #259631, #293433, #286265, #247421, #294888, #298421) * Remaining changes: - debian/ecryptfs-utils.postinst: handle pam-auth-update (Bug: #506172) - debian/rules: + keep the dpatch infrastructure around, as we'll likely need it again at some point soon + install the desktop, readme, and pam-auth-update files () - debian/ecryptfs-utils.install: install the desktop, readme shared files (Bug: #506172) - debian/control: + keep the dpatch build dep + depend on libpam-runtime (Bug: #506172) - debian/ecryptfs-utils.prerm: remove pam-auth-update configuration (Bug: #506172) - debian/ecryptfs-mount-private.txt: readme to install in unmounted private dir (Bug: #506172) - debian/ecryptfs-mount-private.desktop: desktop link to install in unmounted private dir (Bug: #506172) - debian/ecryptfs-utils.dirs: usr share install dirs (Bug: #506172) - debian/ecryptfs-utils.pam-auth-update: pam stack configuration (Bug: #506172)
|
Dustin Kirkland |
66-2ubuntu1 |
15 years ago
|
|
|
19
|
|
|
Dustin Kirkland |
53-1ubuntu1 |
15 years ago
|
|
|
14
|
|
|
Daniel Baumann |
50-1 |
15 years ago
|
|
|
13
|
|
|
Daniel Baumann |
48-1 |
15 years ago
|
|
|
12
|
|
|
Daniel Baumann |
46-1 |
15 years ago
|
|
|
8
|
|
|
Daniel Baumann |
38-2 |
16 years ago
|
|
|
6
|
|
|
Daniel Baumann |
30-1 |
16 years ago
|
|
|
4
|
|
|
William Lima |
21-0ubuntu1 |
16 years ago
|
|
|
1
|
|
|
William Lima |
upstream-15 |
17 years ago
|
|
|