~ubuntu-branches/ubuntu/lucid/ecryptfs-utils/lucid-proposed

Viewing all changes in revision 53.

  • Committer: Bazaar Package Importer
  • Author(s): Dustin Kirkland, Dustin Kirkland, Tyler Hicks
  • Date: 2009-07-22 00:01:56 UTC
  • mfrom: (1.1.22 upstream)
  • Revision ID: james.westby@ubuntu.com-20090722000156-zuw9jmx8uc08akc2
Tags: 77-0ubuntu1
[ Dustin Kirkland ]
* src/libecryptfs/key_management.c, src/pam_ecryptfs/pam_ecryptfs.c:
  revert the zombie code removal from pam_ecryptfs as it seems this
  bit is still needed; fix the source of the problem introduced in
  commit r407; check for non-zero return codes; this problem would
  manifest itself as a) unable to unlock screensaver, b) unable to
  switch users, c) unable to mount home folder on initial login;
  LP: #402222, #402029
* src/utils/ecryptfs-umount-private: use for loop to loop over key
  ids on removal
* src/utils/mount.ecryptfs_private.c: return non-zero on unmount failure
  due to open sessions; handle this in ecryptfs-umount-private too; make
  the flock() blocking; use /dev/shm for counter; add an iterator to the
  counter file to prevent users from DoS'ing one another from accessing
  their encrypted directories, LP: #402745
* debian/ecryptfs-utils.postinst: move /tmp counters to /dev/shm
* configure.ac: link against pam, silence shlib warning
* src/include/ecryptfs.h, src/libecryptfs/main.c,
  src/pam_ecryptfs/pam_ecryptfs.c, src/utils/Makefile.am,
  src/utils/mount.ecryptfs_private.c: move two functions from
  mount.ecryptfs_private to libecryptfs, namely is_mounted() and
  fetch_private_mnt(); use these in both pam_ecryptfs and
  mount.ecryptfs_private; also move PRIVATE to ECRYPTFS_PRIVATE in
  the ecryptfs.h headers; this will allow us to short-circuit some of the
  costly key-loading code on pam_auth if the private dir is already
  mounted, speeding up some subsequent authentications significantly,
  LP: #402748
* doc/ecryptfs-mount-private.txt: removed the "$" to make copy-n-paste
  more user friendly
* src/utils/ecryptfs-setup-private: when encrypting home, put the
  .ecryptfs and .Private data in /home/.ecryptfs rather than /var/lib,
  as users are forgetting to backup /var/lib, and are often putting
  /home on a separate partition; furthermore, this gives users a place
  to access their encrypted data for backup, rather than hiding the
  data below $HOME, LP: #371719

[ Tyler Hicks ]
* src/libecryptfs/cipher_list.c, src/libecryptfs/module_mgr.c:
  add blowfish/56-bytes to the list of ciphers we officially support,
  LP: #402790

expand all expand all

Show diffs side-by-side

added added

removed removed

Lines of Context: