Your message dated Fri, 24 Oct 2014 10:40:40 +0000 with message-id <E1XhcIS-0001Kb-Er@franck.debian.org> and subject line Bug#656710: fixed in partman-crypto 77 has caused the Debian Bug report #656710, regarding partman-crypto: Preseeding the passphrase to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 656710: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656710 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: partman-crypto: Preseeding the passphrase
- From: Olaf Mandel <olaf@mandel.name>
- Date: Sat, 21 Jan 2012 07:56:18 +0100
- Message-id: <4F1A6192.1080506@mandel.name>
Package: partman-crypto Version: 49 Severity: wishlist Tags: d-i patch The passphrase should be preseedable for unattended installations. This is possible in the Ubuntu-version of this package since at least the end of March 2010 (40ubuntu2). The attached patch is an independent implementation of the same functionality. Thoughts on security: The preseeded passphrase should be considered insecure, depending on the source of the preseed file. But if the administrator ensures that the user changes the passphrase after the first login, this should still be secure enough (Maybe put a note about security into the preseed template file?). Currently tested on http://ftp.debian.org/debian/dists/squeeze/main/installer-i386/current/images/netboot/mini.iso . -- System Information: Debian Release: 6.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-486 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- Olaf Mandel <olaf@mandel.name> <http://www.olaf.mandel.name/> PGP key: 1024D/33398848 2002-09-19 Fingerprint: 0E33 BEA6 1A71 9C5E 62BD FC0E 99A7 D2C6 3339 8848--- partman-crypto-49/blockdev-keygen.orig 2012-01-20 20:11:31.603528151 +0100 +++ partman-crypto-49/blockdev-keygen 2012-01-20 20:33:55.293528151 +0100 @@ -31,25 +31,24 @@ } get_passphrase () { - local pass_ok + local templ last_RET pass pass_ok pass_ok=0 while [ $pass_ok -eq 0 ]; do templ="partman-crypto/passphrase" - db_set $templ "" - db_fset $templ seen false db_subst $templ DEVICE "$description" db_input critical $templ templ="partman-crypto/passphrase-again" - db_set $templ "" - db_fset $templ seen false db_input critical $templ db_go || return 1 - db_get partman-crypto/passphrase || RET='' + templ="partman-crypto/passphrase" + db_get $templ || RET='' pass=$RET + db_set $templ "" + db_fset $templ seen false if [ -z "$pass" ]; then templ="partman-crypto/passphrase-empty" db_fset $templ seen false @@ -57,8 +56,12 @@ continue fi - db_get partman-crypto/passphrase-again || RET='' - if [ "$pass" != "$RET" ]; then + templ="partman-crypto/passphrase-again" + db_get $templ || RET='' + last_RET=$RET + db_set $templ "" + db_fset $templ seen false + if [ "$pass" != "$last_RET" ]; then templ="partman-crypto/passphrase-mismatch" db_fset $templ seen false db_input critical $templ @@ -67,14 +70,15 @@ if passphrase_is_weak "$pass"; then templ="partman-crypto/weak_passphrase" - db_set $templ false - db_fset $templ seen false db_subst $templ MINIMUM $minlen db_input critical $templ || true db_go || true db_get $templ || RET='' + last_RET=$RET + db_set $templ false + db_fset $templ seen false - if [ "$RET" != true ]; then + if [ "$last_RET" != true ]; then # user doesn't want to force weak passphrase continue fi @@ -83,9 +87,6 @@ pass_ok=1 done - db_set partman-crypto/passphrase "" - db_set partman-crypto/passphrase-again "" - if [ $pass_ok -eq 1 ]; then echo "$pass" fiAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 656710-close@bugs.debian.org
- Subject: Bug#656710: fixed in partman-crypto 77
- From: Cyril Brulebois <kibi@debian.org>
- Date: Fri, 24 Oct 2014 10:40:40 +0000
- Message-id: <E1XhcIS-0001Kb-Er@franck.debian.org>
Source: partman-crypto Source-Version: 77 We believe that the bug you reported is fixed in the latest version of partman-crypto, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 656710@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Cyril Brulebois <kibi@debian.org> (supplier of updated partman-crypto package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Fri, 24 Oct 2014 12:00:46 +0200 Source: partman-crypto Binary: partman-crypto partman-crypto-dm Architecture: source amd64 all Version: 77 Distribution: unstable Urgency: medium Maintainer: Debian Install System Team <debian-boot@lists.debian.org> Changed-By: Cyril Brulebois <kibi@debian.org> Description: partman-crypto - Add to partman support for block device encryption (udeb) partman-crypto-dm - Add to partman support for dm-crypt encryption (udeb) Closes: 656710 Changes: partman-crypto (77) unstable; urgency=medium . * Cherry-pick bzr r693 from Ubuntu (partman-crypto/40ubuntu2), thanks to Colin Watson: - Allow preseeding the first passphrase prompt (LP: #546405). (Preseeding passphrases for multiple different physical volumes is a whole different kettle of fish ...) * Cherry-pick bzr r695 from Ubuntu (partman-crypto/40ubuntu3), thanks to Colin Watson: - Allow preseeding partman-crypto/weak_passphrase too (LP: #546405). * Add a security note in debian/partman-crypto.templates, documenting the preseedability of the three extra items listed below, warning against possible eavesdropping, and suggesting a proper key escrow system (Closes: #656710): - partman-crypto/passphrase - partman-crypto/passphrase-again - partman-crypto/weak_passphrase Checksums-Sha1: 8e4021b5b258621795c51216c18e7795812c93c7 1804 partman-crypto_77.dsc af45584b44c5391deae268033fd96bb853261ab8 260932 partman-crypto_77.tar.xz 9d07f8c2d06ae281a4fbe80dbf560f6dd812ab0d 360244 partman-crypto_77_amd64.udeb 50e1012b4f5117184bc785ec92dfa6d04cb309cc 1372 partman-crypto-dm_77_all.udeb Checksums-Sha256: 8eef3ac7ccfc96937a9c1de9dc0954966b5658da56636c41a79b4986de241ae3 1804 partman-crypto_77.dsc 3395d805fbd6e3bb1a2492a7eb74a6d95f1b1c81d16bbc7165976c0e718ee66d 260932 partman-crypto_77.tar.xz 9c8fed61521904d370c269a926fd19e40437e43c3ab2bed69b500faee39621d0 360244 partman-crypto_77_amd64.udeb f1305ea8f961a5176598b673fabcac9e031b94910b84455c97682d4827df48e6 1372 partman-crypto-dm_77_all.udeb Files: fa54b6e4bfed88f5391a8ed2e12c5528 1804 debian-installer optional partman-crypto_77.dsc e8fbe9c6a1a3e191cae50fe347eab631 260932 debian-installer optional partman-crypto_77.tar.xz 8d8cbe0ba55441f70cb8d34db17de209 360244 debian-installer optional partman-crypto_77_amd64.udeb d8aea9550d561fbbecd5a4aefcf29390 1372 debian-installer optional partman-crypto-dm_77_all.udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJUSiWqAAoJEP+RSvDCs1UgodIP/iKus7EafkPqalRHwQvQKSnD 6AdGv/5sz/sJYbSUSmNhpJ0cfTDlW73c4pBzCjnXPYzNACAMdmd2nyXp43V04glv ca9PJAAwCBRUIEsVgQ6pB2e8uQhZDnqwy8Z4Mt9944gl0wCIfbUfciSFmP3+LHGY rZ1FMSg3ELTSIU8X0PSuVDH4UoVax+QxRmHikr63U1d6DgVgNAcL6wmxOtvsRk62 9k+3BWjknlzJ0Mv808wrsc/U5SW2KCLjKYFo2YkWEASuD3Ksmh8mG9TL9e793i7P r4XlMTKKDtV73UxmD+0ZAorxiZfHRnWXKk4nchS//vfgaD+FggyFWra/eq2Jtfbw yzcdrJvOStalxLsbzIGSkw5QP+n7hOzYRvhQBU0V2vtp46YobhbylQoYKCbVToef ZjmGeyjC2ucVjqOZswNkO+Fgyyq5aQWOQ/Tguv/5cSYDEknjaKVIyuQBgHHZroTU EGePdphrg1333IwtCOXxJRvEleVf4f5Y7xvpLO7FCNTgp0Wiv4rNuIOHU2kZ9aSV xpArG1NIzJHoeLM124fds1/++t7JRhHeZGP64zIeeQhfOCMfi5lx1EVKJC3M272+ LeH8uJm0Yg7eXCBVsCmpwll+98MnA5VGM1Oy02snLK7spmNwbtn9U+uzc0ivPGYJ UOBTdhpSHXrrI5FlZNSN =WPqt -----END PGP SIGNATURE-----
--- End Message ---