[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#928956: Document removal of ecryptfs-utils from Buster



Daniel Lange wrote:
>>   * reason for removal
>>     not essential, but it helps to understand the issue
> #765854
> ecryptfs cannot unmount encrypted home directories due to systemd keeping
> the pam session active even after logout.
> Upstream bug https://github.com/systemd/systemd/issues/8598
> A work around (user unit file) has not been implemented and tested.
> 
>>   * what would be the alternative(s) available in buster
> there is none

Does Debian really not provide any alternative mechanisms for
filesystem encryption that users could switch over to?  A quick "apt
search" suggests that they could try encfs...

>>   * is there a (documented) migration path
> there is none

Sounds as if someone needs to write one, then.
 
> People with ecryptfs should not upgrade to Buster or enable and pin sid
> repositories where ecryptfs-utils, libecryptfs1 and friends are still
> available and continue to work (including the unmount bug linked above).

Is the problem a result of changes in ecryptfs-utils, PAM, systemd, or
what?  Would upgrading systemd etc to Buster but keeping the Stretch
version of ecryptfs-utils installed be a better or worse option than
installing the Sid version?

> CC'd jak (original bug submitter) and gcs (maintainer) in case they can add
> something. May be we can get the user unit file approach tested and if
> working into a point release and/or backports?
-- 
JBR	with qualifications in linguistics, experience as a Debian
	sysadmin, and probably no clue about this particular package


Reply to: