Full Disc Encryption and Root Password Don't Work

Bug #1068301 reported by IWantFroyo
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubiquity (Ubuntu)
New
Undecided
Unassigned

Bug Description

When being prompted for password after installing with full disc encryption, password is invalid. Root and user passwords are invalid as well. Replicatable: I installed twice. Once with full disc encryption, and once without. The first time I couldn't boot up (password invalid error), second time I couldn't log in (same thing). "su" on guest account (which I am using now) also results in invalid password.

I tried multiple times, and I am sure I wasn't typing my password wrong.

Also, when I installed the second time, I wasn't asked for a password to unencrypt the discs, and the installation went successfully. (security issue?)

ProblemType: Bug
DistroRelease: Ubuntu 12.10
Package: linux-image-3.5.0-17-generic 3.5.0-17.28
ProcVersionSignature: Ubuntu 3.5.0-17.28-generic 3.5.5
Uname: Linux 3.5.0-17-generic x86_64
ApportVersion: 2.6.1-0ubuntu3
Architecture: amd64
AudioDevicesInUse:
 Cannot open /proc/net/unix: Permission denied
                      USER PID ACCESS COMMAND
 /dev/snd/controlC1: guest-YIlcXV 2074 F.... pulseaudio
 /dev/snd/controlC0: guest-YIlcXV 2074 F.... pulseaudio
CurrentDmesg: Error: command ['sh', '-c', 'dmesg | comm -13 --nocheck-order /var/log/dmesg -'] failed with exit code 1: comm: /var/log/dmesg: Permission denied
Date: Thu Oct 18 15:37:52 2012
InstallationMedia: Ubuntu 12.10 "Quantal Quetzal" - Release amd64 (20121017.5)
MachineType: TOSHIBA Satellite T235D
ProcEnviron:
 TERM=xterm
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=<set>
 LANG=en_US.UTF-8
 SHELL=/bin/bash
ProcFB: 0 radeondrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.5.0-17-generic root=UUID=6ec59d2e-c2ae-4f41-bf51-662769ed1d3f ro quiet splash vt.handoff=7
RfKill:
 0: phy0: Wireless LAN
  Soft blocked: no
  Hard blocked: no
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
WifiSyslog:

dmi.bios.date: 03/10/2011
dmi.bios.vendor: TOSHIBA
dmi.bios.version: 1.70
dmi.board.asset.tag: NULL
dmi.board.name: NDU11
dmi.board.vendor: TOSHIBA
dmi.board.version: 1.00
dmi.chassis.asset.tag: *
dmi.chassis.type: 10
dmi.chassis.vendor: TOSHIBA
dmi.chassis.version: N/A
dmi.modalias: dmi:bvnTOSHIBA:bvr1.70:bd03/10/2011:svnTOSHIBA:pnSatelliteT235D:pvrPST4LU-006009:rvnTOSHIBA:rnNDU11:rvr1.00:cvnTOSHIBA:ct10:cvrN/A:
dmi.product.name: Satellite T235D
dmi.product.version: PST4LU-006009
dmi.sys.vendor: TOSHIBA

Revision history for this message
IWantFroyo (iwantfroyo) wrote :
Revision history for this message
Marc Deslauriers (mdeslaur) wrote : Bug is not a security issue

Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.

affects: linux (Ubuntu) → ubiquity (Ubuntu)
information type: Private Security → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.