ecryptfs-setup-private should protect users from overwriting an existing setup

Bug #258388 reported by Dustin Kirkland 
2
Affects Status Importance Assigned to Milestone
ecryptfs-utils (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: ecryptfs-utils

ecryptfs-setup-private will generate a new ~/.ecryptfs/wrapped-passphrase and ~/.ecryptfs/Private.sig.

It will back up any previous copies of these two files, for good measure, such that an advance user could recover the key.

However, when we detect a pre-existing wrapped-passphrase or Private.sig file, we should exit out with an informative error.

This exit condition should be bypass-able by a --force option.

:-Dustin

Revision history for this message
Dustin Kirkland  (kirkland) wrote :

Patch attached. Please sponsor.

:-Dustin

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package ecryptfs-utils - 53-1ubuntu4

---------------
ecryptfs-utils (53-1ubuntu4) intrepid; urgency=low

  * debian/patches/00list: add 20-ecryptfs-setup-private-force.dpatch.
  * debian/patches/20-ecryptfs-setup-private-force.dpatch: error out if a
    pre-existing ecryptfs setup is found, allow for a --force override,
  * (LP: #258388).

 -- Dustin Kirkland <email address hidden> Fri, 15 Aug 2008 13:54:03 -0500

Changed in ecryptfs-utils:
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.