Activity log for bug #1447282

Date Who What changed Old value New value Message
2015-04-22 18:13:03 Jason Gerard DeRose bug added bug
2015-04-22 18:13:03 Jason Gerard DeRose attachment added IMG_7979_01.jpg https://bugs.launchpad.net/bugs/1447282/+attachment/4381692/+files/IMG_7979_01.jpg
2015-04-22 18:23:59 Jason Gerard DeRose summary Prompted for cryptoswap passphrase when using GPT partitioning + encrypted home directory (ecrptfs) Prompted for cryptoswap passphrase when using GPT partitioning + encrypted home directory (ecryptfs)
2015-04-22 19:12:39 Nobuto Murata bug added subscriber Nobuto Murata
2015-04-23 21:30:37 Jason Gerard DeRose attachment added generator.late.tgz https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1447282/+attachment/4382428/+files/generator.late.tgz
2015-04-23 21:31:12 Jason Gerard DeRose attachment added generator.tgz https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1447282/+attachment/4382430/+files/generator.tgz
2015-04-24 08:58:53 Martin Pitt nominated for series Ubuntu Vivid
2015-04-24 08:58:53 Martin Pitt bug task added systemd (Ubuntu Vivid)
2015-04-24 08:59:08 Martin Pitt systemd (Ubuntu Vivid): importance Undecided High
2015-04-24 08:59:08 Martin Pitt systemd (Ubuntu Vivid): status New In Progress
2015-04-24 08:59:08 Martin Pitt systemd (Ubuntu Vivid): assignee Martin Pitt (pitti)
2015-04-24 08:59:46 Martin Pitt summary Prompted for cryptoswap passphrase when using GPT partitioning + encrypted home directory (ecryptfs) Does not use encrypted swap when using GPT partitioning + encrypted home directory (ecryptfs)
2015-04-24 09:08:13 Martin Pitt affects systemd (Ubuntu Vivid) ecryptfs-utils (Ubuntu Vivid)
2015-04-24 11:02:34 Martin Pitt bug task added ecryptfs-utils
2015-04-24 11:12:57 Martin Pitt description I'm still sorting out the details and eliminating variables, but as far as I can tell: Steps to reproduce =============== 1) Install Ubuntu using GPT partitioning for the OS drive[*] 2) Choose "require my password to login", and check "encrypt my home directory" Expected behavior =============== No special user interaction should be required to initialized the crytposwap other than normally logging in Actual behavior ============ Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo). When lightdm comes up, you have to enter your password/passphrase again to login. Work-arounds =========== 1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can 2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related Notes ===== * As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB. ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: systemd 219-7ubuntu3 ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3 Uname: Linux 3.19.0-15-generic x86_64 ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 CurrentDesktop: Unity Date: Wed Apr 22 11:40:29 2015 EcryptfsInUse: Yes MachineType: System76, Inc. Kudu Professional ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7 SourcePackage: systemd UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 01/15/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1.03.03RS76 dmi.board.asset.tag: Tag 12345 dmi.board.name: Kudu Professional dmi.board.vendor: System76, Inc. dmi.board.version: kudp1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: kudp1 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1: dmi.product.name: Kudu Professional dmi.product.version: kudp1 dmi.sys.vendor: System76, Inc. I'm still sorting out the details and eliminating variables, but as far as I can tell: Steps to reproduce =============== 1) Install Ubuntu using GPT partitioning for the OS drive[*] 2) Choose "require my password to login", and check "encrypt my home directory" Expected behavior =============== No special user interaction should be required to initialized the crytposwap other than normally logging in Actual behavior ============ Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo). When lightdm comes up, you have to enter your password/passphrase again to login. Work-arounds =========== 1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can 2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related Notes ===== * As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB. SRU INFORMATION ================ Regression potential: This is delicate as we need to fix existing installations with a post-install script. This needs to happen as defensively as possible, but errors in this can still potentially completely break your partition information. Apart from testing that in the above scenario the unencrypted swap partition is marked as "no-auto" and thus after a new boot you are actually using the cryptswap1 one, we also need to verify that it does not destroy working systems. Test case: (1) Install an EFI system with "encrypt my home directory" (You can do this in QEMU with -bios OVMF.fd); after booting the first time you will be asked to enter a passprase for the swap partition, just press enter. "sudo swapon -s" will say something like /dev/sda3, i. e. using unencrypted swap. After installing this update and rebooting, the bogus passphrase prompt on boot should be gone, and "sudo swapon -s" should say /dev/dm-0, i. e. using encrypted swap. In all these other cases the update should not do anything and booting continues to work: (2) In the above system, "sudo apt-get install --reinstall ecryptfs-utils" should not change partitions again, but say something like "is already marked as no-auto". (3) Install an EFI system without home dir encryption (4) Install an MBR system with home dir encryption (5) Install an MBR system without home dir encryption ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: systemd 219-7ubuntu3 ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3 Uname: Linux 3.19.0-15-generic x86_64 ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 CurrentDesktop: Unity Date: Wed Apr 22 11:40:29 2015 EcryptfsInUse: Yes MachineType: System76, Inc. Kudu Professional ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7 SourcePackage: systemd UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 01/15/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1.03.03RS76 dmi.board.asset.tag: Tag 12345 dmi.board.name: Kudu Professional dmi.board.vendor: System76, Inc. dmi.board.version: kudp1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: kudp1 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1: dmi.product.name: Kudu Professional dmi.product.version: kudp1 dmi.sys.vendor: System76, Inc.
2015-04-24 13:01:38 Martin Pitt attachment added vivid debdiff https://bugs.launchpad.net/ecryptfs-utils/+bug/1447282/+attachment/4382977/+files/ecryptfs.debdiff
2015-04-24 16:19:59 Ubuntu Foundations Team Bug Bot tags amd64 apport-bug ecryptfs systemd-boot vivid amd64 apport-bug ecryptfs patch systemd-boot vivid
2015-04-26 19:00:05 Gaele Strootman bug added subscriber Gaele Strootman
2015-04-28 05:18:06 Martin Pitt attachment added vivid debdiff https://bugs.launchpad.net/ecryptfs-utils/+bug/1447282/+attachment/4386259/+files/ecryptfs-utils_107-0ubuntu1_107-0ubuntu1.1.diff
2015-04-28 05:18:15 Martin Pitt attachment removed vivid debdiff https://bugs.launchpad.net/ecryptfs-utils/+bug/1447282/+attachment/4382977/+files/ecryptfs.debdiff
2015-04-28 14:23:35 Martin Pitt ecryptfs-utils (Ubuntu Vivid): status In Progress Fix Committed
2015-04-29 14:01:44 Chris J Arges bug added subscriber Ubuntu Stable Release Updates Team
2015-04-29 14:01:49 Chris J Arges bug added subscriber SRU Verification
2015-04-29 14:01:53 Chris J Arges tags amd64 apport-bug ecryptfs patch systemd-boot vivid amd64 apport-bug ecryptfs patch systemd-boot verification-needed vivid
2015-04-29 19:20:37 Jason Gerard DeRose attachment added Screenshot from 2015-04-29 13_05_13.png https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282/+attachment/4387774/+files/Screenshot%20from%202015-04-29%2013_05_13.png
2015-04-29 20:39:42 Jason Gerard DeRose tags amd64 apport-bug ecryptfs patch systemd-boot verification-needed vivid amd64 apport-bug ecryptfs patch systemd-boot verification-done vivid
2015-04-30 06:07:26 Denny bug added subscriber Denny Klessens
2015-05-03 15:10:13 junomedia bug added subscriber dapmk
2015-05-04 10:42:56 Sebastian bug added subscriber Sebastian
2015-05-04 17:51:28 Steve Langasek tags amd64 apport-bug ecryptfs patch systemd-boot verification-done vivid amd64 apport-bug ecryptfs patch systemd-boot verification-failed vivid
2015-05-04 17:51:35 Steve Langasek bug added subscriber Steve Langasek
2015-05-05 05:14:36 Martin Pitt tags amd64 apport-bug ecryptfs patch systemd-boot verification-failed vivid amd64 apport-bug ecryptfs patch systemd-boot verification-done vivid
2015-05-05 07:20:02 Alistair Grant bug added subscriber Alistair Grant
2015-05-06 14:45:48 Allen McBride bug added subscriber Allen McBride
2015-05-06 18:04:58 Launchpad Janitor ecryptfs-utils (Ubuntu Vivid): status Fix Committed Fix Released
2015-05-06 18:05:03 Scott Kitterman removed subscriber Ubuntu Stable Release Updates Team
2015-05-07 13:46:15 Launchpad Janitor ecryptfs-utils (Ubuntu): status Fix Committed Fix Released
2015-05-08 05:30:29 JunYang Pink attachment added error-msg.png https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282/+attachment/4393368/+files/error-msg.png
2015-05-17 19:25:53 Xavier Guillot bug added subscriber Xavier Guillot
2015-05-22 20:23:59 David Bonner bug task added systemd (Ubuntu)
2015-05-23 07:31:07 Launchpad Janitor systemd (Ubuntu): status New Confirmed
2015-05-23 07:31:07 Launchpad Janitor systemd (Ubuntu Vivid): status New Confirmed
2015-05-23 14:28:09 Martin Pitt bug task deleted systemd (Ubuntu Vivid)
2015-05-23 14:28:11 Martin Pitt bug task deleted systemd (Ubuntu)
2015-05-24 14:23:49 Launchpad Janitor branch linked lp:ubuntu/ecryptfs-utils
2015-05-26 17:07:28 Bruno Munoz bug added subscriber Bruno Munoz
2015-05-26 17:21:55 Bruno Munoz removed subscriber Bruno Munoz
2015-06-08 14:17:22 Erik Zimmerman bug added subscriber Erik Zimmerman
2015-06-18 12:17:31 Tilman Keskinöz bug added subscriber Tilman Keskinöz
2015-07-23 08:37:30 Martin Beukman bug added subscriber Martin Beukman
2015-08-03 08:19:40 Sven Behrend bug added subscriber Sven Behrend
2015-08-04 15:51:30 Dustin Kirkland  ecryptfs-utils: importance Undecided High
2015-08-04 17:59:51 Dustin Kirkland  affects ecryptfs-utils ecryptfs
2015-08-04 17:59:51 Dustin Kirkland  ecryptfs: status New Confirmed
2015-08-04 18:00:10 Dustin Kirkland  ecryptfs: status Confirmed Fix Committed
2015-08-04 18:00:14 Dustin Kirkland  ecryptfs: assignee Dustin Kirkland  (kirkland)
2015-12-04 14:58:24 Stefan Hamcke bug added subscriber Stefan Hamcke
2016-03-29 23:09:34 Dirk Thomas bug added subscriber Dirk Thomas
2016-03-30 21:57:02 david6 bug added subscriber david6
2016-04-23 07:33:54 Martin Pitt nominated for series Ubuntu Yakkety
2016-04-23 07:33:54 Martin Pitt bug task added ecryptfs-utils (Ubuntu Yakkety)
2016-04-23 07:33:54 Martin Pitt nominated for series Ubuntu Xenial
2016-04-23 07:33:54 Martin Pitt bug task added ecryptfs-utils (Ubuntu Xenial)
2016-04-23 07:34:07 Martin Pitt ecryptfs-utils (Ubuntu Yakkety): status Fix Released In Progress
2016-04-23 07:34:14 Martin Pitt ecryptfs-utils (Ubuntu Xenial): status New In Progress
2016-04-24 08:24:17 Tony Baines bug added subscriber Tony Baines
2016-05-01 07:59:55 grosso bug added subscriber grosso
2016-05-02 17:00:43 Mathew Hodson ecryptfs-utils (Ubuntu Xenial): importance Undecided High
2016-05-12 12:19:27 Martin Pitt ecryptfs-utils (Ubuntu Xenial): status In Progress Triaged
2016-05-12 12:19:29 Martin Pitt ecryptfs-utils (Ubuntu Yakkety): status In Progress Triaged
2016-06-19 11:43:58 Donald Pellegrino bug added subscriber Donald Pellegrino
2016-07-01 20:22:04 Chris Rainey bug added subscriber Chris Rainey
2016-07-04 12:46:27 Rocko bug added subscriber Rocko
2016-07-08 21:32:48 Launchpad Janitor branch linked lp:~tyhicks/ecryptfs/lp1597154-packaging
2016-07-13 05:03:41 Launchpad Janitor branch linked lp:ecryptfs
2016-07-14 10:06:06 Martin Pitt ecryptfs-utils (Ubuntu Yakkety): assignee Martin Pitt (pitti) Tyler Hicks (tyhicks)
2016-07-14 14:52:59 Launchpad Janitor ecryptfs-utils (Ubuntu Xenial): status Triaged Fix Released
2016-07-14 14:56:38 Tyler Hicks description I'm still sorting out the details and eliminating variables, but as far as I can tell: Steps to reproduce =============== 1) Install Ubuntu using GPT partitioning for the OS drive[*] 2) Choose "require my password to login", and check "encrypt my home directory" Expected behavior =============== No special user interaction should be required to initialized the crytposwap other than normally logging in Actual behavior ============ Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo). When lightdm comes up, you have to enter your password/passphrase again to login. Work-arounds =========== 1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can 2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related Notes ===== * As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB. SRU INFORMATION ================ Regression potential: This is delicate as we need to fix existing installations with a post-install script. This needs to happen as defensively as possible, but errors in this can still potentially completely break your partition information. Apart from testing that in the above scenario the unencrypted swap partition is marked as "no-auto" and thus after a new boot you are actually using the cryptswap1 one, we also need to verify that it does not destroy working systems. Test case: (1) Install an EFI system with "encrypt my home directory" (You can do this in QEMU with -bios OVMF.fd); after booting the first time you will be asked to enter a passprase for the swap partition, just press enter. "sudo swapon -s" will say something like /dev/sda3, i. e. using unencrypted swap. After installing this update and rebooting, the bogus passphrase prompt on boot should be gone, and "sudo swapon -s" should say /dev/dm-0, i. e. using encrypted swap. In all these other cases the update should not do anything and booting continues to work: (2) In the above system, "sudo apt-get install --reinstall ecryptfs-utils" should not change partitions again, but say something like "is already marked as no-auto". (3) Install an EFI system without home dir encryption (4) Install an MBR system with home dir encryption (5) Install an MBR system without home dir encryption ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: systemd 219-7ubuntu3 ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3 Uname: Linux 3.19.0-15-generic x86_64 ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 CurrentDesktop: Unity Date: Wed Apr 22 11:40:29 2015 EcryptfsInUse: Yes MachineType: System76, Inc. Kudu Professional ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7 SourcePackage: systemd UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 01/15/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1.03.03RS76 dmi.board.asset.tag: Tag 12345 dmi.board.name: Kudu Professional dmi.board.vendor: System76, Inc. dmi.board.version: kudp1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: kudp1 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1: dmi.product.name: Kudu Professional dmi.product.version: kudp1 dmi.sys.vendor: System76, Inc. CVE Request: http://openwall.com/lists/oss-security/2016/07/13/2 I'm still sorting out the details and eliminating variables, but as far as I can tell: Steps to reproduce =============== 1) Install Ubuntu using GPT partitioning for the OS drive[*] 2) Choose "require my password to login", and check "encrypt my home directory" Expected behavior =============== No special user interaction should be required to initialized the crytposwap other than normally logging in Actual behavior ============ Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo). When lightdm comes up, you have to enter your password/passphrase again to login. Work-arounds =========== 1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can 2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related Notes ===== * As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB. SRU INFORMATION ================ Regression potential: This is delicate as we need to fix existing installations with a post-install script. This needs to happen as defensively as possible, but errors in this can still potentially completely break your partition information. Apart from testing that in the above scenario the unencrypted swap partition is marked as "no-auto" and thus after a new boot you are actually using the cryptswap1 one, we also need to verify that it does not destroy working systems. Test case: (1) Install an EFI system with "encrypt my home directory" (You can do this in QEMU with -bios OVMF.fd); after booting the first time you will be asked to enter a passprase for the swap partition, just press enter. "sudo swapon -s" will say something like /dev/sda3, i. e. using unencrypted swap. After installing this update and rebooting, the bogus passphrase prompt on boot should be gone, and "sudo swapon -s" should say /dev/dm-0, i. e. using encrypted swap. In all these other cases the update should not do anything and booting continues to work: (2) In the above system, "sudo apt-get install --reinstall ecryptfs-utils" should not change partitions again, but say something like "is already marked as no-auto". (3) Install an EFI system without home dir encryption (4) Install an MBR system with home dir encryption (5) Install an MBR system without home dir encryption ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: systemd 219-7ubuntu3 ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3 Uname: Linux 3.19.0-15-generic x86_64 ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 CurrentDesktop: Unity Date: Wed Apr 22 11:40:29 2015 EcryptfsInUse: Yes MachineType: System76, Inc. Kudu Professional ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7 SourcePackage: systemd UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 01/15/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1.03.03RS76 dmi.board.asset.tag: Tag 12345 dmi.board.name: Kudu Professional dmi.board.vendor: System76, Inc. dmi.board.version: kudp1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: kudp1 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1: dmi.product.name: Kudu Professional dmi.product.version: kudp1 dmi.sys.vendor: System76, Inc.
2016-07-15 01:59:31 Launchpad Janitor ecryptfs-utils (Ubuntu Yakkety): status Triaged Fix Released
2016-07-15 01:59:31 Launchpad Janitor cve linked 2016-6224
2016-08-06 02:14:20 Micheal Hill bug added subscriber Micheal Hill
2016-10-29 05:44:15 wolf bug added subscriber wolf
2016-11-18 16:54:39 Béné bug added subscriber Béné
2017-01-17 23:38:21 Check bug added subscriber Check
2017-05-01 17:16:16 Michael bug added subscriber Michael