[pkg-cryptsetup-devel] Bug#560811: cryptsetup: USB-key with keyfile on it should be automatically unmounted after use
Hans-J. Ullrich
hans.ullrich at loop.de
Sat Dec 12 12:47:35 UTC 2009
Package: cryptsetup
Severity: wishlist
-- Package-specific info:
-- /proc/cmdline
root=/dev/sda6 ro vga=791
-- /etc/crypttab
# <target name> <source device> <key file> <options>
home /dev/sda7 /media/sdc1/key luks
usr /dev/sda8 /media/sdc1/key luks
var /dev/sda9 /media/sdc1/key luks
home /dev/sda7 none luks,retry=1,cipher=aes-lrw-benbi:sha256
usr /dev/sda8 none luks,retry=1,cipher=aes-lrw-benbi:sha256
var /dev/sda9 none luks,retry=1,cipher=aes-lrw-benbi:sha256
-- /etc/fstab
# /etc/fstab: static file system information.
#
# <file system> <mount point> <type> <options> <dump> <pass>
proc /proc proc defaults 0 0
/dev/sda3 /boot ext2 defaults 0 1
/dev/sda5 none swap sw 0 0
/dev/sda6 / ext3 defaults,errors=remount-ro 0 1
/dev/sda2 /winxp auto user,rw,noauto 0 1
/dev/mapper/home /home ext3 defaults,errors=remount-ro 0 2
/dev/mapper/usr /usr ext3 defaults,errors=remount-ro 0 2
/dev/mapper/var /var ext3 defaults,errors=remount-ro 0 2
/dev/cdrom /media/cdrom0 udf,iso9660 user,ro,noauto 0 0
none /proc/bus/usb usbfs auto,devmode=0666 0 0
/dev/disk/by-label/UIT-KEY1 /media/sdc1 vfat uid=0,gid=0,umask=277 0 0
# /dev/sdb1 /space ext3 user,rw,noauto 0 2
# /dev/sdb2 /mnt/daten ntfs user,rw,noauto 0 2
# /dev/mmcblk0p1 /media/disk auto user,rw,noauto 0 2
# /dev/sda10 /home/ullhan63/XPL9 auto ullhan63,rw,noauto 0 0
# 192.168.1.10:/home/ullhan63 /home/ullhan63 nfs user,rw,noauto
-- lsmod
Module Size Used by
ppdev 7720 0
lp 11492 0
parport 41200 2 ppdev,lp
sco 12196 2
bridge 56176 0
stp 3060 1 bridge
bnep 14720 2
rfcomm 40224 1
l2cap 23184 4 bnep,rfcomm
bluetooth 62500 6 sco,bnep,rfcomm,l2cap
autofs4 28264 1
vboxnetflt 14736 0
vboxnetadp 6736 0
cpufreq_conservative 8624 0
cpufreq_stats 5092 0
kvm_amd 40724 0
kvm 178968 1 kvm_amd
irtty_sir 6224 0
sir_dev 14376 1 irtty_sir
irda 133076 1 sir_dev
crc_ccitt 2432 1 irda
uinput 9600 1
fuse 67952 1
ext2 68912 1
acerhk 28960 0
vboxvideo 3008 0
drm 191568 1 vboxvideo
nvidia 9618424 40
vboxdrv 1777020 2 vboxnetflt,vboxnetadp
usbnet 20664 0
mii 6144 1 usbnet
cpufreq_userspace 3908 0
cpufreq_powersave 1952 0
powernow_k8 14436 1
loop 17372 0
lrw 4224 3
gf128mul 9504 1 lrw
nls_utf8 2224 1
nls_cp437 7136 1
vfat 11376 1
fat 53896 1 vfat
snd_hda_codec_realtek 271908 1
snd_hda_intel 29128 1
snd_hda_codec 83920 2 snd_hda_codec_realtek,snd_hda_intel
snd_hwdep 9288 1 snd_hda_codec
snd_pcm_oss 40832 0
snd_mixer_oss 16528 1 snd_pcm_oss
joydev 11872 0
snd_pcm 89240 3 snd_hda_intel,snd_hda_codec,snd_pcm_oss
snd_seq_midi 7536 0
arc4 2256 2
ecb 3520 2
snd_rawmidi 25424 1 snd_seq_midi
snd_seq_midi_event 8752 1 snd_seq_midi
snd_seq 58416 3 snd_seq_midi,snd_seq_midi_event
snd_timer 23888 2 snd_pcm,snd_seq
ath5k 126760 0
snd_seq_device 8324 3 snd_seq_midi,snd_rawmidi,snd_seq
mac80211 156592 1 ath5k
snd 71576 14 snd_hda_codec_realtek,snd_hda_intel,snd_hda_codec,snd_hwdep,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_rawmidi,snd_seq,snd_timer,snd_seq_device
uvcvideo 61180 0
soundcore 8816 1 snd
snd_page_alloc 10720 2 snd_hda_intel,snd_pcm
ath 10032 1 ath5k
videodev 39120 1 uvcvideo
i2c_nforce2 8168 0
v4l1_compat 14420 2 uvcvideo,videodev
v4l2_compat_ioctl32 10064 1 videodev
k8temp 5424 0
cfg80211 98216 3 ath5k,mac80211,ath
acer_wmi 18040 0
serio_raw 6564 0
amd64_edac_mod 23488 0
rfkill 23480 3 bluetooth,cfg80211,acer_wmi
i2c_core 26736 4 drm,nvidia,videodev,i2c_nforce2
wmi 8144 1 acer_wmi
edac_core 50444 1 amd64_edac_mod
pcspkr 3280 0
evdev 11504 25
psmouse 46156 0
processor 43100 1 powernow_k8
battery 8288 0
button 7072 0
ac 4128 0
ext3 133280 4
jbd 53448 1 ext3
mbcache 9524 2 ext2,ext3
usb_storage 64608 1
sd_mod 37544 9
crc_t10dif 2208 1 sd_mod
ide_cd_mod 30312 0
cdrom 36200 1 ide_cd_mod
ide_pci_generic 5156 0
usbhid 41120 0
hid 43744 1 usbhid
ata_generic 6132 0
ahci 40464 6
libata 190940 2 ata_generic,ahci
firewire_ohci 24580 0
amd74xx 7208 0
firewire_core 54280 1 firewire_ohci
crc_itu_t 2432 1 firewire_core
ide_core 117472 3 ide_cd_mod,ide_pci_generic,amd74xx
ohci_hcd 24620 0
ehci_hcd 37392 0
scsi_mod 172992 3 usb_storage,sd_mod,libata
forcedeth 57340 0
thermal 17376 0
fan 5768 0
thermal_sys 17936 3 processor,thermal,fan
sdricoh_cs 6644 0
pcmcia 30072 1 sdricoh_cs
pcmcia_core 41364 1 pcmcia
sdhci_pci 9056 0
sdhci 19364 1 sdhci_pci
led_class 5528 3 ath5k,acer_wmi,sdhci
ricoh_mmc 4592 0
mmc_block 12184 0
mmc_core 62512 3 sdricoh_cs,sdhci,mmc_block
sha256_generic 9808 0
dm_crypt 14536 3
dm_mod 78120 7 dm_crypt
aes_x86_64 9232 3
aes_generic 28128 1 aes_x86_64
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: x86_64
Kernel: Linux 2.6.31-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE at euro, LC_CTYPE=de_DE at euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
Dear maintainers,
I am using an usb-stick with a keyfile on it, which is mounted at boot as
/dev/usb/MYUSBLABEL. You guess right: I am using LUKS.
However, everything is working well. But I suggest, to change the files in
/etc/init.d/ , that after the keyfile is read from the usb-stick and the encrypted partitions are
opened, the usb-stick should be unmounted automatically (as there is no further use for
/ it). Of course, I can do it manually after bootup, but it will be nicer,
/ if it is done automatically.
What do you think, can that be managed? If there is already another way
doing this, and I missed it, it would be nice, if you could point me to it.
Thank you very much!
Best regards
Hans-J. Ullrich
More information about the pkg-cryptsetup-devel
mailing list