Your message dated Fri, 24 Oct 2014 10:40:40 +0000
with message-id <e1xhcis-0001kb...@franck.debian.org>
and subject line Bug#656710: fixed in partman-crypto 77
has caused the Debian Bug report #656710,
regarding partman-crypto: Preseeding the passphrase
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
656710: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656710
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: partman-crypto
Version: 49
Severity: wishlist
Tags: d-i patch

The passphrase should be preseedable for unattended installations. This
is possible in the Ubuntu-version of this package since at least the end
of March 2010 (40ubuntu2). The attached patch is an independent
implementation of the same functionality.

Thoughts on security:
The preseeded passphrase should be considered insecure, depending on the
source of the preseed file. But if the administrator ensures that the
user changes the passphrase after the first login, this should still be
secure enough (Maybe put a note about security into the preseed template
file?).

Currently tested on
http://ftp.debian.org/debian/dists/squeeze/main/installer-i386/current/images/netboot/mini.iso
.

-- System Information:
Debian Release: 6.0.3
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-486
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
-- 
Olaf Mandel   <o...@mandel.name>   <http://www.olaf.mandel.name/>
PGP key:      1024D/33398848 2002-09-19
Fingerprint:  0E33 BEA6 1A71 9C5E 62BD  FC0E 99A7 D2C6 3339 8848

--- partman-crypto-49/blockdev-keygen.orig	2012-01-20 20:11:31.603528151 +0100
+++ partman-crypto-49/blockdev-keygen	2012-01-20 20:33:55.293528151 +0100
@@ -31,25 +31,24 @@
 }
 
 get_passphrase () {
-	local pass_ok
+	local templ last_RET pass pass_ok
 
 	pass_ok=0
 	while [ $pass_ok -eq 0 ]; do
 		templ="partman-crypto/passphrase"
-		db_set $templ ""
-		db_fset $templ seen false
 		db_subst $templ DEVICE "$description"
 		db_input critical $templ
 
 		templ="partman-crypto/passphrase-again"
-		db_set $templ ""
-		db_fset $templ seen false
 		db_input critical $templ
 
 		db_go || return 1
 
-		db_get partman-crypto/passphrase || RET=''
+		templ="partman-crypto/passphrase"
+		db_get $templ || RET=''
 		pass=$RET
+		db_set $templ ""
+		db_fset $templ seen false
 		if [ -z "$pass" ]; then
 			templ="partman-crypto/passphrase-empty"
 			db_fset $templ seen false
@@ -57,8 +56,12 @@
 			continue
 		fi
 
-		db_get partman-crypto/passphrase-again || RET=''
-		if [ "$pass" != "$RET" ]; then
+		templ="partman-crypto/passphrase-again"
+		db_get $templ || RET=''
+		last_RET=$RET
+		db_set $templ ""
+		db_fset $templ seen false
+		if [ "$pass" != "$last_RET" ]; then
 			templ="partman-crypto/passphrase-mismatch"
 			db_fset $templ seen false
 			db_input critical $templ
@@ -67,14 +70,15 @@
 
 		if passphrase_is_weak "$pass"; then
 			templ="partman-crypto/weak_passphrase"
-			db_set $templ false
-			db_fset $templ seen false
 			db_subst $templ MINIMUM $minlen
 			db_input critical $templ || true
 			db_go || true
 			db_get $templ || RET=''
+			last_RET=$RET
+			db_set $templ false
+			db_fset $templ seen false
 
-			if [ "$RET" != true ]; then
+			if [ "$last_RET" != true ]; then
 				# user doesn't want to force weak passphrase
 				continue
 			fi
@@ -83,9 +87,6 @@
 		pass_ok=1
 	done
 
-	db_set partman-crypto/passphrase ""
-	db_set partman-crypto/passphrase-again ""
-
 	if [ $pass_ok -eq 1 ]; then
 		echo "$pass"
 	fi

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: partman-crypto
Source-Version: 77

We believe that the bug you reported is fixed in the latest version of
partman-crypto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 656...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cyril Brulebois <k...@debian.org> (supplier of updated partman-crypto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 24 Oct 2014 12:00:46 +0200
Source: partman-crypto
Binary: partman-crypto partman-crypto-dm
Architecture: source amd64 all
Version: 77
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team <debian-boot@lists.debian.org>
Changed-By: Cyril Brulebois <k...@debian.org>
Description:
 partman-crypto - Add to partman support for block device encryption (udeb)
 partman-crypto-dm - Add to partman support for dm-crypt encryption (udeb)
Closes: 656710
Changes:
 partman-crypto (77) unstable; urgency=medium
 .
   * Cherry-pick bzr r693 from Ubuntu (partman-crypto/40ubuntu2), thanks
     to Colin Watson:
     - Allow preseeding the first passphrase prompt (LP: #546405).
       (Preseeding passphrases for multiple different physical volumes is
       a whole different kettle of fish ...)
   * Cherry-pick bzr r695 from Ubuntu (partman-crypto/40ubuntu3), thanks
     to Colin Watson:
     - Allow preseeding partman-crypto/weak_passphrase too (LP: #546405).
   * Add a security note in debian/partman-crypto.templates, documenting
     the preseedability of the three extra items listed below, warning
     against possible eavesdropping, and suggesting a proper key escrow
     system (Closes: #656710):
     - partman-crypto/passphrase
     - partman-crypto/passphrase-again
     - partman-crypto/weak_passphrase
Checksums-Sha1:
 8e4021b5b258621795c51216c18e7795812c93c7 1804 partman-crypto_77.dsc
 af45584b44c5391deae268033fd96bb853261ab8 260932 partman-crypto_77.tar.xz
 9d07f8c2d06ae281a4fbe80dbf560f6dd812ab0d 360244 partman-crypto_77_amd64.udeb
 50e1012b4f5117184bc785ec92dfa6d04cb309cc 1372 partman-crypto-dm_77_all.udeb
Checksums-Sha256:
 8eef3ac7ccfc96937a9c1de9dc0954966b5658da56636c41a79b4986de241ae3 1804 
partman-crypto_77.dsc
 3395d805fbd6e3bb1a2492a7eb74a6d95f1b1c81d16bbc7165976c0e718ee66d 260932 
partman-crypto_77.tar.xz
 9c8fed61521904d370c269a926fd19e40437e43c3ab2bed69b500faee39621d0 360244 
partman-crypto_77_amd64.udeb
 f1305ea8f961a5176598b673fabcac9e031b94910b84455c97682d4827df48e6 1372 
partman-crypto-dm_77_all.udeb
Files:
 fa54b6e4bfed88f5391a8ed2e12c5528 1804 debian-installer optional 
partman-crypto_77.dsc
 e8fbe9c6a1a3e191cae50fe347eab631 260932 debian-installer optional 
partman-crypto_77.tar.xz
 8d8cbe0ba55441f70cb8d34db17de209 360244 debian-installer optional 
partman-crypto_77_amd64.udeb
 d8aea9550d561fbbecd5a4aefcf29390 1372 debian-installer optional 
partman-crypto-dm_77_all.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=WPqt
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to