I sort-of agree with everyone here...
a) I have a 100% raid server running karmic (without cryptswap). I don't trust 
automated tools on this system and always verify that /etc/fstab points to the 
correct swap md partition after any significant change and before I reboot.
b) I have a laptop with hardy, jaunty and karmic installed. The swap partitions 
for hardy and jaunty are defined in fstab by uuid, so they cannot destroy the 
wrong partiton. The karmic fstab points swap to /dev/mapper/cryptswap1 and 
/etc/crypttab points to /dev/sda10.... DANGER WILL ROBINSON!

I don't think this implementation is satisfactory for "ordinary" users.
Why doesn't an existing encrypted swap partition have an externally
visible uuid? That would solve the "ordinary" user issue (I shudder to
think of the pain this "bug" is going to cause if it left as-is) in an
analogous fashion to the non-encrypted swap case. After all, some of my
partitions have a uuid wrapper for the md superblock, then a uuid
wrapper for an lvm physical volume, then one for an lvm lovical volume
which holds an ext3 file system that holds the user data.

Is it possible - I don't know enough to know how to do it.

-- 
Extremely dangerous! cryptswap killed my partition
https://bugs.launchpad.net/bugs/474258
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to