[Bug 179894] Re: passwd, pam_mount, and LUKS/dm_crypt need better integration

Steve Langasek steve.langasek at canonical.com
Sun Jun 12 20:38:46 UTC 2011


To fix this bug, some package would need to provide a PAM module to
integrate with this keystore and rekey when the password changes.  I
don't think pam itself is an appropriate place for this; it should be
maintained somewhere more closely tied to the implementation of the
keystore in question - either cryptsetup, or in some standalone package
that provides this integration.

Reassigning to cryptsetup for the moment.

** Package changed: pam (Ubuntu) => cryptsetup (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to cryptsetup in Ubuntu.
https://bugs.launchpad.net/bugs/179894

Title:
  passwd, pam_mount, and LUKS/dm_crypt need better integration

Status in “cryptsetup” package in Ubuntu:
  New

Bug description:
  Wishlist item.  If separate LUKS/dm_crypt volumes are being used for
  each user's home directory they can be auto-mounted at login using
  pam_mount by supplying a key file encrypted by the login password via
  openssl that contains the LUKS/dm_crypt key and specifying it in
  pam_mount.conf.  But there is no mechanism for re-encrypting the key
  file when the user changes their password resulting in them being left
  in the empty home mount directory on their next login.  While auto-
  mounting an encrypted volume via a generally weak login password
  reduces it's effectiveness, this can be mitigated somewhat by storing
  the keys somewhere like /etc/keys/dm_crypt with 700 permissions and
  root ownership, increasing the default minimum password length to
  something >6 characters, and using an encrypted root volume.  This
  setup is important for easing security implementation on laptops.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/179894/+subscriptions




More information about the foundations-bugs mailing list