[Bug 1520652] [NEW] Erroneous "INSECURE OWNER FOR xxxxx.keyfile"
TJ
ubuntu at iam.tj
Fri Nov 27 17:00:32 UTC 2015
Public bug reported:
$ ll -n
-r-------- 1 0 0 4096 Sep 1 23:57 xxxxxxxx.keyfile
/lib/cryptsetup/cryptdisks.functions::check_key() checks ownership based
on the name/group alias, not the actual UID/GID, and therefore breaks if
"root" != UID/GID 0.
+ /usr/sbin/cryptdisks_start LUKS_HDD_BOOT
* Starting crypto disk... * LUKS_HDD_BOOT: INSECURE OWNER FOR xxxxxxxx.keyfile, see /usr/share/doc/cryptsetup/README.Debian.
* LUKS_HDD_BOOT: INSECURE OWNER GROUP FOR xxxxxxxx.keyfile, see /usr/share/doc/cryptsetup/README.Debian.
* LUKS_HDD_BOOT (skipped, device /dev/disk/by-uuid/160fa39a-1205-4ad5-be44-9c2c943fb113 does not exist)... [fail]
+ read DM_NAME DEVICE KEYFILE OPTIONS
+ exit 0
The script should not be relying on parsing 'ls' output either. The attached patch fixes both issues.
** Affects: cryptsetup (Ubuntu)
Importance: Undecided
Status: Triaged
** Patch added: "Use UID/GIDs not text aliases; use 'stat' no 'ls | sed'"
https://bugs.launchpad.net/bugs/1520652/+attachment/4526366/+files/cryptdisk-use-UID-use-stat.patch
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to cryptsetup in Ubuntu.
https://bugs.launchpad.net/bugs/1520652
Title:
Erroneous "INSECURE OWNER FOR xxxxx.keyfile"
Status in cryptsetup package in Ubuntu:
Triaged
Bug description:
$ ll -n
-r-------- 1 0 0 4096 Sep 1 23:57 xxxxxxxx.keyfile
/lib/cryptsetup/cryptdisks.functions::check_key() checks ownership
based on the name/group alias, not the actual UID/GID, and therefore
breaks if "root" != UID/GID 0.
+ /usr/sbin/cryptdisks_start LUKS_HDD_BOOT
* Starting crypto disk... * LUKS_HDD_BOOT: INSECURE OWNER FOR xxxxxxxx.keyfile, see /usr/share/doc/cryptsetup/README.Debian.
* LUKS_HDD_BOOT: INSECURE OWNER GROUP FOR xxxxxxxx.keyfile, see /usr/share/doc/cryptsetup/README.Debian.
* LUKS_HDD_BOOT (skipped, device /dev/disk/by-uuid/160fa39a-1205-4ad5-be44-9c2c943fb113 does not exist)... [fail]
+ read DM_NAME DEVICE KEYFILE OPTIONS
+ exit 0
The script should not be relying on parsing 'ls' output either. The attached patch fixes both issues.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1520652/+subscriptions
More information about the foundations-bugs
mailing list