* [gentoo-user] Kernel upgrade and now LUKS failure.
@ 2010-05-03 16:56 Jason Dusek
2010-05-03 17:31 ` Florian Philipp
2010-05-04 10:06 ` Stefan G. Weichinger
0 siblings, 2 replies; 20+ messages in thread
From: Jason Dusek @ 2010-05-03 16:56 UTC (permalink / raw
To: gentoo-user
I have an encrypted block device, `/dev/sda2', which is
mounted as my root filesystem. I recently installed this
system -- I've been away from Gentoo for awhile -- and used
gentoo sources 2.6.31-r6. When the kernel upgrade rolled
around, to 2.6.32-r7, I installed and rebooted and then my
passphrase didn't work anymore. The error message:
Command failed: No key available with this passphrase.
However, rebooting with my old kernel works fine so I'm not
sure what the problem is. Could it be a different version of
`cryptsetup'? When the device can't be opened on boot, I have
the option to drop to a shell. I try to run `cryptsetup' and I
get the same error -- so maybe that's my problem? Would
different versions of `cryptsetup' be incompatible with
devices encrypted by older versions? That seems brittle and
dangerous to me.
--
Jason Dusek
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Kernel upgrade and now LUKS failure.
2010-05-03 16:56 [gentoo-user] Kernel upgrade and now LUKS failure Jason Dusek
@ 2010-05-03 17:31 ` Florian Philipp
2010-05-04 10:06 ` Stefan G. Weichinger
1 sibling, 0 replies; 20+ messages in thread
From: Florian Philipp @ 2010-05-03 17:31 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1353 bytes --]
Am 03.05.2010 18:56, schrieb Jason Dusek:
> I have an encrypted block device, `/dev/sda2', which is
> mounted as my root filesystem. I recently installed this
> system -- I've been away from Gentoo for awhile -- and used
> gentoo sources 2.6.31-r6. When the kernel upgrade rolled
> around, to 2.6.32-r7, I installed and rebooted and then my
> passphrase didn't work anymore. The error message:
>
> Command failed: No key available with this passphrase.
>
> However, rebooting with my old kernel works fine so I'm not
> sure what the problem is. Could it be a different version of
> `cryptsetup'? When the device can't be opened on boot, I have
> the option to drop to a shell. I try to run `cryptsetup' and I
> get the same error -- so maybe that's my problem? Would
> different versions of `cryptsetup' be incompatible with
> devices encrypted by older versions? That seems brittle and
> dangerous to me.
>
> --
> Jason Dusek
>
Some rough guesses to get you started:
1. Keyboard layout specific passphrase? Do you use a non-american
keyboard layout? Maybe it has not been loaded at the time you enter the
passphrase.
2. Check that all necessary components (hash algorithm, block cipher,
encryption algorithm) are compiled into the new kernel.
Hope this helps,
Florian Philipp
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Kernel upgrade and now LUKS failure.
2010-05-03 16:56 [gentoo-user] Kernel upgrade and now LUKS failure Jason Dusek
2010-05-03 17:31 ` Florian Philipp
@ 2010-05-04 10:06 ` Stefan G. Weichinger
2010-05-04 16:54 ` [gentoo-user] " walt
1 sibling, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-04 10:06 UTC (permalink / raw
To: gentoo-user
Am 03.05.2010 18:56, schrieb Jason Dusek:
> I have an encrypted block device, `/dev/sda2', which is
> mounted as my root filesystem. I recently installed this
> system -- I've been away from Gentoo for awhile -- and used
> gentoo sources 2.6.31-r6. When the kernel upgrade rolled
> around, to 2.6.32-r7, I installed and rebooted and then my
> passphrase didn't work anymore. The error message:
>
> Command failed: No key available with this passphrase.
I see something similar here.
Upgraded from tuxonice-sources-2.33-r1 to -r2 on my thinkpad.
I use an encrypted /home mounted by pam_mount, it reads the key from a
file so there is no keyboard involved.
When I login I don't get /home mounted.
/var/log/messages says:
pam_mount(mount.c): crypt_activate_by_passphrase: Operation not permitted
but with both kernels, -r1 and -r2
I now fiddle around with downgrading cryptsetup etc.
Any hints welcome, thanks.
Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-04 10:06 ` Stefan G. Weichinger
@ 2010-05-04 16:54 ` walt
2010-05-04 17:38 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: walt @ 2010-05-04 16:54 UTC (permalink / raw
To: gentoo-user
On 05/04/2010 03:06 AM, Stefan G. Weichinger wrote:
> I use an encrypted /home mounted by pam_mount, it reads the key from a
> file so there is no keyboard involved.
>
> When I login I don't get /home mounted.
>
> /var/log/messages says:
>
> pam_mount(mount.c): crypt_activate_by_passphrase: Operation not permitted
I don't have a pam_mount, where does it come from? Perhaps it needs a
reference to pam_ssh.so?
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-04 16:54 ` [gentoo-user] " walt
@ 2010-05-04 17:38 ` Stefan G. Weichinger
2010-05-04 19:28 ` Stefan G. Weichinger
2010-05-04 23:51 ` walt
0 siblings, 2 replies; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-04 17:38 UTC (permalink / raw
To: gentoo-user; +Cc: walt
Am 04.05.2010 18:54, schrieb walt:
>> pam_mount(mount.c): crypt_activate_by_passphrase: Operation not
>> permitted
>
> I don't have a pam_mount, where does it come from? Perhaps it needs
> a reference to pam_ssh.so?
What do you mean with "where does it come from?" ?
It's in portage ... for example
http://home.coming.dk/index.php/2009/05/20/encrypted_home_partition_using_luks_pam_
shows how to make use of it.
I am not sure which HOWTO I followed ... but it is the same approach.
What would the reference to pam_ssh.so look like?
Googling for "crypt_activate_by_passphrase" I found:
http://code.google.com/p/cryptsetup/issues/detail?id=58
which says:
"crypt_activate_by_passphrase is the new API"
Could it be the case that my current setup somehow uses "the new API"
which isn't available yet in some package?
I don't yet have the whole picture ...
Thanks, Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-04 17:38 ` Stefan G. Weichinger
@ 2010-05-04 19:28 ` Stefan G. Weichinger
2010-05-04 21:24 ` Daniel Troeder
2010-05-04 23:51 ` walt
1 sibling, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-04 19:28 UTC (permalink / raw
To: gentoo-user
Am 04.05.2010 19:38, schrieb Stefan G. Weichinger:
> I don't yet have the whole picture ...
I did some "emerge -avuDN world", quite some packages updated even
though I am doing "emerge -avu world" nearly every day ...
After a reboot and setting debug to 1 for pam_mount it says:
May 4 21:25:38 enzo slim: pam_mount(pam_mount.c:364): pam_mount 2.0:
entering auth stage
May 4 21:25:38 enzo slim: gkr-pam: invalid option: use_first_pass
May 4 21:25:38 enzo slim: pam_unix(slim:session): session opened for
user sgw by (uid=0)
May 4 21:25:38 enzo slim: pam_mount(pam_mount.c:552): pam_mount 2.0:
entering session stage
May 4 21:25:38 enzo slim: pam_mount(misc.c:38): Session open: (uid=0,
euid=0, gid=0, egid=0)
May 4 21:25:38 enzo slim: pam_mount(mount.c:196): Mount info:
globalconf, user=sgw <volume fstype="crypt" server="(null)"
path="/dev/mapper/VG01-crypthome" mountpoint="/home/sgw"
cipher="aes-cbc-plain" fskeypath="/etc/security/verysekrit.key"
fskeycipher="aes-256-cbc" fskeyhash="md5"
options="data=journal,commit=15" /> fstab=0
May 4 21:25:38 enzo slim: command: 'mount.crypt'
'-ocipher=aes-cbc-plain' '-ofsk_cipher=aes-256-cbc' '-ofsk_hash=md5'
'-okeyfile=/etc/security/verysekrit.key' '-odata=journal,commit=15'
'/dev/mapper/VG01-crypthome' '/home/sgw'
May 4 21:25:38 enzo slim: pam_mount(misc.c:38): set_myuid<pre>: (uid=0,
euid=0, gid=0, egid=0)
May 4 21:25:38 enzo slim: pam_mount(misc.c:38): set_myuid<post>:
(uid=0, euid=0, gid=0, egid=0)
May 4 21:25:40 enzo slim: pam_mount(mount.c:64): Errors from underlying
mount program:
May 4 21:25:40 enzo slim: pam_mount(mount.c:68):
crypt_activate_by_passphrase: Operation not permitted
May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:520): mount of
/dev/mapper/VG01-crypthome failed
May 4 21:25:40 enzo slim: command: 'pmvarrun' '-u' 'sgw' '-o' '1'
May 4 21:25:40 enzo slim: pam_mount(misc.c:38): set_myuid<pre>: (uid=0,
euid=0, gid=0, egid=0)
May 4 21:25:40 enzo slim: pam_mount(misc.c:38): set_myuid<post>:
(uid=0, euid=0, gid=0, egid=0)
May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:440): pmvarrun says
login count is 1
May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:642): done opening
session (ret=0)
May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:115): Clean global
config (0)
May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:132): clean system
authtok=0x80e6870 (0)
May 4 21:25:40 enzo seahorse-daemon[1426]: DNS-SD initialization
failed: Daemon not running
May 4 21:25:40 enzo seahorse-daemon[1426]: unsupported key server uri
scheme: ldap
May 4 21:25:40 enzo seahorse-daemon[1426]: init gpgme version 1.3.0
May 4 21:25:41 enzo pulseaudio[1475]: module-alsa-card.c: Failed to
find a working profile.
May 4 21:25:41 enzo pulseaudio[1475]: module.c: Failed to load module
"module-alsa-card" (argument: "device_id="5"
name="platform-thinkpad_acpi"
card_name="alsa_card.platform-thinkpad_acpi" tsched=yes ignore_dB=no
card_properties="module-udev-detect.discovered=1""): initialization failed.
May 4 21:25:41 enzo polkitd(authority=local): Registered Authentication
Agent for session /org/freedesktop/ConsoleKit/Session3 (system bus name
:1.49 [/usr/libexec/polkit-gnome-authentication-agent-1], object path
/org/gnome/PolicyKit1/AuthenticationAgent, locale de_DE.UTF-8)
----- (maybe I pasted too much, this was everything from typing my
username to the Gnome-session opened, but with the "wrong" /home for
user sgw)
Some bits of additional info:
# cat /etc/pam.d/system-auth
auth required pam_env.so
auth required pam_unix.so try_first_pass likeauth nullok
auth optional pam_mount.so
auth optional pam_gnome_keyring.so
account required pam_unix.so
password required pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2
retry=3
password optional pam_gnome_keyring.so
password required pam_unix.so try_first_pass use_authtok nullok sha512
shadow
session required pam_limits.so
session optional pam_gnome_keyring.so auto_start
session required pam_env.so
session required pam_unix.so
session optional pam_permit.so
session optional pam_mount.so
# cat /etc/security/pam_mount.conf.xml
<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE pam_mount SYSTEM "pam_mount.conf.xml.dtd">
<!--
See pam_mount.conf(5) for a description.
-->
<pam_mount>
<!-- debug should come before everything else,
since this file is still processed in a single pass
from top-to-bottom -->
<debug enable="0" />
<!-- Volume definitions -->
<!--
<volume user="username"
path="/dev/mmcblk0p1"
mountpoint="/mnt/mmc"
fstype="auto" />
-->
<volume user="sgw"
path="/dev/mapper/VG01-crypthome"
mountpoint="/home/sgw"
fstype="crypt"
options="data=journal,commit=15"
cipher="aes-cbc-plain"
fskeypath="/etc/security/verysekrit.key"
fskeycipher="aes-256-cbc"
fskeyhash="md5" />
<!-- pam_mount parameters: General tunables -->
<debug enable="1" />
<!--
<luserconf name=".pam_mount.conf.xml" />
-->
<!-- Note that commenting out mntoptions will give you the defaults.
You will need to explicitly initialize it with the empty string
to reset the defaults to nothing. -->
<mntoptions
allow="nosuid,nodev,loop,encryption,fsck,nonempty,allow_root,allow_other" />
<!--
<mntoptions deny="suid,dev" />
<mntoptions allow="*" />
<mntoptions deny="*" />
-->
<mntoptions require="nosuid,nodev" />
<path>/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin</path>
<logout wait="0" hup="0" term="0" kill="0" />
<!-- pam_mount parameters: Volume-related -->
<mkmountpoint enable="1" remove="true" />
</pam_mount>
--- I didn't change both files except for the debug-parameter ...
[root@enzo]:~ # eix pam_mount
[I] sys-auth/pam_mount
Available versions: (~)1.20 (~)1.21 (~)1.22 (~)1.24 (~)1.25
(~)1.25-r1 (~)1.26 (~)1.31 (~)1.32 (~)1.33 (~)2.0 {crypt}
Installed versions: 2.0(12:45:53 04.05.2010)(crypt)
Homepage: http://pam-mount.sourceforge.net
Description: A PAM module that can mount volumes for a user
session
[root@enzo]:~ # eix cryptset
[I] sys-fs/cryptsetup
Available versions: 0.1-r3 1.0.5-r1 1.0.6-r2 (~)1.0.7 (~)1.0.7-r1
(~)1.1.0 (~)1.1.1_rc1{tbz2} {dynamic nls selinux}
Installed versions: 1.1.1_rc1{tbz2}(13:04:41 04.05.2010)(nls
-dynamic -selinux)
Homepage: http://code.google.com/p/cryptsetup/
Description: Tool to setup encrypted devices with dm-crypt
Thanks for any hints, Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-04 19:28 ` Stefan G. Weichinger
@ 2010-05-04 21:24 ` Daniel Troeder
2010-05-05 4:42 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Daniel Troeder @ 2010-05-04 21:24 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 7603 bytes --]
On 05/04/2010 09:28 PM, Stefan G. Weichinger wrote:
> Am 04.05.2010 19:38, schrieb Stefan G. Weichinger:
>
>> I don't yet have the whole picture ...
>
> I did some "emerge -avuDN world", quite some packages updated even
> though I am doing "emerge -avu world" nearly every day ...
>
> After a reboot and setting debug to 1 for pam_mount it says:
>
> May 4 21:25:38 enzo slim: pam_mount(pam_mount.c:364): pam_mount 2.0:
> entering auth stage
> May 4 21:25:38 enzo slim: gkr-pam: invalid option: use_first_pass
> May 4 21:25:38 enzo slim: pam_unix(slim:session): session opened for
> user sgw by (uid=0)
> May 4 21:25:38 enzo slim: pam_mount(pam_mount.c:552): pam_mount 2.0:
> entering session stage
> May 4 21:25:38 enzo slim: pam_mount(misc.c:38): Session open: (uid=0,
> euid=0, gid=0, egid=0)
> May 4 21:25:38 enzo slim: pam_mount(mount.c:196): Mount info:
> globalconf, user=sgw <volume fstype="crypt" server="(null)"
> path="/dev/mapper/VG01-crypthome" mountpoint="/home/sgw"
> cipher="aes-cbc-plain" fskeypath="/etc/security/verysekrit.key"
> fskeycipher="aes-256-cbc" fskeyhash="md5"
> options="data=journal,commit=15" /> fstab=0
> May 4 21:25:38 enzo slim: command: 'mount.crypt'
> '-ocipher=aes-cbc-plain' '-ofsk_cipher=aes-256-cbc' '-ofsk_hash=md5'
> '-okeyfile=/etc/security/verysekrit.key' '-odata=journal,commit=15'
> '/dev/mapper/VG01-crypthome' '/home/sgw'
> May 4 21:25:38 enzo slim: pam_mount(misc.c:38): set_myuid<pre>: (uid=0,
> euid=0, gid=0, egid=0)
> May 4 21:25:38 enzo slim: pam_mount(misc.c:38): set_myuid<post>:
> (uid=0, euid=0, gid=0, egid=0)
> May 4 21:25:40 enzo slim: pam_mount(mount.c:64): Errors from underlying
> mount program:
> May 4 21:25:40 enzo slim: pam_mount(mount.c:68):
> crypt_activate_by_passphrase: Operation not permitted
> May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:520): mount of
> /dev/mapper/VG01-crypthome failed
> May 4 21:25:40 enzo slim: command: 'pmvarrun' '-u' 'sgw' '-o' '1'
> May 4 21:25:40 enzo slim: pam_mount(misc.c:38): set_myuid<pre>: (uid=0,
> euid=0, gid=0, egid=0)
> May 4 21:25:40 enzo slim: pam_mount(misc.c:38): set_myuid<post>:
> (uid=0, euid=0, gid=0, egid=0)
> May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:440): pmvarrun says
> login count is 1
> May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:642): done opening
> session (ret=0)
> May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:115): Clean global
> config (0)
> May 4 21:25:40 enzo slim: pam_mount(pam_mount.c:132): clean system
> authtok=0x80e6870 (0)
> May 4 21:25:40 enzo seahorse-daemon[1426]: DNS-SD initialization
> failed: Daemon not running
> May 4 21:25:40 enzo seahorse-daemon[1426]: unsupported key server uri
> scheme: ldap
> May 4 21:25:40 enzo seahorse-daemon[1426]: init gpgme version 1.3.0
> May 4 21:25:41 enzo pulseaudio[1475]: module-alsa-card.c: Failed to
> find a working profile.
> May 4 21:25:41 enzo pulseaudio[1475]: module.c: Failed to load module
> "module-alsa-card" (argument: "device_id="5"
> name="platform-thinkpad_acpi"
> card_name="alsa_card.platform-thinkpad_acpi" tsched=yes ignore_dB=no
> card_properties="module-udev-detect.discovered=1""): initialization failed.
> May 4 21:25:41 enzo polkitd(authority=local): Registered Authentication
> Agent for session /org/freedesktop/ConsoleKit/Session3 (system bus name
> :1.49 [/usr/libexec/polkit-gnome-authentication-agent-1], object path
> /org/gnome/PolicyKit1/AuthenticationAgent, locale de_DE.UTF-8)
>
>
> ----- (maybe I pasted too much, this was everything from typing my
> username to the Gnome-session opened, but with the "wrong" /home for
> user sgw)
>
> Some bits of additional info:
>
> # cat /etc/pam.d/system-auth
> auth required pam_env.so
> auth required pam_unix.so try_first_pass likeauth nullok
> auth optional pam_mount.so
> auth optional pam_gnome_keyring.so
>
> account required pam_unix.so
>
> password required pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2
> retry=3
> password optional pam_gnome_keyring.so
> password required pam_unix.so try_first_pass use_authtok nullok sha512
> shadow
> session required pam_limits.so
> session optional pam_gnome_keyring.so auto_start
> session required pam_env.so
> session required pam_unix.so
> session optional pam_permit.so
> session optional pam_mount.so
>
>
>
> # cat /etc/security/pam_mount.conf.xml
> <?xml version="1.0" encoding="utf-8" ?>
> <!DOCTYPE pam_mount SYSTEM "pam_mount.conf.xml.dtd">
> <!--
> See pam_mount.conf(5) for a description.
> -->
>
> <pam_mount>
>
> <!-- debug should come before everything else,
> since this file is still processed in a single pass
> from top-to-bottom -->
>
> <debug enable="0" />
>
>
> <!-- Volume definitions -->
>
> <!--
>
> <volume user="username"
> path="/dev/mmcblk0p1"
> mountpoint="/mnt/mmc"
> fstype="auto" />
>
> -->
>
> <volume user="sgw"
> path="/dev/mapper/VG01-crypthome"
> mountpoint="/home/sgw"
> fstype="crypt"
> options="data=journal,commit=15"
> cipher="aes-cbc-plain"
> fskeypath="/etc/security/verysekrit.key"
> fskeycipher="aes-256-cbc"
> fskeyhash="md5" />
>
> <!-- pam_mount parameters: General tunables -->
>
> <debug enable="1" />
> <!--
> <luserconf name=".pam_mount.conf.xml" />
> -->
>
> <!-- Note that commenting out mntoptions will give you the defaults.
> You will need to explicitly initialize it with the empty string
> to reset the defaults to nothing. -->
> <mntoptions
> allow="nosuid,nodev,loop,encryption,fsck,nonempty,allow_root,allow_other" />
> <!--
> <mntoptions deny="suid,dev" />
> <mntoptions allow="*" />
> <mntoptions deny="*" />
> -->
> <mntoptions require="nosuid,nodev" />
> <path>/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin</path>
>
> <logout wait="0" hup="0" term="0" kill="0" />
>
>
> <!-- pam_mount parameters: Volume-related -->
>
> <mkmountpoint enable="1" remove="true" />
>
>
> </pam_mount>
>
>
>
> --- I didn't change both files except for the debug-parameter ...
>
>
> [root@enzo]:~ # eix pam_mount
> [I] sys-auth/pam_mount
> Available versions: (~)1.20 (~)1.21 (~)1.22 (~)1.24 (~)1.25
> (~)1.25-r1 (~)1.26 (~)1.31 (~)1.32 (~)1.33 (~)2.0 {crypt}
> Installed versions: 2.0(12:45:53 04.05.2010)(crypt)
> Homepage: http://pam-mount.sourceforge.net
> Description: A PAM module that can mount volumes for a user
> session
>
> [root@enzo]:~ # eix cryptset
> [I] sys-fs/cryptsetup
> Available versions: 0.1-r3 1.0.5-r1 1.0.6-r2 (~)1.0.7 (~)1.0.7-r1
> (~)1.1.0 (~)1.1.1_rc1{tbz2} {dynamic nls selinux}
> Installed versions: 1.1.1_rc1{tbz2}(13:04:41 04.05.2010)(nls
> -dynamic -selinux)
> Homepage: http://code.google.com/p/cryptsetup/
> Description: Tool to setup encrypted devices with dm-crypt
>
>
> Thanks for any hints, Stefan
>
I'm using sys-fs/cryptsetup-1.1.1_rc1 since 02.05.2010 and didn't have
any issues.
Please decrypt your partition from the command line, so we can see if it
is a cryptsetup/luks/kernel problem or a pam_mount problem.
Cmdline should something like:
$ sudo cryptsetup -d /etc/security/verysekrit.key luksOpen
/dev/mapper/VG01-crypthome myhome
Which should create /dev/mapper/myhome.
Bye,
Daniel
--
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-04 17:38 ` Stefan G. Weichinger
2010-05-04 19:28 ` Stefan G. Weichinger
@ 2010-05-04 23:51 ` walt
1 sibling, 0 replies; 20+ messages in thread
From: walt @ 2010-05-04 23:51 UTC (permalink / raw
To: gentoo-user
On 05/04/2010 10:38 AM, Stefan G. Weichinger wrote:
> Am 04.05.2010 18:54, schrieb walt:
>
>>> pam_mount(mount.c): crypt_activate_by_passphrase: Operation not
>>> permitted
>>
>> I don't have a pam_mount, where does it come from? Perhaps it needs
>> a reference to pam_ssh.so?
>
> What do you mean with "where does it come from?" ?
>
> It's in portage ...
Okay, I'm assuming pam_mount.so and mount.crypt come from the sys-auth/
pam_mount package but I can't check because all of those packages are
masked by the ~x86 keyword at the moment.
> Could it be the case that my current setup somehow uses "the new API"
> which isn't available yet in some package?
>
> I don't yet have the whole picture ...
Daniel knows more than I do about this subject, so I recommend that you
follow his advice. However, all of the pam_mount packages being masked
at the same time makes me suspect that not everything is working exactly
as it should. I'll follow this thread, hoping to learn more.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-04 21:24 ` Daniel Troeder
@ 2010-05-05 4:42 ` Stefan G. Weichinger
2010-05-05 8:00 ` Daniel Troeder
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-05 4:42 UTC (permalink / raw
To: gentoo-user; +Cc: Daniel Troeder
Am 04.05.2010 23:24, schrieb Daniel Troeder:
> I'm using sys-fs/cryptsetup-1.1.1_rc1 since 02.05.2010 and didn't have
> any issues.
> Please decrypt your partition from the command line, so we can see if it
> is a cryptsetup/luks/kernel problem or a pam_mount problem.
>
> Cmdline should something like:
> $ sudo cryptsetup -d /etc/security/verysekrit.key luksOpen
> /dev/mapper/VG01-crypthome myhome
> Which should create /dev/mapper/myhome.
My user sgw is currently not allowed to sudo this (should it be? it
never was).
And for root it says "Kein Schlüssel mit diesem Passsatz verfügbar."
(german) which should be "No key available with this passphrase." in
english.
Thanks, Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-05 4:42 ` Stefan G. Weichinger
@ 2010-05-05 8:00 ` Daniel Troeder
2010-05-05 8:42 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Daniel Troeder @ 2010-05-05 8:00 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2244 bytes --]
On 05/05/2010 06:42 AM, Stefan G. Weichinger wrote:
> Am 04.05.2010 23:24, schrieb Daniel Troeder:
>
>> I'm using sys-fs/cryptsetup-1.1.1_rc1 since 02.05.2010 and didn't have
>> any issues.
>> Please decrypt your partition from the command line, so we can see if it
>> is a cryptsetup/luks/kernel problem or a pam_mount problem.
>>
>> Cmdline should something like:
>> $ sudo cryptsetup -d /etc/security/verysekrit.key luksOpen
>> /dev/mapper/VG01-crypthome myhome
>> Which should create /dev/mapper/myhome.
>
> My user sgw is currently not allowed to sudo this (should it be? it
> never was).
>
> And for root it says "Kein Schlüssel mit diesem Passsatz verfügbar."
> (german) which should be "No key available with this passphrase." in
> english.
That is a message from cryptsetup. As you are using openssl to get the
key, I think the problem might be there.
I followed the guide you linked here (website is down, but google-cache
works:
http://webcache.googleusercontent.com/search?q=cache:7eaSac72CoIJ:home.coming.dk/index.php/2009/05/20/encrypted_home_partition_using_luks_pam_+encrypted_home_partition_using_luks_pam&cd=2&hl=de&ct=clnk&gl=de&client=firefox-a)
and it works for me (kernel is 2.6.33-zen2):
lvcreate -n crypttest -L 100M vg0
KEY=`tr -cd [:graph:] < /dev/urandom | head -c 79`
echo $KEY | openssl aes-256-ecb > verysekrit.key
openssl aes-256-ecb -d -in verysekrit.key
# (aha :)
openssl aes-256-ecb -d -in verysekrit.key | cryptsetup -v --cipher
aes-cbc-plain --key-size 256 luksFormat /dev/vg0/crypttest
openssl aes-256-ecb -d -in verysekrit.key | cryptsetup luksOpen
/dev/vg0/crypttest decryptedtest
cryptsetup luksClose crypttest
# (i couldn't close it... don't know why...)
The key that cryptsetup is given to decrypt the partition is created by
openssl from the file. Please check the output of
$ openssl aes-256-ecb -d -in verysekrit.key
under both kernel - it should be identical.
BTW: You'll get your error message if you run:
$ echo notmykey | cryptsetup luksOpen /dev/vg0/crypttest decryptedtes
Bye,
Daniel
--
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-05 8:00 ` Daniel Troeder
@ 2010-05-05 8:42 ` Stefan G. Weichinger
2010-05-05 19:39 ` Daniel Troeder
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-05 8:42 UTC (permalink / raw
To: gentoo-user; +Cc: Daniel Troeder
Am 05.05.2010 10:00, schrieb Daniel Troeder:
> That is a message from cryptsetup. As you are using openssl to get
> the key, I think the problem might be there.
ok ....
> lvcreate -n crypttest -L 100M vg0 KEY=`tr -cd [:graph:] <
> /dev/urandom | head -c 79` echo $KEY | openssl aes-256-ecb >
> verysekrit.key openssl aes-256-ecb -d -in verysekrit.key # (aha :)
> openssl aes-256-ecb -d -in verysekrit.key | cryptsetup -v --cipher
> aes-cbc-plain --key-size 256 luksFormat /dev/vg0/crypttest openssl
> aes-256-ecb -d -in verysekrit.key | cryptsetup luksOpen
> /dev/vg0/crypttest decryptedtest cryptsetup luksClose crypttest # (i
> couldn't close it... don't know why...)
>
> The key that cryptsetup is given to decrypt the partition is created
> by openssl from the file. Please check the output of $ openssl
> aes-256-ecb -d -in verysekrit.key under both kernel - it should be
> identical.
At first, thank you for your time and work!
Tried that. I have to admit that I don't know the decryption password
... but as far as I understand it should be the same as the
unix-password of the user sgw. pam_mount.so should read it when I log
in, correct?
With this password I get a "bad decrypt" so this explains why it fails.
Please let me repeat/point out that it is the same for 3 kernels
(2.6.32-r1, 2.6.33-r[12] ... ), so I should change the subject to stay
correct ...
> BTW: You'll get your error message if you run: $ echo
> notmykey | cryptsetup luksOpen /dev/vg0/crypttest decryptedtes
Yes, correct.
-
I really wonder what the reason is ... should I downgrade openssl?
Thanks Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-05 8:42 ` Stefan G. Weichinger
@ 2010-05-05 19:39 ` Daniel Troeder
2010-05-05 20:17 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Daniel Troeder @ 2010-05-05 19:39 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2768 bytes --]
On 05/05/2010 10:42 AM, Stefan G. Weichinger wrote:
> Am 05.05.2010 10:00, schrieb Daniel Troeder:
>
>> That is a message from cryptsetup. As you are using openssl to get
>> the key, I think the problem might be there.
>
> ok ....
>
>> lvcreate -n crypttest -L 100M vg0 KEY=`tr -cd [:graph:] <
>> /dev/urandom | head -c 79` echo $KEY | openssl aes-256-ecb >
>> verysekrit.key openssl aes-256-ecb -d -in verysekrit.key # (aha :)
>> openssl aes-256-ecb -d -in verysekrit.key | cryptsetup -v --cipher
>> aes-cbc-plain --key-size 256 luksFormat /dev/vg0/crypttest
>> openssl aes-256-ecb -d -in verysekrit.key | cryptsetup luksOpen
>> /dev/vg0/crypttest decryptedtest cryptsetup luksClose crypttest #
>> (i couldn't close it... don't know why...)
>>
>> The key that cryptsetup is given to decrypt the partition is
>> created by openssl from the file. Please check the output of $
>> openssl aes-256-ecb -d -in verysekrit.key under both kernel - it
>> should be identical.
>
> At first, thank you for your time and work!
>
> Tried that. I have to admit that I don't know the decryption
> password ... but as far as I understand it should be the same as the
> unix-password of the user sgw. pam_mount.so should read it when I
> log in, correct?
Yes. Than pam_mount man page (http://linux.die.net/man/8/pam_mount) says so.
It's actually quite verbose on the topic.
> With this password I get a "bad decrypt" so this explains why it
> fails.
If you cannot decrypt your keyfile (with openssl) then you have just
lost any way to decrypt your partition!
But there is an idea in the man page of which I didn't think: did you
maybe change your users password? If so, you need to use the old pw to
decrypt the keyfile. If you can, then you can use the new pw to encrypt
the key again (make backups of the original file).
There is also the possibility your keyfile was corrupted somehow (file
system corruption?). Do you have a backup of the keyfile (and your data:)?
BTW: a LUKS encrypted partition can have 8 keys (in so called "key
slots"), so that you can add a "fallback key" the next time, which you
store at a trusted place.
Good luck,
Daniel
> Please let me repeat/point out that it is the same for 3 kernels
> (2.6.32-r1, 2.6.33-r[12] ... ), so I should change the subject to
> stay correct ...
>
>> BTW: You'll get your error message if you run: $ echo notmykey |
>> cryptsetup luksOpen /dev/vg0/crypttest decryptedtes
>
> Yes, correct.
>
> -
>
> I really wonder what the reason is ... should I downgrade openssl?
>
> Thanks Stefan
>
--
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-05 19:39 ` Daniel Troeder
@ 2010-05-05 20:17 ` Stefan G. Weichinger
2010-05-05 20:23 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-05 20:17 UTC (permalink / raw
To: gentoo-user
Am 05.05.2010 21:39, schrieb Daniel Troeder:
>> With this password I get a "bad decrypt" so this explains why it
>> fails.
> If you cannot decrypt your keyfile (with openssl) then you have just
> lost any way to decrypt your partition!
>
> But there is an idea in the man page of which I didn't think: did
> you maybe change your users password? If so, you need to use the old
> pw to decrypt the keyfile. If you can, then you can use the new pw to
> encrypt the key again (make backups of the original file).
user-pw not changed, no ...
> There is also the possibility your keyfile was corrupted somehow
> (file system corruption?). Do you have a backup of the keyfile (and
> your data:)?
Restored the key-file from tape, no diff, no success.
I have some images as backup, would have to look closer ...
> BTW: a LUKS encrypted partition can have 8 keys (in so called "key
> slots"), so that you can add a "fallback key" the next time, which
> you store at a trusted place.
I am pretty sure that I used several slots, yes.
-
Remember that I said: "I am not sure which HOWTO I followed" ?
What if I didn't use aes-256-ecb?
I will try some other ciphers .... ;-)
Oh my, I luv documentation :-)
S
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-05 20:17 ` Stefan G. Weichinger
@ 2010-05-05 20:23 ` Stefan G. Weichinger
2010-05-06 16:24 ` Daniel Troeder
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-05 20:23 UTC (permalink / raw
To: gentoo-user
Am 05.05.2010 22:17, schrieb Stefan G. Weichinger:
> Remember that I said: "I am not sure which HOWTO I followed" ?
>
> What if I didn't use aes-256-ecb?
Yep. See pam_mount.conf.xml:
It's "aes-256-cbc" in my case.
I was now able to luksOpen and I have the decrypted device mounted.
Nice.
So:
the user-pw didn't change and the keyfile is OK.
So why is pam_mount unable to mount it?
I will now pull another backup and check/add fallback keys ;-)
Thanks so far, regards, Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-05 20:23 ` Stefan G. Weichinger
@ 2010-05-06 16:24 ` Daniel Troeder
2010-05-06 18:38 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Daniel Troeder @ 2010-05-06 16:24 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1062 bytes --]
On 05/05/2010 10:23 PM, Stefan G. Weichinger wrote:
> Am 05.05.2010 22:17, schrieb Stefan G. Weichinger:
>
>> Remember that I said: "I am not sure which HOWTO I followed" ?
>>
>> What if I didn't use aes-256-ecb?
You don't need to supplay that information to cryptsetup, it can
(should) autodetect it. To see that info for yourself run:
$ cryptsetup luksDump /dev/mapper/VG01-crypthome
> Yep. See pam_mount.conf.xml:
> It's "aes-256-cbc" in my case.
>
> I was now able to luksOpen and I have the decrypted device mounted.
Hooray :)
> Nice.
>
> So:
>
> the user-pw didn't change and the keyfile is OK.
>
> So why is pam_mount unable to mount it?
>
> I will now pull another backup and check/add fallback keys ;-)
There are interesting options in the cryptsetup-man page:
luksHeaderBackup and luksHeaderRestore... I think I'll add that to my
backup scripts :)
Bye,
Daniel
--
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-06 16:24 ` Daniel Troeder
@ 2010-05-06 18:38 ` Stefan G. Weichinger
2010-05-07 8:53 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-06 18:38 UTC (permalink / raw
To: gentoo-user
Am 06.05.2010 18:24, schrieb Daniel Troeder:
> On 05/05/2010 10:23 PM, Stefan G. Weichinger wrote:
>> Am 05.05.2010 22:17, schrieb Stefan G. Weichinger:
>>
>>> Remember that I said: "I am not sure which HOWTO I followed" ?
>>>
>>> What if I didn't use aes-256-ecb?
> You don't need to supplay that information to cryptsetup, it can
> (should) autodetect it. To see that info for yourself run:
> $ cryptsetup luksDump /dev/mapper/VG01-crypthome
But I always did when I followed your example.
Anyway, this part is solved now.
>> Yep. See pam_mount.conf.xml:
>> It's "aes-256-cbc" in my case.
>>
>> I was now able to luksOpen and I have the decrypted device mounted.
> Hooray :)
Yes :-)
Currently I run an unencrypted home on another LV.
>> Nice.
>>
>> So:
>>
>> the user-pw didn't change and the keyfile is OK.
>>
>> So why is pam_mount unable to mount it?
>>
>> I will now pull another backup and check/add fallback keys ;-)
> There are interesting options in the cryptsetup-man page:
> luksHeaderBackup and luksHeaderRestore... I think I'll add that to my
> backup scripts :)
Good idea.
The main question is still unanswered: Why does pam_mount not work
anymore with the given device/key ?
Should I file a bug?
S
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-06 18:38 ` Stefan G. Weichinger
@ 2010-05-07 8:53 ` Stefan G. Weichinger
2010-05-07 14:24 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-07 8:53 UTC (permalink / raw
To: gentoo-user; +Cc: Daniel Troeder
Am 06.05.2010 20:38, schrieb Stefan G. Weichinger:
> The main question is still unanswered: Why does pam_mount not work
> anymore with the given device/key ?
additional digging:
I found http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528366
where the poster tries the underlying mount.crypt call.
I did that as well and get:
# mount.crypt -v -o
fsk_cipher=aes-256-cbc,fsk_hash=md5,keyfile=/etc/security/verysekrit.key
/dev/VG01/crypthome /mnt/gschwind
command: 'readlink' '-fn' '/dev/VG01/crypthome'
command: 'readlink' '-fn' '/mnt/gschwind'
Password:
mount.crypt(crypto-dmc.c:144): Using _dev_dm_0 as dmdevice name
crypt_activate_by_passphrase: Operation not permitted
which is in fact the error pam_mount throws up :
pam_mount(mount.c:64): Errors from underlying mount program:
pam_mount(mount.c:68): crypt_activate_by_passphrase: Operation not permitted
Downgrade pam_mount from 2.1 to 2.0 ... same error.
But it works with pam_mount 1.33 !
I don't know which old bugs I reintroduce to my system by doing this ;-)
I think I am gonna file a bug for this now.
Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-07 8:53 ` Stefan G. Weichinger
@ 2010-05-07 14:24 ` Stefan G. Weichinger
2010-05-07 21:14 ` Stefan G. Weichinger
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-07 14:24 UTC (permalink / raw
To: gentoo-user; +Cc: Daniel Troeder
Am 07.05.2010 10:53, schrieb Stefan G. Weichinger:
> I think I am gonna file a bug for this now.
http://bugs.gentoo.org/show_bug.cgi?id=318865
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-07 14:24 ` Stefan G. Weichinger
@ 2010-05-07 21:14 ` Stefan G. Weichinger
2010-05-10 16:48 ` Daniel Troeder
0 siblings, 1 reply; 20+ messages in thread
From: Stefan G. Weichinger @ 2010-05-07 21:14 UTC (permalink / raw
To: gentoo-user
Am 07.05.2010 16:24, schrieb Stefan G. Weichinger:
> Am 07.05.2010 10:53, schrieb Stefan G. Weichinger:
>
>> I think I am gonna file a bug for this now.
>
> http://bugs.gentoo.org/show_bug.cgi?id=318865
Aside from the potential bug:
As I store the "verysekrit.key" on the same hdd as the encrypted device
and use the rather simple shadowed password to decrypt that key ...
isn't that just plain stupid?
The overall security is just as good as my password.
Cracking it with john opens the key to decrypting the LUKS-volume ...
Yes, if I would store the key on another volume (stick or something) as
mentioned in that howto it would make sense but in my case ...
*scratches head* ;-)
Stefan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
2010-05-07 21:14 ` Stefan G. Weichinger
@ 2010-05-10 16:48 ` Daniel Troeder
0 siblings, 0 replies; 20+ messages in thread
From: Daniel Troeder @ 2010-05-10 16:48 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1884 bytes --]
On 05/07/2010 11:14 PM, Stefan G. Weichinger wrote:
> Am 07.05.2010 16:24, schrieb Stefan G. Weichinger:
>> Am 07.05.2010 10:53, schrieb Stefan G. Weichinger:
>>
>>> I think I am gonna file a bug for this now.
>>
>> http://bugs.gentoo.org/show_bug.cgi?id=318865
>
> Aside from the potential bug:
>
> As I store the "verysekrit.key" on the same hdd as the encrypted
> device and use the rather simple shadowed password to decrypt that
> key ... isn't that just plain stupid?
>
> The overall security is just as good as my password. Cracking it with
> john opens the key to decrypting the LUKS-volume ...
>
> Yes, if I would store the key on another volume (stick or something)
> as mentioned in that howto it would make sense but in my case ...
>
> *scratches head* ;-)
>
> Stefan
I prefer to encrypt my entire harddisk. Well - a hugh partition (excl.
only Windows and Solaris :) which I encrypt, then the decrypted
partition is used as a PV for LVM and all OS and partitions an in LVs.
This way I have to type in the password to decrypt the PV once, and all
LVs are decrypted. Then I have to use a second PW to login of course. As
all Linux destros support encrypted roots and LVM nowadays I have
Gentoo, Fedora and Ubuntu all in the same VG. The speed disadvantage is
small, as my CPU+RAM is so much faster than the HDD. But in terms of
security it's better to have everything encrypted, because it makes it
more difficult to manipulate your system to get the key (the kernel is
still unencrypted), and no possibly private information can be obtained
from /tmp and /var. I compile all needed modules into the kernel, so I
don't need to recreate my initrd for every new kernel.
Bye,
Daniel
--
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
end of thread, other threads:[~2010-05-10 16:49 UTC | newest]
Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-05-03 16:56 [gentoo-user] Kernel upgrade and now LUKS failure Jason Dusek
2010-05-03 17:31 ` Florian Philipp
2010-05-04 10:06 ` Stefan G. Weichinger
2010-05-04 16:54 ` [gentoo-user] " walt
2010-05-04 17:38 ` Stefan G. Weichinger
2010-05-04 19:28 ` Stefan G. Weichinger
2010-05-04 21:24 ` Daniel Troeder
2010-05-05 4:42 ` Stefan G. Weichinger
2010-05-05 8:00 ` Daniel Troeder
2010-05-05 8:42 ` Stefan G. Weichinger
2010-05-05 19:39 ` Daniel Troeder
2010-05-05 20:17 ` Stefan G. Weichinger
2010-05-05 20:23 ` Stefan G. Weichinger
2010-05-06 16:24 ` Daniel Troeder
2010-05-06 18:38 ` Stefan G. Weichinger
2010-05-07 8:53 ` Stefan G. Weichinger
2010-05-07 14:24 ` Stefan G. Weichinger
2010-05-07 21:14 ` Stefan G. Weichinger
2010-05-10 16:48 ` Daniel Troeder
2010-05-04 23:51 ` walt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox