It's been a little while, apologies for that, but we've just released ecryptfs-utils-97!
I'm really excited about this eCryptfs release, as it includes contributions from 9 different individuals employed by 4 different open source companies. A big thanks to all contributors!
- Kees Cook (Google)
- Andreas Raster
- George Wilson (IBM)
- Sergio Pena (Gazzang)
- Colin King (Canonical)
- Colin Watson (Canonical)
- Serge Hallyn (Canonical)
- Dustin Kirkland (Gazzang)
- Tyler Hicks (Canonical)
The full changelog is below. As usual, please file any new issues in Launchpad.
:-Dustin
ecryptfs-utils (97) quantal; urgency=low
[ Kees Cook ]
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #938326
- exit, rather than return to prevent duplicate processes
[ Andreas Raster ]
* src/desktop/ecryptfs-find:
- $mounts was quoted once too often
[ George Wilson ]
* src/key_mod/ecryptfs_key_mod_openssl.c,
src/key_mod/ecryptfs_key_mod_pkcs11_helper.c,
src/key_mod/ecryptfs_key_mod_tspi.c: LP: #937331
- IBM would like to grant a license exception for key modules that
require linking to OpenSSL. The change should make the modules
shippable by Linux distributions
[ Dustin Kirkland ]
* debian/copyright:
- note the GPLv2 SSL exception granted by IBM for the key modules
* debian/control, debian/copyright, doc/manpage/ecryptfs.7,
doc/manpage/ecryptfs-add-passphrase.1, doc/manpage/ecryptfsd.8,
doc/manpage/ecryptfs-generate-tpm-key.1, doc/manpage/ecryptfs-
insert-wrapped-passphrase-into-keyring.1, doc/manpage/ecryptfs-
manager.8, doc/manpage/ecryptfs-mount-private.1,
doc/manpage/ecryptfs-recover-private.1, doc/manpage/ecryptfs-rewrap-
passphrase.1, doc/manpage/ecryptfs-rewrite-file.1,
doc/manpage/ecryptfs-setup-private.1, doc/manpage/ecryptfs-setup-
swap.1, doc/manpage/ecryptfs-stat.1, doc/manpage/ecryptfs-umount-
private.1, doc/manpage/ecryptfs-unwrap-passphrase.1,
doc/manpage/ecryptfs-wrap-passphrase.1,
doc/manpage/mount.ecryptfs.8, doc/manpage/mount.ecryptfs_private.1,
doc/manpage/pam_ecryptfs.8, doc/manpage/umount.ecryptfs.8,
doc/manpage/umount.ecryptfs_private.1, README,
src/utils/mount.ecryptfs.c:
- use the new ecryptfs.org website where appropriate
* debian/control:
- update to suggest zescrow-client
[ Sergio Peña ]
* src/libecryptfs/cipher_list.c: LP: #922821
- add the new name of the blowfish cipher (linux >= 3.2)
* src/include/ecryptfs.h, src/libecryptfs/main.c,
src/utils/mount.ecryptfs.c: LP: #917509
- use execl() to mount ecryptfs
- this allows us to support any arbitrary mount options in
/etc/fstab
[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
- Remove the note saying that the passphrase and openssl key modules are
available by default. That's true upstream but not always true in distro
builds.
* tests/run_tests.sh:
- Make upper and lower mount point arguments optional by automatically
creating directories in /tmp by default.
- Make it possible to run only userspace tests without having to specify
unused mount information
- Accept a comma-separated list of lower filesystems to test on and loop
through all kernel tests for each lower filesystem
- Accept a comma-separated list of tests to run
* tests/lib/etl_funcs.sh:
- Unset $ETL_DISK just before etl_remove_disk() successfully returns
* tests/userspace/Makefile.am:
- Also build 'make check' tests when building with --enable-tests
* include/ecryptfs.h, libecryptfs/Makefile.am,
libecryptfs/cipher_list.c, libecryptfs/module_mgr.c,
utils/io.h: LP: #994813
- remove overly complicated implementation to detect what ciphers
are supported by the currently running kernel's crypto api
- prompt for the entire supported cipher list, if the user selects a
cipher that their kernel doesn't support, the mount will fail
and the kernel will write an error message to the syslog
* src/libecryptfs/module_mgr.c:
- Use correct blowfish block size when displaying supported ciphers to
the user
* tests/kernel/lp-1009207.sh, tests/kernel/Makefile.am,
tests/kernel/tests.rc:
- Add simple test case for incorrect handling of umask and default POSIX
ACL masks
* tests/kernel/lp-994247.sh, tests/kernel/lp-994247/test.c,
tests/kernel/Makefile.am, tests/kernel/tests.rc:
- Add test case for incorrect handling of open /dev/ecryptfs file
descriptors that are passed or inherited by other processes
[ Colin King ]
* tests/lib/etl_funcs.sh:
- etl_lumount() should use DST rather than SRC dir so it can run on Lucid
- use file system appropriate mkfs force flag
- cater for correct ext2 default mount flags
* tests/kernel/lp-509180.sh, tests/kernel/lp-509180/test.c:
- test for trailing garbage at end of files
* tests/kernel/lp-524919.sh, tests/kernel/lp-524919/test.c:
- test case for checking lstat/readlink size
* tests/kernel/lp-870326.sh, tests/kernel/lp-870326/test.c:
- test case for open(), mmap(), close(), modify mmap'd region
* tests/kernel/lp-469664.sh:
- test case for lsattr
* tests/kernel/lp-613873.sh:
- test case for stat modify time
* tests/kernel/lp-745836.sh:
- test case for clearing ECRYPTFS_NEW_FILE flag during truncate
* tests/lib/etl_funcs.sh, tests/kernel/extend-file-random.sh,
tests/kernel/trunc-file.sh (LP: #1007159):
- Add test library function for estimating available space in lower fs
- Use new library function in tests that need to create large files
[ Colin Watson ]
* src/utils/ecryptfs-setup-swap: Skip /dev/zram* swap devices
LP: #979350
[ Serge Hallyn ]
* src/utils/mount.ecryptfs_private.c:
- EoL fixes
-- Dustin Kirkland Fri, 15 Jun 2012 09:32:48 -0500

No comments:
Post a Comment
Please do not use blog comments for support requests! Blog comments do not scale well to this effect.
Instead, please use Launchpad for Bugs and StackExchange for Questions.
* bugs.launchpad.net
* stackexchange.com
Thanks,
:-Dustin