ecryptfs team mailing list archive
-
ecryptfs team
-
Mailing list archive
-
Message #01173
[Bug 402748] Re: improve subsequent login and screen unlock times
** Also affects: ecryptfs-utils (Ubuntu)
Importance: Undecided
Status: New
** Changed in: ecryptfs
Status: Triaged => Fix Committed
** Changed in: ecryptfs-utils (Ubuntu)
Status: New => Fix Committed
** Changed in: ecryptfs-utils (Ubuntu)
Importance: Undecided => Medium
** Changed in: ecryptfs-utils (Ubuntu)
Assignee: (unassigned) => Dustin Kirkland (kirkland)
--
improve subsequent login and screen unlock times
https://bugs.launchpad.net/bugs/402748
You received this bug notification because you are a member of eCryptfs,
which is subscribed to ecryptfs-utils in ubuntu.
Status in eCryptfs - Enterprise Cryptographic Filesystem: Fix Committed
Status in “ecryptfs-utils” package in Ubuntu: Fix Committed
Bug description:
Every time pam_ecryptfs is called by the PAM stack, it will use the entered password, decrypt the wrapped-passphrase, key-strengthen that, load the results into the keyring, and then mount the user's private directory.
If the user's home (or private) directory is already mounted, this is a tremendous waste of time/effort.
We should short-circuit this process if possible.
Note that the counter aspect of this is going to be tricky...
:-Dustin