-
Notifications
You must be signed in to change notification settings - Fork 99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Documentation] policy_version 2 is not used automatically #248
Comments
It's the It sounds like you already have an existing configuration file. You'll just need to add The policy version is for policies, not protectors. Protectors don't care about whether they are protecting v1 policies, v2 policies, or a combination of the two. |
When I encrypt a new empty directory, it asks whether I should make a new protector:
But I believe this is what I did last time. I need it to make a new policy. -edit- *) The answer is in the documentation you quoted:
-edit-
I am not sure how to proceed. Does the pre-existing protector for this user automatically get a new policy? -edit-
I believe it worked! I'll leave my edits/updates here, in case it will help somebody else. I might need to do some cleanup and remove the old protectors and old policy. |
@Redsandro what you did in your final edit is correct, I'll track this as (yet another) doc bug to clarify the "upgrade" senario to include examples. You shouldn't need to create any new protectors (other than recover protectors) when going from v1 to v2. If you inadvertently created a protector, it will show up when you get the To remove a completely unused protector you can run If you have a policy and the directory has been deleted, you can run You can get the ids/status of policies and protectors by running |
I have removed the discussion below to new separate issues. We can rewind this issue to:
Original comment below: @josephlr thanks for the directions. I have destroyed one policy and one protector which I was quite sure I didn't need, but it still felt like a gamble and I made a backup beforehand. There are a lot of encrypted directories scattered over 4 mountpoints. I'm quite sure I have only two policies and three protectors in use: One v1 policy with the login protector and the recovery protector (used for most directories), and one v2 policy with the same login protector but a new auto-generated recovery protector (used for the newly created home). However I still have four of each, but it's been too long so I keep them just in case. I have three recommendations:
|
It's same as easy to remove any other file or even all files. sudo is not a boundary if user account has access to it and attacker has arbitrary code exec. They can just run something in a loop while waiting for your credentials. |
Rename the troubleshooting section "Can't log in with ssh even when user's encrypted home directory is unlocked" to the more general "Some processes can't access unlocked encrypted files", and rewrite it to provide clearer directions for how to fix the problem by upgrading encrypted directories to policy version 2. Also add a related section "Users can access other users' unlocked encrypted files" which covers the reverse "issue", i.e. people expecting some processes to *not* be able to access unlocked encrypted files. Fixes #248
I updated a machine to Ubuntu 20.04, manually compiled
fscrypt
versionv0.2.9-2-g5e85ae0
, and removedpolicy_version
from/etc/fscrypt.conf
so that it not looks something like this:I've created a new home and encrypted the directory. From what I understand, with the default 5.4.0 kernel,
fscrypt
should automatically usepolicy_version:2
. However, afterrsync
ing all files over, reboot and login, it still showspolicy_version:1
:What should I do (have done) differently?
The text was updated successfully, but these errors were encountered: