<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Ubuntu&#8217;s Encrypted Home Directory: A Canonical Approach to Data Privacy</title>
	<atom:link href="http://www.linux-mag.com/id/7568/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux-mag.com/id/7568/</link>
	<description>Open Source, Open Standards</description>
	<lastBuildDate>Sat, 05 Oct 2013 13:48:18 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: frodo</title>
		<link>http://www.linux-mag.com/id/7568/#comment-1297457</link>
		<dc:creator>frodo</dc:creator>
		<pubDate>Fri, 04 Oct 2013 03:04:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-1297457</guid>
		<description>can I still run programs like sbackup

yep.

 if you encrypt the home, and log in, it will be unencrypted to your eyes. you can do as you wish with the files.
i use a Private folder with manual mount so even logged in, my stuff is encrypted unless i change it.

when power is off your setup will protect your home folder from view, mine will only protect the Private folder. my only wish list contains multiple folders.</description>
		<content:encoded><![CDATA[<p>can I still run programs like sbackup</p>
<p>yep.</p>
<p> if you encrypt the home, and log in, it will be unencrypted to your eyes. you can do as you wish with the files.<br />
i use a Private folder with manual mount so even logged in, my stuff is encrypted unless i change it.</p>
<p>when power is off your setup will protect your home folder from view, mine will only protect the Private folder. my only wish list contains multiple folders.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: green sleeves</title>
		<link>http://www.linux-mag.com/id/7568/#comment-1145807</link>
		<dc:creator>green sleeves</dc:creator>
		<pubDate>Fri, 23 Aug 2013 06:19:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-1145807</guid>
		<description>Once the home directory is encrypted can I still run programs like sbackup to make unencrypted backups?</description>
		<content:encoded><![CDATA[<p>Once the home directory is encrypted can I still run programs like sbackup to make unencrypted backups?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: online casinos Canada</title>
		<link>http://www.linux-mag.com/id/7568/#comment-927955</link>
		<dc:creator>online casinos Canada</dc:creator>
		<pubDate>Mon, 06 May 2013 18:12:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-927955</guid>
		<description>Hi! I realize this is kind of off-topic but I had to ask. Does managing a well-established website such as yours 
require a lot of work? I&#039;m completely new to writing a blog however I do write in my journal every day. I&#039;d like to start 
a blog so I will be able to share my own experience and thoughts online.
Please let me know if you have any suggestions or tips 
for brand new aspiring blog owners. Appreciate 
it!</description>
		<content:encoded><![CDATA[<p>Hi! I realize this is kind of off-topic but I had to ask. Does managing a well-established website such as yours<br />
require a lot of work? I&#8217;m completely new to writing a blog however I do write in my journal every day. I&#8217;d like to start<br />
a blog so I will be able to share my own experience and thoughts online.<br />
Please let me know if you have any suggestions or tips<br />
for brand new aspiring blog owners. Appreciate<br />
it!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: willard</title>
		<link>http://www.linux-mag.com/id/7568/#comment-410451</link>
		<dc:creator>willard</dc:creator>
		<pubDate>Tue, 18 Sep 2012 06:26:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-410451</guid>
		<description>@justwally: This is not true, either legally or in practice. Millions of individuals carry around encrypted folders, partitions and entire drives for many reasons. Anyone carrying HIPAA data, for example. It is not a basis for any search or seizure. Please do not spread disinformation on this point, as it has a chilling effect on the decision to encrypt.</description>
		<content:encoded><![CDATA[<p>@justwally: This is not true, either legally or in practice. Millions of individuals carry around encrypted folders, partitions and entire drives for many reasons. Anyone carrying HIPAA data, for example. It is not a basis for any search or seizure. Please do not spread disinformation on this point, as it has a chilling effect on the decision to encrypt.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Hans-Christoph Steiner</title>
		<link>http://www.linux-mag.com/id/7568/#comment-275835</link>
		<dc:creator>Hans-Christoph Steiner</dc:creator>
		<pubDate>Sun, 08 Jul 2012 03:43:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-275835</guid>
		<description>Thanks for this, very helpful!  I believe there is a small error in the terminal commands.  I think this line:

&lt;code&gt;sudo ln -s /home/.ecryptfs/$USER/.ecryptfs /home/$USER.new/.ecryptfs&lt;/code&gt;

Should actually read:

&lt;code&gt;sudo ln -s /home/.ecryptfs/$USER /home/$USER.new/.ecryptfs&lt;/code&gt;</description>
		<content:encoded><![CDATA[<p>Thanks for this, very helpful!  I believe there is a small error in the terminal commands.  I think this line:</p>
<p><code>sudo ln -s /home/.ecryptfs/$USER/.ecryptfs /home/$USER.new/.ecryptfs</code></p>
<p>Should actually read:</p>
<p><code>sudo ln -s /home/.ecryptfs/$USER /home/$USER.new/.ecryptfs</code></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Conor Schaefer</title>
		<link>http://www.linux-mag.com/id/7568/#comment-9790</link>
		<dc:creator>Conor Schaefer</dc:creator>
		<pubDate>Sun, 24 Jul 2011 23:44:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-9790</guid>
		<description>If it&#039;s using full-disk encryption, then you&#039;re fine not using a login password. That way you still have to type your password in during a reboot, but only once, and that very quickly after boot.</description>
		<content:encoded><![CDATA[<p>If it&#8217;s using full-disk encryption, then you&#8217;re fine not using a login password. That way you still have to type your password in during a reboot, but only once, and that very quickly after boot.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: desnotes</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7193</link>
		<dc:creator>desnotes</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7193</guid>
		<description>&lt;p&gt;Seems like a much better method than the encryption method used on my work laptop. After every reboot, I need to type in a password in addition to the login password.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Seems like a much better method than the encryption method used on my work laptop. After every reboot, I need to type in a password in addition to the login password.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: davidmintz</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7194</link>
		<dc:creator>davidmintz</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7194</guid>
		<description>&lt;p&gt;Sounds like a wonderful idea for laptops that travel, but kind of a PITA, e.g., for a desktop at home that you like to access frequently via SSH because, as the article says, &lt;/p&gt;
&lt;p&gt;\&quot;if the home directory is not already mounted then automatic desktop logins, ssh public key authentication and cronjobs that require access to data in $HOME are not possible. This issue can be worked around by disabling automatic unmount (remove $HOME/.ecryptfs/auto-umount), logging in, and establishing the mount at some point prior to public key authentication or cronjob execution. However, the home directory will only be unmounted at shutdown, or when ecryptfs-umount-private is invoked directly.\&quot;&lt;/p&gt;
&lt;p&gt;I don\&#039;t completely understand the workaround but, again, it sounds kind of painful.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Sounds like a wonderful idea for laptops that travel, but kind of a PITA, e.g., for a desktop at home that you like to access frequently via SSH because, as the article says, </p>
<p>\&#8221;if the home directory is not already mounted then automatic desktop logins, ssh public key authentication and cronjobs that require access to data in $HOME are not possible. This issue can be worked around by disabling automatic unmount (remove $HOME/.ecryptfs/auto-umount), logging in, and establishing the mount at some point prior to public key authentication or cronjob execution. However, the home directory will only be unmounted at shutdown, or when ecryptfs-umount-private is invoked directly.\&#8221;</p>
<p>I don\&#8217;t completely understand the workaround but, again, it sounds kind of painful.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ionutg</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7195</link>
		<dc:creator>ionutg</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7195</guid>
		<description>&lt;p&gt;Shouldn\&#039;t be that difficult to combine with ssh remote logins if one uses the pam_mount module. I haven\&#039;t used pam_mount with eCryptfs yet, but it should be possible according to&lt;/p&gt;
&lt;p&gt;http://wiki.archlinux.org/index.php/System_Encryption_with_eCryptfs
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Shouldn\&#8217;t be that difficult to combine with ssh remote logins if one uses the pam_mount module. I haven\&#8217;t used pam_mount with eCryptfs yet, but it should be possible according to</p>
<p><a href="http://wiki.archlinux.org/index.php/System_Encryption_with_eCryptfs" rel="nofollow">http://wiki.archlinux.org/index.php/System_Encryption_with_eCryptfs</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: bobberm</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7196</link>
		<dc:creator>bobberm</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7196</guid>
		<description>&lt;p&gt;Looks like a recipe for disaster.  I have had a bad experience with encrypting a drive, the algorithm appeared to have a bug, it was encrypted allright, but impossible to recover.  If you try this, you MAY want to take that backup of your unencrypted data you made and keep it in a safe somewhere.  Encryption algorithms are complicated and sometimes fail.   Bobby B.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Looks like a recipe for disaster.  I have had a bad experience with encrypting a drive, the algorithm appeared to have a bug, it was encrypted allright, but impossible to recover.  If you try this, you MAY want to take that backup of your unencrypted data you made and keep it in a safe somewhere.  Encryption algorithms are complicated and sometimes fail.   Bobby B.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: blanik</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7197</link>
		<dc:creator>blanik</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7197</guid>
		<description>&lt;p&gt;Just how secure is Ubuntu\&#039;s new encrypted home directory system, when it is installed using Ubuntu\&#039;s default configuration ?   Your article includes a nice explanation of how you can boot the PC using a Ubuntu LiveCD, and then recover the data. &lt;/p&gt;
&lt;p&gt;Am I missing something here ?  To me it looks like a \&quot;bad guy\&quot; who wanted to steal the confidential information stored on the notebook computer that he has just stolen could have access to your encrypted home partition data in a matter of minutes....&lt;/p&gt;
&lt;p&gt;Your article suggests that you can make it harder for the bad guy by implementing two-factor authentication - \&quot;simplymove  $HOME/.ecryptfs/wrapped-passphrase to removable media (such as a USB key or flash disk)\&quot;.&lt;/p&gt;
&lt;p&gt;Yes this approach does put the wrapped passphrase on a USB Key or similar device, but all of these security measures are still reliant upon the thief not getting hold of the USB Key at the same time as the Notebook Computer is stolen.  What are the odds that the User will end up storing the USB Key in the Laptop Bag, just so that they make sure that they always have the USB Key with them when they travel.&lt;/p&gt;
&lt;p&gt;The concept of using the USB Key also raises a potential personal safety issue for the Computer User.   If the thief has found a victim using a notebook computer, at say a coffee shop, the thief will also note that when the user shutdown the PC prior to leaving the Coffee Shop, that the user unplugged a USB Key and hung it around his neck or somewhere else on their person.  Odds On - the thief, when he/she makes a move to distract you and steal your notebook computer, will also do a pick pocket job on your USB Key......&lt;/p&gt;
&lt;p&gt;So - am I missing something ?  Or does Ubuntu\&#039;s new encrypted home directory functionality only protect your data against an honest thief, who knows nothing about Linux, and ideally who wouldn\&#039;t also think to steal your USB Key at the same time they steal your Notebook computer ?????
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Just how secure is Ubuntu\&#8217;s new encrypted home directory system, when it is installed using Ubuntu\&#8217;s default configuration ?   Your article includes a nice explanation of how you can boot the PC using a Ubuntu LiveCD, and then recover the data. </p>
<p>Am I missing something here ?  To me it looks like a \&#8221;bad guy\&#8221; who wanted to steal the confidential information stored on the notebook computer that he has just stolen could have access to your encrypted home partition data in a matter of minutes&#8230;.</p>
<p>Your article suggests that you can make it harder for the bad guy by implementing two-factor authentication &#8211; \&#8221;simplymove  $HOME/.ecryptfs/wrapped-passphrase to removable media (such as a USB key or flash disk)\&#8221;.</p>
<p>Yes this approach does put the wrapped passphrase on a USB Key or similar device, but all of these security measures are still reliant upon the thief not getting hold of the USB Key at the same time as the Notebook Computer is stolen.  What are the odds that the User will end up storing the USB Key in the Laptop Bag, just so that they make sure that they always have the USB Key with them when they travel.</p>
<p>The concept of using the USB Key also raises a potential personal safety issue for the Computer User.   If the thief has found a victim using a notebook computer, at say a coffee shop, the thief will also note that when the user shutdown the PC prior to leaving the Coffee Shop, that the user unplugged a USB Key and hung it around his neck or somewhere else on their person.  Odds On &#8211; the thief, when he/she makes a move to distract you and steal your notebook computer, will also do a pick pocket job on your USB Key&#8230;&#8230;</p>
<p>So &#8211; am I missing something ?  Or does Ubuntu\&#8217;s new encrypted home directory functionality only protect your data against an honest thief, who knows nothing about Linux, and ideally who wouldn\&#8217;t also think to steal your USB Key at the same time they steal your Notebook computer ?????</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: webmanaus</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7198</link>
		<dc:creator>webmanaus</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7198</guid>
		<description>&lt;p&gt;To recover your data, you will require the encryption key which you were instructed to \&quot;write down, print, etc and store in a *secure* location\&quot;. So simply booting from a live CD doesn\&#039;t give you anything more than access to the encrypted data (ie, useless).&lt;/p&gt;
&lt;p&gt;Secondly, a lot of people store data on USB keys, when they shutdown, they remove the USB key and drop it in:&lt;br /&gt;
1) Laptop bag&lt;br /&gt;
2) Pocket&lt;br /&gt;
3) Keyring/etc/whatever&lt;/p&gt;
&lt;p&gt;Unless you are being specifically targeted (ie, the thief knows where you work, and knows you have access to the data they are after) then they would only be interested in the re-sale value of the hardware. As such, the re-sale value of a USB key is negligible and so definitely not worth any additional risk.&lt;/p&gt;
&lt;p&gt;The point of the above would be to ensure that the thief and/or recipient/purchaser of your laptop can\&#039;t accidentally stumble across the fact that they have complete access to \&quot;Some Corporate Server Farm\&quot; or \&quot;Some Users\&quot; bank account details complete with passwords, or personal home movie collection, or whatever...&lt;/p&gt;
&lt;p&gt;PS, the truly serious thief targeting the theft of a specific users laptop will go after the USB key, probably won\&#039;t be concerned with threatening your safety, etc and if all else fails, will use automated decryption tools to access your decrypted data in 6 months or however long it would take. (BTW, anyone know how long it would take to brute force this type of encryption?)&lt;/p&gt;
&lt;p&gt;PPS, This is definitely something I will be enabling on my laptops as soon as I install Ubuntu 9.10 which I am eagerly awaiting!&lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;
Adam&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.websitemanagers.com.au/&quot;&gt;www.websitemanagers.com.au
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>To recover your data, you will require the encryption key which you were instructed to \&#8221;write down, print, etc and store in a *secure* location\&#8221;. So simply booting from a live CD doesn\&#8217;t give you anything more than access to the encrypted data (ie, useless).</p>
<p>Secondly, a lot of people store data on USB keys, when they shutdown, they remove the USB key and drop it in:<br />
1) Laptop bag<br />
2) Pocket<br />
3) Keyring/etc/whatever</p>
<p>Unless you are being specifically targeted (ie, the thief knows where you work, and knows you have access to the data they are after) then they would only be interested in the re-sale value of the hardware. As such, the re-sale value of a USB key is negligible and so definitely not worth any additional risk.</p>
<p>The point of the above would be to ensure that the thief and/or recipient/purchaser of your laptop can\&#8217;t accidentally stumble across the fact that they have complete access to \&#8221;Some Corporate Server Farm\&#8221; or \&#8221;Some Users\&#8221; bank account details complete with passwords, or personal home movie collection, or whatever&#8230;</p>
<p>PS, the truly serious thief targeting the theft of a specific users laptop will go after the USB key, probably won\&#8217;t be concerned with threatening your safety, etc and if all else fails, will use automated decryption tools to access your decrypted data in 6 months or however long it would take. (BTW, anyone know how long it would take to brute force this type of encryption?)</p>
<p>PPS, This is definitely something I will be enabling on my laptops as soon as I install Ubuntu 9.10 which I am eagerly awaiting!</p>
<p>Regards,<br />
Adam</p>
<p><a href="http://www.websitemanagers.com.au/"></a><a href="http://www.websitemanagers.com.au" rel="nofollow">http://www.websitemanagers.com.au</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: justwally</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7199</link>
		<dc:creator>justwally</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7199</guid>
		<description>&lt;p&gt;It is important to note that the mere presence of an encrypted volume or directory is enough of a reason (in and of itself) for your computer to be indefinitely seized in the US.  Just so everyone is aware of this.  \&quot;Encryption\&quot; _IS_ the probable cause in these instances.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>It is important to note that the mere presence of an encrypted volume or directory is enough of a reason (in and of itself) for your computer to be indefinitely seized in the US.  Just so everyone is aware of this.  \&#8221;Encryption\&#8221; _IS_ the probable cause in these instances.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: dragonwisard</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7200</link>
		<dc:creator>dragonwisard</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7200</guid>
		<description>&lt;p&gt;@justwally: If we can advocate for encryption to become the default option in common operating systems (which I don\&#039;t think is unreasonable in today\&#039;s climate of data breeches and privacy concerns) encryption would no longer be grounds for probable cause.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>@justwally: If we can advocate for encryption to become the default option in common operating systems (which I don\&#8217;t think is unreasonable in today\&#8217;s climate of data breeches and privacy concerns) encryption would no longer be grounds for probable cause.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: pannsoln</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7201</link>
		<dc:creator>pannsoln</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7201</guid>
		<description>&lt;p&gt;I\&#039;ve just tried the recovery, and the method described doesn\&#039;t work. You need to create the directories in /mnt (that\&#039;s not a problem).&lt;/p&gt;
&lt;p&gt;But sudo chroot /mnt gives the error:&lt;br /&gt;
cannot run command \&#039;/bin/bash\&quot;: No such directory.&lt;/p&gt;
&lt;p&gt;And su - foo (using the correct name for the user) also gives an error.&lt;/p&gt;
&lt;p&gt;And ecrypt-mount-private says:&lt;br /&gt;
Encrypted private directory is not setup properly.&lt;/p&gt;
&lt;p&gt;I have tried everything that I can think of, but to no avail. My /home is mounted on a separate directory, so I also have tried variations to cope with that, but it still doesn\&#039;t work!&lt;/p&gt;
&lt;p&gt;It seems impossible to find anywhere that documents how to recover an encrypted directory!
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I\&#8217;ve just tried the recovery, and the method described doesn\&#8217;t work. You need to create the directories in /mnt (that\&#8217;s not a problem).</p>
<p>But sudo chroot /mnt gives the error:<br />
cannot run command \&#8217;/bin/bash\&#8221;: No such directory.</p>
<p>And su &#8211; foo (using the correct name for the user) also gives an error.</p>
<p>And ecrypt-mount-private says:<br />
Encrypted private directory is not setup properly.</p>
<p>I have tried everything that I can think of, but to no avail. My /home is mounted on a separate directory, so I also have tried variations to cope with that, but it still doesn\&#8217;t work!</p>
<p>It seems impossible to find anywhere that documents how to recover an encrypted directory!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: perfmonk</title>
		<link>http://www.linux-mag.com/id/7568/#comment-7202</link>
		<dc:creator>perfmonk</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7568/#comment-7202</guid>
		<description>&lt;p&gt;Mr pannsoln,&lt;/p&gt;
&lt;p&gt;If you want to use a chroot, your should mount the root \&quot;/\&quot; inside your mount point.  Since, from the jail, you wont see any directory from your $PATH...  Thus you can\&#039;t see /bin/bash either.&lt;/p&gt;
&lt;p&gt;if you want to chroot inside /mnt, before do #:  mount -o bind / /mnt&lt;br /&gt;
and create a mount point for any other mount that you want accessible from inside /mnt and mount them the same way.&lt;/p&gt;
&lt;p&gt;The problem is not Ubuntu.  It\&#039;s just a little misunderstanding.&lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;
         BT
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Mr pannsoln,</p>
<p>If you want to use a chroot, your should mount the root \&#8221;/\&#8221; inside your mount point.  Since, from the jail, you wont see any directory from your $PATH&#8230;  Thus you can\&#8217;t see /bin/bash either.</p>
<p>if you want to chroot inside /mnt, before do #:  mount -o bind / /mnt<br />
and create a mount point for any other mount that you want accessible from inside /mnt and mount them the same way.</p>
<p>The problem is not Ubuntu.  It\&#8217;s just a little misunderstanding.</p>
<p>Regards,<br />
         BT</p>
]]></content:encoded>
	</item>
</channel>
</rss>