This file is indexed.

/usr/bin/ecryptfs-mount-private is in ecryptfs-utils 111-4.

This file is owned by root:root, with mode 0o755.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
#!/bin/sh -e
# This script mounts a user's confidential private folder
#
# Original by Michael Halcrow, IBM
# Extracted to a stand-alone script by Dustin Kirkland <kirkland@ubuntu.com>
#
# This script:
#  * interactively prompts for a user's wrapping passphrase (defaults to their
#    login passphrase)
#  * checks it for validity
#  * unwraps a users mount passphrase with their supplied wrapping passphrase
#  * inserts the mount passphrase into the keyring
#  * and mounts a user's encrypted private folder

PRIVATE_DIR="Private"
WRAPPING_PASS="LOGIN"
PW_ATTEMPTS=3
TEXTDOMAIN="ecryptfs-utils"
MESSAGE=`gettext "Enter your login passphrase:"`

if [ -f $HOME/.ecryptfs/wrapping-independent ]; then
	# use a wrapping passphrase different from the login passphrase
	WRAPPING_PASS="INDEPENDENT"
	MESSAGE=`gettext "Enter your wrapping passphrase:"`
fi

WRAPPED_PASSPHRASE_FILE="$HOME/.ecryptfs/wrapped-passphrase"
MOUNT_PASSPHRASE_SIG_FILE="$HOME/.ecryptfs/$PRIVATE_DIR.sig"

# First, silently try to perform the mount, which would succeed if the appropriate
# key is available in the keyring
if /sbin/mount.ecryptfs_private >/dev/null 2>&1; then
	exit 0
fi

# Otherwise, interactively prompt for the user's password
if [ -f "$WRAPPED_PASSPHRASE_FILE" -a -f "$MOUNT_PASSPHRASE_SIG_FILE" ]; then
	tries=0
	stty_orig=`stty -g`
	while [ $tries -lt $PW_ATTEMPTS ]; do
		echo -n "$MESSAGE"
		stty -echo
		LOGINPASS=`head -n1`
		stty $stty_orig
		echo
		if [ $(wc -l < "$MOUNT_PASSPHRASE_SIG_FILE") = "1" ]; then
			# No filename encryption; only insert fek
			if printf "%s\0" "$LOGINPASS" | ecryptfs-unwrap-passphrase "$WRAPPED_PASSPHRASE_FILE" - | ecryptfs-add-passphrase -; then
				break
			else
				echo `gettext "ERROR:"` `gettext "Your passphrase is incorrect"`
				tries=$(($tries + 1))
				continue
			fi
		else
			if printf "%s\0" "$LOGINPASS" | ecryptfs-insert-wrapped-passphrase-into-keyring "$WRAPPED_PASSPHRASE_FILE" - ; then
				break
			else
				echo `gettext "ERROR:"` `gettext "Your passphrase is incorrect"`
				tries=$(($tries + 1))
				continue
			fi
		fi
	done
	if [ $tries -ge $PW_ATTEMPTS ]; then
		echo `gettext "ERROR:"` `gettext "Too many incorrect password attempts, exiting"`
		exit 1
	fi
	/sbin/mount.ecryptfs_private
else
	echo `gettext "ERROR:"` `gettext "Encrypted private directory is not setup properly"`
	exit 1
fi
if grep -qs "$HOME/.Private $PWD ecryptfs " /proc/mounts 2>/dev/null; then
	echo
	echo `gettext "INFO:"` `gettext "Your private directory has been mounted."`
	echo `gettext "INFO:"` `gettext "To see this change in your current shell:"`
	echo "  cd $PWD"
	echo
fi
exit 0