cryptsetup 2:1.1.0~rc2-1ubuntu1 source package in Ubuntu
Changelog
cryptsetup (2:1.1.0~rc2-1ubuntu1) lucid; urgency=low * Merge with Debian testing. Remaining Ubuntu changes: - debian/rules: cryptsetup is linked dynamically against libgcrypt and libgpg-error. - Upstart migration: + Add debian/cryptdisks-enable.upstart. + debian/cryptdisks{,-early}.init: Make the 'start' action of the init script a no-op, this should be handled entirely by the upstart job. (LP #473615) + debian/cryptsetup.postinst: Remove any symlinks from /etc/rcS.d on upgrade. + debian/rules: Do not install start symlinks for those two, and install debian/cryptdisks-enable.upstart scripts. - Add debian/cryptsetup.apport: Apport package hook. Install in debian/rules, and create dir in debian/cryptsetup.dirs. - Start usplash in initramfs, since we need it for fancy passphrase input: + debian/initramfs/cryptroot-conf, debian/initramfs-conf.d: USPLASH=y + debian/control: Bump initramfs-tools Suggests to Depends:. cryptsetup (2:1.1.0~rc2-1) unstable; urgency=low * new upstream release candidate (1.1.0-rc2), highlights include: - new libcryptsetup API (documented in libcryptsetup.h) - luksHeaderBackup and luksHeaderRestore commands (closes: #533643) - use libgcrypt, enables all gcrypt hash algorithms for LUKS through -h luksFormat option (closes: #387159, #537385) - new --master-key-file option for luksFormat and luksAddKey - use dm-uuid for all crypt devices, contains device type and name now (closes: #548988, #549870) - command successful messages moved to verbose level (closes: #541805) - several code changes to improve speed of luksOpen (closes: #536415) - luksSuspend and luksResume commands * remove unneeded patches 03_read_rework and 04_no_stderr_success, update 02_manpage for new upstream release candidate. * update patch to comply with DEP-3 (http://dep.debian.net/deps/dep3/) * fix initramfs/cryptroot-hook to support setups where /dev/mapper/ contains symlinks to devices at /dev/dm-*. the lvm2/device-mapper packages had defaults changed to this temporary. it has been fixed in a subsequent upload of lvm2 in the meantime, but still it's not a bad idea to be prepared for such setups in the future. that way cryproot now supports /dev/dm-* devices as well. (closes: #532579, #544487, #544773) * fix initscript dependencies both for cryptdisks and cryptdisks-early. thanks to Petter Reinholdtsen for bugreport and patch. (closes: #548356) * finally change default behaviour of initscripts/cryptroot-hook to include all available crypto modules into the initramfs. this change should fix any problems with cryto modules missing from the initramfs. announce the change in NEWS.Debian. (closes: #547597) * add error messages to lvm detecting code in initramfs/cryptroot-script in order to make debugging easier. (closes: #541248) * implement detection of devices which are required by decrypt_derived keyscript in initscripts/cryptroot-hook. that way setups where encrypted swap has the key derived from non-root partitions should support suspend/ resume as well. (closes: #475838) * remove outdated documentation from the source package: CryptoRoot.HowTo, CheckSystem.Doc * mention in README.initramfs that busybox is required for cryptroot to work * stop creating /etc/keys in postinst maintainer script. * update build system to include library files again: (closes: #480157) - split into three packages: cryptsetup, libcryptsetup1, libcryptsetup-dev - rename preinst to cryptsetup.preinst, copy code to create /etc/crypttab skeleton into cryptsetup-udeb.preinst. - build with --enable-shared and --enable-static for libcryptsetup.a - create debian/libcryptsetup1.symbols with help of dpkg-gensymbols * add debian/cryptsetup.lintian-override for two false positives * raise build-depends on debhelper and debian/compat for that reason * update README.remote to work with latest dropbear package. thanks to debian@x.ray.net. * make all crypttab fields available to keyscripts as environment variables. thanks to ludwig nussel from suse for idea and implmentation. document this in crypttab(5) manpage. impelement the same environment variables in initramfs cryptroot script. * fix formatting errors in crypttab(5) manpage. cryptsetup (2:1.0.7-2) unstable; urgency=low * add a paragraph to the cryptsetup manpage that mentions /proc/crypto as source for available crypto ciphers, modes, hashs, keysizes, etc. (closes: #518266) * fix luksformat to check for mkfs.$fs both in /sbin and /usr/sbin. thanks to Jon Dowland. (closes: #539734) * mention era eriksson as author of the typo fixes for manpage (submitted as bug #476624) in changelog of cryptsetup 2:1.0.6-3. (closes: #541344) * bump standards-version to 3.8.3. no changes needed. * add 04_no_stderr_success.patch, which adds an option to suppress success messages to stderr. don't apply the patch as this already has been fixed upstream in another way. next cryptsetup release will print the command successfull message to stdout only if opt_verbose is set. * add checkscripts blkid and un_blkid for the reason that vol_id will be removed from udev soon. advertise the new scripts at all places that mentioned vol_id or un_vol_id before. * add /usr/share/bug/cryptsetup which adds /proc/cmdline, /etc/crypttab, /etc/fstab and output of 'lsmod' to bugs against cryptsetup. * add debian/README.remote, which describes how to setup a cryptroot system with support for remote unlocking via ssh login into the initramfs. Thanks to debian@x.ray.net for writing it down. * update debian/copyright for current format from dep.debian.net/deps/dep5 * add chainiv, cryptomgr and krng to standard list of modules in initramfs cryptroot hook. (closes: #541835) * add a section describing LUKS header backups and related security implications to README.Debian. a tool to automate this task should not be distributed at all. (closes: #432150) cryptsetup (2:1.0.7-1) unstable; urgency=low * new upstream release, highlights include (diff from ~rc1): - allow removal of last slot in luksRemoveKey and luksKillSlot - eject unsupported --offset and --skip options for luksFormat * make passdev accept a timeout option, thanks to Evgeni Golov for the patch. (closes: #502598) * finally add the cryptsource delay implementation from ubuntu, as it seems to workaround some issues where appearance of the root device takes longer than expected. (closes: #488271) * execute udev_settle before $cryptremove if $cryptcreate fails at setup_mapping() in the initramfs cryptroot script. it seems like a short delay and/or udev_settly is needed in between of 'cryptsetup create' and 'cryptsetup remove'. thanks to Gernot Schilling for the bugreport. (closes: #529527) * talk about /dev/urandom instead of /dev/random in crypttab manpage. (closes: #537344) * check for $IGNORE before check_key() in handle_crypttab_line_start() * rewrite error code handling: - return 1 for errors in handle_crypttab_line_{start|stop} - handle_crypttab_line_... || true needed due to set -e in initscript - check for exit code of handle_crypttab_line_{start<stop} in cryptdisks_{start|stop}, exit with proper status code (closes: #524173) * add a counter to the while loop in cryptdisks_{start|stop}, in order to detect if $dst was not found in crypttab. (closes: #524485) * check for keyscript in the new location in initramfs/cryptopensc-hook. * add README.opensc to docs, thanks to Benjamin Kiessling for writing it. (closes: #514538) * add patches/03_rework_read.patch [rework write_blockwise() and read_blockwise()], but don't apply it yet as it's still experimental. applying it will increase the speed of luksOpen. cryptsetup (2:1.0.7~rc1-2) unstable; urgency=low * flag the root device with rootdev option at /conf/conf.d/cryptroot in initramfs hook, check for that flag before adding ROOT=$NEWROOT to /conf/param.conf in initramfs script. that should prevent the initramfs script from adding ROOT=$NEWROOT for resume devices. (closes: #535801) cryptsetup (2:1.0.7~rc1-1) unstable; urgency=low * new upstream release candidate, highlights include: - use better error messages if device doesn't exist or is already used by other mapping (closes: #492926) - check device size when loading LUKS header - add some error hint if dm-crypt mapping failed (key size and kernel version check for XTS and LRW mode for now) (closes: #494584) - display device name when asking for password - retain readahead of underlying device, if devmapper version supports it - set UUID in device-mapper for LUKS devices - define device-mapper crypt UUID maximal length and check for its size - add some checks for error codes, fixes warning: ignoring return value... - update LUKS homepage in manpage to code.google.com/p/cryptsetup * patches/01_fix_make_distclean.patch: removed, incorporated upstream * patches/02_manpage.patch: updated, mostly incorporated upstream * remove invokation of ./setup-gettext.sh from debian/rules. * set $PATH in checks/xfs. Required to make /usr/sbin/xfs_admin work at early boot stage. Thanks to Stefan Bender. (closes: #525118) * update path to docbook-xsl stylesheet in debian/rules to /usr/share/xml/docbook/stylesheet/docbook-xsl/. Add versioned build-depends to docbook-xsl (>= 1.74.3+dfsg) for that reason. * fix bashisms in scripts/decrypt_opensc, thanks to Raphael Geissert. (closes: #530060) * fix UUID and LABEL handling for cryptroot, thanks to Kees Cook and ubuntu. (closes: #522041) * add ROOT=$NEWROOT to /conf/param.conf in cryptroot initramfs script. This is required for lilo to find the correct root device. Thanks to Pyotr Berezhkov and Christian Schaarschmidt. (closes: #511447, #511840) * replace mini autogen.sh with autoreconf in debian/rules. Thanks to Bastian Kleineidam. (closes: #522798) * support escaped newlines in askpass.c, thanks to Kees Cook and ubuntu. (closes: #528133) * use the same passphrase prompt in init script and initramfs script * mention the incoherent behaviour of cryptsetup create/luksOpen with invalid passwords/keys in cryptsetup manpage. (closes: #529359) * bump standards-version to 3.8.2, no changes required. * add 'X-Interactive: true' LSB-header to initscripts. * fix bash_completion script to use 'command ls'. that way it now works with aliased ls as well. thanks to Daniel Dehennin. (closes: #535351) -- Martin Pitt <email address hidden> Wed, 11 Nov 2009 15:04:27 +0100
Upload details
- Uploaded by:
- Martin Pitt
- Uploaded to:
- Lucid
- Original maintainer:
- Ubuntu Development Team
- Architectures:
- any
- Section:
- admin
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cryptsetup_1.1.0~rc2.orig.tar.gz | 499.2 KiB | b3adc7f48eb1867752a4da7f7682cde8ca5bc8b098f47b7ed6475f4abe67da8a |
cryptsetup_1.1.0~rc2-1ubuntu1.diff.gz | 72.7 KiB | 00811a8dae2138c588669d6920814646df903f74fe97b5df51f76d5a2229cf3f |
cryptsetup_1.1.0~rc2-1ubuntu1.dsc | 1.6 KiB | 1feea65037a6ec8022735ff52c4eaf49fb2b99aa9bb557378b6b050dc9fa150b |
Available diffs
Binary packages built by this source
- cryptsetup: No summary available for cryptsetup in ubuntu lucid.
No description available for cryptsetup in ubuntu lucid.
- cryptsetup-udeb: No summary available for cryptsetup-udeb in ubuntu lucid.
No description available for cryptsetup-udeb in ubuntu lucid.
- libcryptsetup-dev: No summary available for libcryptsetup-dev in ubuntu lucid.
No description available for libcryptsetup-dev in ubuntu lucid.
- libcryptsetup1: No summary available for libcryptsetup1 in ubuntu lucid.
No description available for libcryptsetup1 in ubuntu lucid.