cryptsetup 2:1.1.0~rc2-1ubuntu1 source package in Ubuntu

Changelog

cryptsetup (2:1.1.0~rc2-1ubuntu1) lucid; urgency=low

  * Merge with Debian testing. Remaining Ubuntu changes:
    - debian/rules: cryptsetup is linked dynamically against libgcrypt and
      libgpg-error.
    - Upstart migration:
      + Add debian/cryptdisks-enable.upstart.
      + debian/cryptdisks{,-early}.init: Make the 'start' action of the init
        script a no-op, this should be handled entirely by the upstart job.
        (LP #473615)
      + debian/cryptsetup.postinst: Remove any symlinks from /etc/rcS.d on
        upgrade.
      + debian/rules: Do not install start symlinks for those two, and install
        debian/cryptdisks-enable.upstart scripts.
    - Add debian/cryptsetup.apport: Apport package hook. Install in
      debian/rules, and create dir in debian/cryptsetup.dirs.
    - Start usplash in initramfs, since we need it for fancy passphrase input:
      + debian/initramfs/cryptroot-conf, debian/initramfs-conf.d: USPLASH=y
      + debian/control: Bump initramfs-tools Suggests to Depends:.

cryptsetup (2:1.1.0~rc2-1) unstable; urgency=low

  * new upstream release candidate (1.1.0-rc2), highlights include:
    - new libcryptsetup API (documented in libcryptsetup.h)
    - luksHeaderBackup and luksHeaderRestore commands (closes: #533643)
    - use libgcrypt, enables all gcrypt hash algorithms for LUKS through
      -h luksFormat option (closes: #387159, #537385)
    - new --master-key-file option for luksFormat and luksAddKey
    - use dm-uuid for all crypt devices, contains device type and name now
      (closes: #548988, #549870)
    - command successful messages moved to verbose level (closes: #541805)
    - several code changes to improve speed of luksOpen (closes: #536415)
    - luksSuspend and luksResume commands
  * remove unneeded patches 03_read_rework and 04_no_stderr_success, update
    02_manpage for new upstream release candidate.
  * update patch to comply with DEP-3 (http://dep.debian.net/deps/dep3/)
  * fix initramfs/cryptroot-hook to support setups where /dev/mapper/ contains
    symlinks to devices at /dev/dm-*. the lvm2/device-mapper packages had
    defaults changed to this temporary. it has been fixed in a subsequent
    upload of lvm2 in the meantime, but still it's not a bad idea to be
    prepared for such setups in the future. that way cryproot now supports
    /dev/dm-* devices as well. (closes: #532579, #544487, #544773)
  * fix initscript dependencies both for cryptdisks and cryptdisks-early.
    thanks to Petter Reinholdtsen for bugreport and patch. (closes: #548356)
  * finally change default behaviour of initscripts/cryptroot-hook to include
    all available crypto modules into the initramfs. this change should fix
    any problems with cryto modules missing from the initramfs. announce the
    change in NEWS.Debian. (closes: #547597)
  * add error messages to lvm detecting code in initramfs/cryptroot-script
    in order to make debugging easier. (closes: #541248)
  * implement detection of devices which are required by decrypt_derived
    keyscript in initscripts/cryptroot-hook. that way setups where encrypted
    swap has the key derived from non-root partitions should support suspend/
    resume as well. (closes: #475838)
  * remove outdated documentation from the source package: CryptoRoot.HowTo,
    CheckSystem.Doc
  * mention in README.initramfs that busybox is required for cryptroot to work
  * stop creating /etc/keys in postinst maintainer script.
  * update build system to include library files again: (closes: #480157)
    - split into three packages: cryptsetup, libcryptsetup1, libcryptsetup-dev
    - rename preinst to cryptsetup.preinst, copy code to create /etc/crypttab
      skeleton into cryptsetup-udeb.preinst.
    - build with --enable-shared and --enable-static for libcryptsetup.a
    - create debian/libcryptsetup1.symbols with help of dpkg-gensymbols
  * add debian/cryptsetup.lintian-override for two false positives
  * raise build-depends on debhelper and debian/compat for that reason
  * update README.remote to work with latest dropbear package. thanks to
    debian@x.ray.net.
  * make all crypttab fields available to keyscripts as environment variables.
    thanks to ludwig nussel from suse for idea and implmentation. document
    this in crypttab(5) manpage. impelement the same environment variables in
    initramfs cryptroot script.
  * fix formatting errors in crypttab(5) manpage.

cryptsetup (2:1.0.7-2) unstable; urgency=low

  * add a paragraph to the cryptsetup manpage that mentions /proc/crypto as
    source for available crypto ciphers, modes, hashs, keysizes, etc.
    (closes: #518266)
  * fix luksformat to check for mkfs.$fs both in /sbin and /usr/sbin. thanks
    to Jon Dowland. (closes: #539734)
  * mention era eriksson as author of the typo fixes for manpage (submitted as
    bug #476624) in changelog of cryptsetup 2:1.0.6-3. (closes: #541344)
  * bump standards-version to 3.8.3. no changes needed.
  * add 04_no_stderr_success.patch, which adds an option to suppress success
    messages to stderr. don't apply the patch as this already has been fixed
    upstream in another way. next cryptsetup release will print the command
    successfull message to stdout only if opt_verbose is set.
  * add checkscripts blkid and un_blkid for the reason that vol_id will be
    removed from udev soon. advertise the new scripts at all places that
    mentioned vol_id or un_vol_id before.
  * add /usr/share/bug/cryptsetup which adds /proc/cmdline, /etc/crypttab,
    /etc/fstab and output of 'lsmod' to bugs against cryptsetup.
  * add debian/README.remote, which describes how to setup a cryptroot system
    with support for remote unlocking via ssh login into the initramfs. Thanks
    to debian@x.ray.net for writing it down.
  * update debian/copyright for current format from dep.debian.net/deps/dep5
  * add chainiv, cryptomgr and krng to standard list of modules in initramfs
    cryptroot hook. (closes: #541835)
  * add a section describing LUKS header backups and related security
    implications to README.Debian. a tool to automate this task should not be
    distributed at all. (closes: #432150)

cryptsetup (2:1.0.7-1) unstable; urgency=low

  * new upstream release, highlights include (diff from ~rc1):
    - allow removal of last slot in luksRemoveKey and luksKillSlot
    - eject unsupported --offset and --skip options for luksFormat
  * make passdev accept a timeout option, thanks to Evgeni Golov for the patch.
    (closes: #502598)
  * finally add the cryptsource delay implementation from ubuntu, as it seems
    to workaround some issues where appearance of the root device takes longer
    than expected. (closes: #488271)
  * execute udev_settle before $cryptremove if $cryptcreate fails at
    setup_mapping() in the initramfs cryptroot script. it seems like a short
    delay and/or udev_settly is needed in between of 'cryptsetup create' and
    'cryptsetup remove'. thanks to Gernot Schilling for the bugreport.
    (closes: #529527)
  * talk about /dev/urandom instead of /dev/random in crypttab manpage.
    (closes: #537344)
  * check for $IGNORE before check_key() in handle_crypttab_line_start()
  * rewrite error code handling:
    - return 1 for errors in handle_crypttab_line_{start|stop}
    - handle_crypttab_line_... || true needed due to set -e in initscript
    - check for exit code of handle_crypttab_line_{start<stop} in
      cryptdisks_{start|stop}, exit with proper status code (closes: #524173)
  * add a counter to the while loop in cryptdisks_{start|stop}, in order to
    detect if $dst was not found in crypttab. (closes: #524485)
  * check for keyscript in the new location in initramfs/cryptopensc-hook.
  * add README.opensc to docs, thanks to Benjamin Kiessling for writing it.
    (closes: #514538)
  * add patches/03_rework_read.patch [rework write_blockwise() and
    read_blockwise()], but don't apply it yet as it's still experimental.
    applying it will increase the speed of luksOpen.

cryptsetup (2:1.0.7~rc1-2) unstable; urgency=low

  * flag the root device with rootdev option at /conf/conf.d/cryptroot in
    initramfs hook, check for that flag before adding ROOT=$NEWROOT to
    /conf/param.conf in initramfs script. that should prevent the initramfs
    script from adding ROOT=$NEWROOT for resume devices. (closes: #535801)

cryptsetup (2:1.0.7~rc1-1) unstable; urgency=low

  * new upstream release candidate, highlights include:
    - use better error messages if device doesn't exist or is already used by
      other mapping (closes: #492926)
    - check device size when loading LUKS header
    - add some error hint if dm-crypt mapping failed (key size and kernel
      version check for XTS and LRW mode for now) (closes: #494584)
    - display device name when asking for password
    - retain readahead of underlying device, if devmapper version supports it
    - set UUID in device-mapper for LUKS devices
    - define device-mapper crypt UUID maximal length and check for its size
    - add some checks for error codes, fixes warning: ignoring return value...
    - update LUKS homepage in manpage to code.google.com/p/cryptsetup
  * patches/01_fix_make_distclean.patch: removed, incorporated upstream
  * patches/02_manpage.patch: updated, mostly incorporated upstream
  * remove invokation of ./setup-gettext.sh from debian/rules.
  * set $PATH in checks/xfs. Required to make /usr/sbin/xfs_admin work at early
    boot stage. Thanks to Stefan Bender. (closes: #525118)
  * update path to docbook-xsl stylesheet in debian/rules to
    /usr/share/xml/docbook/stylesheet/docbook-xsl/. Add versioned build-depends
    to docbook-xsl (>= 1.74.3+dfsg) for that reason.
  * fix bashisms in scripts/decrypt_opensc, thanks to Raphael Geissert.
    (closes: #530060)
  * fix UUID and LABEL handling for cryptroot, thanks to Kees Cook and ubuntu.
    (closes: #522041)
  * add ROOT=$NEWROOT to /conf/param.conf in cryptroot initramfs script. This
    is required for lilo to find the correct root device. Thanks to Pyotr
    Berezhkov and Christian Schaarschmidt. (closes: #511447, #511840)
  * replace mini autogen.sh with autoreconf in debian/rules. Thanks to Bastian
    Kleineidam. (closes: #522798)
  * support escaped newlines in askpass.c, thanks to Kees Cook and ubuntu.
    (closes: #528133)
  * use the same passphrase prompt in init script and initramfs script
  * mention the incoherent behaviour of cryptsetup create/luksOpen with invalid
    passwords/keys in cryptsetup manpage. (closes: #529359)
  * bump standards-version to 3.8.2, no changes required.
  * add 'X-Interactive: true' LSB-header to initscripts.
  * fix bash_completion script to use 'command ls'. that way it now works with
    aliased ls as well. thanks to Daniel Dehennin. (closes: #535351)
 -- Martin Pitt <email address hidden>   Wed, 11 Nov 2009 15:04:27 +0100

Upload details

Uploaded by:
Martin Pitt
Uploaded to:
Lucid
Original maintainer:
Ubuntu Development Team
Architectures:
any
Section:
admin
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
cryptsetup_1.1.0~rc2.orig.tar.gz 499.2 KiB b3adc7f48eb1867752a4da7f7682cde8ca5bc8b098f47b7ed6475f4abe67da8a
cryptsetup_1.1.0~rc2-1ubuntu1.diff.gz 72.7 KiB 00811a8dae2138c588669d6920814646df903f74fe97b5df51f76d5a2229cf3f
cryptsetup_1.1.0~rc2-1ubuntu1.dsc 1.6 KiB 1feea65037a6ec8022735ff52c4eaf49fb2b99aa9bb557378b6b050dc9fa150b

View changes file

Binary packages built by this source

cryptsetup: No summary available for cryptsetup in ubuntu lucid.

No description available for cryptsetup in ubuntu lucid.

cryptsetup-udeb: No summary available for cryptsetup-udeb in ubuntu lucid.

No description available for cryptsetup-udeb in ubuntu lucid.

libcryptsetup-dev: No summary available for libcryptsetup-dev in ubuntu lucid.

No description available for libcryptsetup-dev in ubuntu lucid.

libcryptsetup1: No summary available for libcryptsetup1 in ubuntu lucid.

No description available for libcryptsetup1 in ubuntu lucid.