[ubuntu/yakkety-proposed] cryptsetup 2:1.7.2-0ubuntu1 (Accepted)
Unit 193
unit193 at ubuntu.com
Fri Jul 1 08:59:13 UTC 2016
cryptsetup (2:1.7.2-0ubuntu1) yakkety; urgency=medium
* New upstream release, merge from Debian unstable (LP: #1548137). Remaining
Ubuntu changes:
- debian/control:
+ Bump initramfs-tools Suggests to Depends: so system is not
potentially rendered unbootable.
+ Depend on plymouth.
+ Invert the "busybox | busybox-static" Recommends, as the latter
is the one we ship in main as part of the ubuntu-standard task.
+ Drop explicit libgcrypt20 dependency from libcryptsetup4.
cryptsetup (2:1.7.0-2) unstable; urgency=medium
[ Guilhem Moulin ]
* Fix cryptsetup shutdown procedure on sysvinit, broken since 2:1.7.0-1 for
systems without active crypttab entry at the time fo the shutdown.
(Closes: #792552, #810380)
cryptsetup (2:1.7.0-1) unstable; urgency=medium
[ Jonas Meurer ]
* new upstream release 1.7.0. Highlights include:
- cryptsetup TCRYPT mode now supports VeraCrypt devices (in 1.6.7)
- fix activation using (UNSECURE) ECB mode (in 1.6.7) (closes: #784129)
- properly support stdin "-" handling for luksAddKey for both new and old
keyfile parameters. (in 1.6.8)
- default hash function is now SHA256 (used in key derivation function
and anti-forensic splitter) (in 1.7.0)
* debian/cryptsetup.functions, debian/initramfs/cryptroot.{hook,script}: add
support for veracrypt option to cryptdisks initscript and cryptroot
initramfs script. (closes: #806290)
* debian/cryptdisks.functions: don't use '--key-file=-' with the tcrypt
extension. This fixes the tcrypt implementation in the initscript and
provides a workaround for upstream issue #269.
* debian/cryptsetup.bug-script: do not send potentially private information
without prior user confirmation in reportbug script. (Closes: #783298)
* debian/cryptsetup.apport: do not send potentially private information
without prior user confirmation in apport hook.
* debian/control, debian/NEWS: fix links to cryptsetup homepage/FAQ. Homepage
(and FAQ) moved from code.google.com to gitlab.com. (closes: #781674)
* debian/*: update hyperlinks to use https instead of http where appropriate.
* debian/rules, debian/post{inst,rm}: don't install cryptdisks_st{art,op}
symlinks to /usr/sbin if everything-in-usr directories scheme is used.
Thanks to Marco d'Itri for the patch. (closes: #767921)
* debian/scripts/luksformat: search for mkfs binaries in /usr/sbin, /usr/bin,
/sbin and /bin (default order in $PATH). This fixes luksformat for btrfs
filesystems. (closes: #805353)
* debian/dirs, debian/rules: install cryptdisks bash-completion script into
/usr/share/bash-completion/completions.
* debian/cryptdisks.functions: iterate over remaining open crypttab devices
in do_stop() in order to close dependent devices and don't freeze the
shutdown process. Thanks to Avatar for the patch. (closes: #792552)
* debian/rules: set V=1 in order to make build logs usable for blhc.
* debian/rules: set DEB_VERSION and DEB_DATE in a way to make cryptsetup
build reproducible. Thanks to Dhole and Valentin Lorentz for patches.
(closes: #780864, #794106)
* debian/cryptdisks.functions: bring the passphrase prompt in line with the
one from initramfs script in order to make the user experience more
consistent. (closes: #772943)
* debian/initramfs/cryptroot-script: move sanity checks of $cryptkeyscript
and potential expansion to '/lib/cryptsetup/askpass' to the beginning of
setup_mapping().
[ Guilhem Moulin ]
* debian/README.{Debian,remote}: remove dropbear-specific configuration and
point to dropbear-initramfs instead. Since version 2015.70-1, dropbear
ships dropbear-specific initramfs configuration and documentation in an
own binary package dropbear-initramfs. (closes: #801471)
* debian/initramfs/cryptroot-{hook,script}: add support for 'keyslot' option
to cryptroot initramfs script. (closes: #801479)
* debian/README.initramfs, debian/initramfs/cryptroot-hook: add support for
storing keyfiles directly in the initrd. (closes: #786578)
* debian/initramfs/cryptroot-hook: display a warning for invalid source
devices. (closes: #720515, #781955, #784435)
* debian/askpass.c: add plymouth support to the askpass helper command.
* debian/cryptdisks.functions, debian/initramfs/cryptroot-script: remove
special treatment of plymouth installations now that askpass supports
plymouth natively.
* debian/initramfs/cryptroot-unlock(-hook): add initramfs hook and script
to remotely unlock cryptroot devices. (closes: #782024, #697156)
Date: Wed, 22 Jun 2016 16:30:01 -0400
Changed-By: Unit 193 <unit193 at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Martin Pitt <martin.pitt at ubuntu.com>
https://launchpad.net/ubuntu/+source/cryptsetup/2:1.7.2-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 22 Jun 2016 16:30:01 -0400
Source: cryptsetup
Binary: cryptsetup cryptsetup-bin libcryptsetup4 libcryptsetup-dev cryptsetup-udeb libcryptsetup4-udeb
Architecture: source
Version: 2:1.7.2-0ubuntu1
Distribution: yakkety
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Unit 193 <unit193 at ubuntu.com>
Description:
cryptsetup - disk encryption support - startup scripts
cryptsetup-bin - disk encryption support - command line tools
cryptsetup-udeb - disk encryption support - commandline tools (udeb) (udeb)
libcryptsetup-dev - disk encryption support - development files
libcryptsetup4 - disk encryption support - shared library
libcryptsetup4-udeb - disk encryption support - shared library (udeb) (udeb)
Closes: 697156 720515 767921 772943 780864 781674 781955 782024 783298 784129 784435 786578 792552 794106 801471 801479 805353 806290 810380
Launchpad-Bugs-Fixed: 1548137
Changes:
cryptsetup (2:1.7.2-0ubuntu1) yakkety; urgency=medium
.
* New upstream release, merge from Debian unstable (LP: #1548137). Remaining
Ubuntu changes:
- debian/control:
+ Bump initramfs-tools Suggests to Depends: so system is not
potentially rendered unbootable.
+ Depend on plymouth.
+ Invert the "busybox | busybox-static" Recommends, as the latter
is the one we ship in main as part of the ubuntu-standard task.
+ Drop explicit libgcrypt20 dependency from libcryptsetup4.
.
cryptsetup (2:1.7.0-2) unstable; urgency=medium
.
[ Guilhem Moulin ]
* Fix cryptsetup shutdown procedure on sysvinit, broken since 2:1.7.0-1 for
systems without active crypttab entry at the time fo the shutdown.
(Closes: #792552, #810380)
.
cryptsetup (2:1.7.0-1) unstable; urgency=medium
.
[ Jonas Meurer ]
* new upstream release 1.7.0. Highlights include:
- cryptsetup TCRYPT mode now supports VeraCrypt devices (in 1.6.7)
- fix activation using (UNSECURE) ECB mode (in 1.6.7) (closes: #784129)
- properly support stdin "-" handling for luksAddKey for both new and old
keyfile parameters. (in 1.6.8)
- default hash function is now SHA256 (used in key derivation function
and anti-forensic splitter) (in 1.7.0)
* debian/cryptsetup.functions, debian/initramfs/cryptroot.{hook,script}: add
support for veracrypt option to cryptdisks initscript and cryptroot
initramfs script. (closes: #806290)
* debian/cryptdisks.functions: don't use '--key-file=-' with the tcrypt
extension. This fixes the tcrypt implementation in the initscript and
provides a workaround for upstream issue #269.
* debian/cryptsetup.bug-script: do not send potentially private information
without prior user confirmation in reportbug script. (Closes: #783298)
* debian/cryptsetup.apport: do not send potentially private information
without prior user confirmation in apport hook.
* debian/control, debian/NEWS: fix links to cryptsetup homepage/FAQ. Homepage
(and FAQ) moved from code.google.com to gitlab.com. (closes: #781674)
* debian/*: update hyperlinks to use https instead of http where appropriate.
* debian/rules, debian/post{inst,rm}: don't install cryptdisks_st{art,op}
symlinks to /usr/sbin if everything-in-usr directories scheme is used.
Thanks to Marco d'Itri for the patch. (closes: #767921)
* debian/scripts/luksformat: search for mkfs binaries in /usr/sbin, /usr/bin,
/sbin and /bin (default order in $PATH). This fixes luksformat for btrfs
filesystems. (closes: #805353)
* debian/dirs, debian/rules: install cryptdisks bash-completion script into
/usr/share/bash-completion/completions.
* debian/cryptdisks.functions: iterate over remaining open crypttab devices
in do_stop() in order to close dependent devices and don't freeze the
shutdown process. Thanks to Avatar for the patch. (closes: #792552)
* debian/rules: set V=1 in order to make build logs usable for blhc.
* debian/rules: set DEB_VERSION and DEB_DATE in a way to make cryptsetup
build reproducible. Thanks to Dhole and Valentin Lorentz for patches.
(closes: #780864, #794106)
* debian/cryptdisks.functions: bring the passphrase prompt in line with the
one from initramfs script in order to make the user experience more
consistent. (closes: #772943)
* debian/initramfs/cryptroot-script: move sanity checks of $cryptkeyscript
and potential expansion to '/lib/cryptsetup/askpass' to the beginning of
setup_mapping().
.
[ Guilhem Moulin ]
* debian/README.{Debian,remote}: remove dropbear-specific configuration and
point to dropbear-initramfs instead. Since version 2015.70-1, dropbear
ships dropbear-specific initramfs configuration and documentation in an
own binary package dropbear-initramfs. (closes: #801471)
* debian/initramfs/cryptroot-{hook,script}: add support for 'keyslot' option
to cryptroot initramfs script. (closes: #801479)
* debian/README.initramfs, debian/initramfs/cryptroot-hook: add support for
storing keyfiles directly in the initrd. (closes: #786578)
* debian/initramfs/cryptroot-hook: display a warning for invalid source
devices. (closes: #720515, #781955, #784435)
* debian/askpass.c: add plymouth support to the askpass helper command.
* debian/cryptdisks.functions, debian/initramfs/cryptroot-script: remove
special treatment of plymouth installations now that askpass supports
plymouth natively.
* debian/initramfs/cryptroot-unlock(-hook): add initramfs hook and script
to remotely unlock cryptroot devices. (closes: #782024, #697156)
Checksums-Sha1:
edac1a6a055a4bbebdd80526139c3b881abed08b 2738 cryptsetup_1.7.2-0ubuntu1.dsc
1b7005c0f8ad286a7f3d65e99cb555597666605c 1222688 cryptsetup_1.7.2.orig.tar.xz
6c96146850de810d0c941b30851a2080155be0f3 92800 cryptsetup_1.7.2-0ubuntu1.debian.tar.xz
Checksums-Sha256:
569c8a51075dbec1e8cf3051ee0d00c6fc26ba36c7740cba0ed148433cdc8331 2738 cryptsetup_1.7.2-0ubuntu1.dsc
dbb35dbf5f0c1749168c86c913fe98e872247bfc8425314b494c2423e7e43342 1222688 cryptsetup_1.7.2.orig.tar.xz
fd7bacda2d19991d0066de16ded62a21650a3e84bea86dded3a4ccc54aa499d4 92800 cryptsetup_1.7.2-0ubuntu1.debian.tar.xz
Files:
2653874f08a0045e91d258274d21e166 2738 admin optional cryptsetup_1.7.2-0ubuntu1.dsc
a11a140cea496961222170944db01fc1 1222688 admin optional cryptsetup_1.7.2.orig.tar.xz
12a2131841d8fda5308e8847c3ab1eba 92800 admin optional cryptsetup_1.7.2-0ubuntu1.debian.tar.xz
Original-Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=wo6n
-----END PGP SIGNATURE-----
More information about the Yakkety-changes
mailing list