[ubuntu/yakkety-proposed] cryptsetup 2:1.7.2-0ubuntu1 (Accepted)

Unit 193 unit193 at ubuntu.com
Fri Jul 1 08:59:13 UTC 2016


cryptsetup (2:1.7.2-0ubuntu1) yakkety; urgency=medium

  * New upstream release, merge from Debian unstable (LP: #1548137). Remaining
    Ubuntu changes:
    - debian/control:
      + Bump initramfs-tools Suggests to Depends: so system is not
        potentially rendered unbootable.
      + Depend on plymouth.
      + Invert the "busybox | busybox-static" Recommends, as the latter
        is the one we ship in main as part of the ubuntu-standard task.
      + Drop explicit libgcrypt20 dependency from libcryptsetup4.

cryptsetup (2:1.7.0-2) unstable; urgency=medium

  [ Guilhem Moulin ]
  * Fix cryptsetup shutdown procedure on sysvinit, broken since 2:1.7.0-1 for
    systems without active crypttab entry at the time fo the shutdown.
    (Closes: #792552, #810380)

cryptsetup (2:1.7.0-1) unstable; urgency=medium

  [ Jonas Meurer ]
  * new upstream release 1.7.0. Highlights include:
    - cryptsetup TCRYPT mode now supports VeraCrypt devices (in 1.6.7)
    - fix activation using (UNSECURE) ECB mode (in 1.6.7) (closes: #784129)
    - properly support stdin "-" handling for luksAddKey for both new and old
      keyfile parameters. (in 1.6.8)
    - default hash function is now SHA256 (used in key derivation function
      and anti-forensic splitter) (in 1.7.0)
  * debian/cryptsetup.functions, debian/initramfs/cryptroot.{hook,script}: add
    support for veracrypt option to cryptdisks initscript and cryptroot
    initramfs script. (closes: #806290)
  * debian/cryptdisks.functions: don't use '--key-file=-' with the tcrypt
    extension. This fixes the tcrypt implementation in the initscript and
    provides a workaround for upstream issue #269.
  * debian/cryptsetup.bug-script: do not send potentially private information
    without prior user confirmation in reportbug script. (Closes: #783298)
  * debian/cryptsetup.apport: do not send potentially private information
    without prior user confirmation in apport hook.
  * debian/control, debian/NEWS: fix links to cryptsetup homepage/FAQ. Homepage
    (and FAQ) moved from code.google.com to gitlab.com. (closes: #781674)
  * debian/*: update hyperlinks to use https instead of http where appropriate.
  * debian/rules, debian/post{inst,rm}: don't install cryptdisks_st{art,op}
    symlinks to /usr/sbin if everything-in-usr directories scheme is used.
    Thanks to Marco d'Itri for the patch. (closes: #767921)
  * debian/scripts/luksformat: search for mkfs binaries in /usr/sbin, /usr/bin,
    /sbin and /bin (default order in $PATH). This fixes luksformat for btrfs
    filesystems. (closes: #805353)
  * debian/dirs, debian/rules: install cryptdisks bash-completion script into
    /usr/share/bash-completion/completions.
  * debian/cryptdisks.functions: iterate over remaining open crypttab devices
    in do_stop() in order to close dependent devices and don't freeze the
    shutdown process. Thanks to Avatar for the patch. (closes: #792552)
  * debian/rules: set V=1 in order to make build logs usable for blhc.
  * debian/rules: set DEB_VERSION and DEB_DATE in a way to make cryptsetup
    build reproducible. Thanks to Dhole and Valentin Lorentz for patches.
    (closes: #780864, #794106)
  * debian/cryptdisks.functions: bring the passphrase prompt in line with the
    one from initramfs script in order to make the user experience more
    consistent. (closes: #772943)
  * debian/initramfs/cryptroot-script: move sanity checks of $cryptkeyscript
    and potential expansion to '/lib/cryptsetup/askpass' to the beginning of
    setup_mapping().

  [ Guilhem Moulin ]
  * debian/README.{Debian,remote}: remove dropbear-specific configuration and
    point to dropbear-initramfs instead. Since version 2015.70-1, dropbear
    ships dropbear-specific initramfs configuration and documentation in an
    own binary package dropbear-initramfs. (closes: #801471)
  * debian/initramfs/cryptroot-{hook,script}: add support for 'keyslot' option
    to cryptroot initramfs script. (closes: #801479)
  * debian/README.initramfs, debian/initramfs/cryptroot-hook: add support for
    storing keyfiles directly in the initrd. (closes: #786578)
  * debian/initramfs/cryptroot-hook: display a warning for invalid source
    devices. (closes: #720515, #781955, #784435)
  * debian/askpass.c: add plymouth support to the askpass helper command.
  * debian/cryptdisks.functions, debian/initramfs/cryptroot-script: remove
    special treatment of plymouth installations now that askpass supports
    plymouth natively.
  * debian/initramfs/cryptroot-unlock(-hook): add initramfs hook and script
    to remotely unlock cryptroot devices. (closes: #782024, #697156)

Date: Wed, 22 Jun 2016 16:30:01 -0400
Changed-By: Unit 193 <unit193 at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Martin Pitt <martin.pitt at ubuntu.com>
https://launchpad.net/ubuntu/+source/cryptsetup/2:1.7.2-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 22 Jun 2016 16:30:01 -0400
Source: cryptsetup
Binary: cryptsetup cryptsetup-bin libcryptsetup4 libcryptsetup-dev cryptsetup-udeb libcryptsetup4-udeb
Architecture: source
Version: 2:1.7.2-0ubuntu1
Distribution: yakkety
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Unit 193 <unit193 at ubuntu.com>
Description:
 cryptsetup - disk encryption support - startup scripts
 cryptsetup-bin - disk encryption support - command line tools
 cryptsetup-udeb - disk encryption support - commandline tools (udeb) (udeb)
 libcryptsetup-dev - disk encryption support - development files
 libcryptsetup4 - disk encryption support - shared library
 libcryptsetup4-udeb - disk encryption support - shared library (udeb) (udeb)
Closes: 697156 720515 767921 772943 780864 781674 781955 782024 783298 784129 784435 786578 792552 794106 801471 801479 805353 806290 810380
Launchpad-Bugs-Fixed: 1548137
Changes:
 cryptsetup (2:1.7.2-0ubuntu1) yakkety; urgency=medium
 .
   * New upstream release, merge from Debian unstable (LP: #1548137). Remaining
     Ubuntu changes:
     - debian/control:
       + Bump initramfs-tools Suggests to Depends: so system is not
         potentially rendered unbootable.
       + Depend on plymouth.
       + Invert the "busybox | busybox-static" Recommends, as the latter
         is the one we ship in main as part of the ubuntu-standard task.
       + Drop explicit libgcrypt20 dependency from libcryptsetup4.
 .
 cryptsetup (2:1.7.0-2) unstable; urgency=medium
 .
   [ Guilhem Moulin ]
   * Fix cryptsetup shutdown procedure on sysvinit, broken since 2:1.7.0-1 for
     systems without active crypttab entry at the time fo the shutdown.
     (Closes: #792552, #810380)
 .
 cryptsetup (2:1.7.0-1) unstable; urgency=medium
 .
   [ Jonas Meurer ]
   * new upstream release 1.7.0. Highlights include:
     - cryptsetup TCRYPT mode now supports VeraCrypt devices (in 1.6.7)
     - fix activation using (UNSECURE) ECB mode (in 1.6.7) (closes: #784129)
     - properly support stdin "-" handling for luksAddKey for both new and old
       keyfile parameters. (in 1.6.8)
     - default hash function is now SHA256 (used in key derivation function
       and anti-forensic splitter) (in 1.7.0)
   * debian/cryptsetup.functions, debian/initramfs/cryptroot.{hook,script}: add
     support for veracrypt option to cryptdisks initscript and cryptroot
     initramfs script. (closes: #806290)
   * debian/cryptdisks.functions: don't use '--key-file=-' with the tcrypt
     extension. This fixes the tcrypt implementation in the initscript and
     provides a workaround for upstream issue #269.
   * debian/cryptsetup.bug-script: do not send potentially private information
     without prior user confirmation in reportbug script. (Closes: #783298)
   * debian/cryptsetup.apport: do not send potentially private information
     without prior user confirmation in apport hook.
   * debian/control, debian/NEWS: fix links to cryptsetup homepage/FAQ. Homepage
     (and FAQ) moved from code.google.com to gitlab.com. (closes: #781674)
   * debian/*: update hyperlinks to use https instead of http where appropriate.
   * debian/rules, debian/post{inst,rm}: don't install cryptdisks_st{art,op}
     symlinks to /usr/sbin if everything-in-usr directories scheme is used.
     Thanks to Marco d'Itri for the patch. (closes: #767921)
   * debian/scripts/luksformat: search for mkfs binaries in /usr/sbin, /usr/bin,
     /sbin and /bin (default order in $PATH). This fixes luksformat for btrfs
     filesystems. (closes: #805353)
   * debian/dirs, debian/rules: install cryptdisks bash-completion script into
     /usr/share/bash-completion/completions.
   * debian/cryptdisks.functions: iterate over remaining open crypttab devices
     in do_stop() in order to close dependent devices and don't freeze the
     shutdown process. Thanks to Avatar for the patch. (closes: #792552)
   * debian/rules: set V=1 in order to make build logs usable for blhc.
   * debian/rules: set DEB_VERSION and DEB_DATE in a way to make cryptsetup
     build reproducible. Thanks to Dhole and Valentin Lorentz for patches.
     (closes: #780864, #794106)
   * debian/cryptdisks.functions: bring the passphrase prompt in line with the
     one from initramfs script in order to make the user experience more
     consistent. (closes: #772943)
   * debian/initramfs/cryptroot-script: move sanity checks of $cryptkeyscript
     and potential expansion to '/lib/cryptsetup/askpass' to the beginning of
     setup_mapping().
 .
   [ Guilhem Moulin ]
   * debian/README.{Debian,remote}: remove dropbear-specific configuration and
     point to dropbear-initramfs instead. Since version 2015.70-1, dropbear
     ships dropbear-specific initramfs configuration and documentation in an
     own binary package dropbear-initramfs. (closes: #801471)
   * debian/initramfs/cryptroot-{hook,script}: add support for 'keyslot' option
     to cryptroot initramfs script. (closes: #801479)
   * debian/README.initramfs, debian/initramfs/cryptroot-hook: add support for
     storing keyfiles directly in the initrd. (closes: #786578)
   * debian/initramfs/cryptroot-hook: display a warning for invalid source
     devices. (closes: #720515, #781955, #784435)
   * debian/askpass.c: add plymouth support to the askpass helper command.
   * debian/cryptdisks.functions, debian/initramfs/cryptroot-script: remove
     special treatment of plymouth installations now that askpass supports
     plymouth natively.
   * debian/initramfs/cryptroot-unlock(-hook): add initramfs hook and script
     to remotely unlock cryptroot devices. (closes: #782024, #697156)
Checksums-Sha1:
 edac1a6a055a4bbebdd80526139c3b881abed08b 2738 cryptsetup_1.7.2-0ubuntu1.dsc
 1b7005c0f8ad286a7f3d65e99cb555597666605c 1222688 cryptsetup_1.7.2.orig.tar.xz
 6c96146850de810d0c941b30851a2080155be0f3 92800 cryptsetup_1.7.2-0ubuntu1.debian.tar.xz
Checksums-Sha256:
 569c8a51075dbec1e8cf3051ee0d00c6fc26ba36c7740cba0ed148433cdc8331 2738 cryptsetup_1.7.2-0ubuntu1.dsc
 dbb35dbf5f0c1749168c86c913fe98e872247bfc8425314b494c2423e7e43342 1222688 cryptsetup_1.7.2.orig.tar.xz
 fd7bacda2d19991d0066de16ded62a21650a3e84bea86dded3a4ccc54aa499d4 92800 cryptsetup_1.7.2-0ubuntu1.debian.tar.xz
Files:
 2653874f08a0045e91d258274d21e166 2738 admin optional cryptsetup_1.7.2-0ubuntu1.dsc
 a11a140cea496961222170944db01fc1 1222688 admin optional cryptsetup_1.7.2.orig.tar.xz
 12a2131841d8fda5308e8847c3ab1eba 92800 admin optional cryptsetup_1.7.2-0ubuntu1.debian.tar.xz
Original-Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=wo6n
-----END PGP SIGNATURE-----


More information about the Yakkety-changes mailing list