Back to dropbear PTS page

Accepted dropbear 2020.81-4 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 19 Aug 2021 13:08:39 +0200
Source: dropbear
Architecture: source
Version: 2020.81-4
Distribution: unstable
Urgency: low
Maintainer: Guilhem Moulin <guilhem@debian.org>
Changed-By: Guilhem Moulin <guilhem@debian.org>
Closes: 907082 958526 962132
Changes:
 dropbear (2020.81-4) unstable; urgency=low
 .
   * d/control: Remove <pape> from Uploaders. Thanks to gerrit for their work
     on the dropbear package! (Closes: #907082)
   * d/control: dropbear: Demote 'dropbear-initramfs' to Suggests.
     (Closes: #962132)
   * d/control: Bump Standards-Version to 4.6.0 (no changes necessary).
   * initramfs boot script: Don't exit when IP={none,off}. (Closes: #958526)
   * Rename /etc/dropbear-initramfs to /etc/dropbear/initramfs, and
     /etc/dropbear-initramfs/config to /etc/dropbear/initramfs/dropbear.conf.
   * d/t/on-lvm-and-luks: Near-complete rewrite:
     - Adjust partition sizes to account for the current needs of the distro.
     - Set 'Architecture: amd64' to properly skip the test on other
       architectures.
     - Run mmdebstrap(1) with --mode=auto instead of --mode=root.  This uses
       --mode=unshare when kernel.unprivileged_userns_clone is set to 1,
       otherwise --mode=fakeroot (#944929 is now fixed)
     - Consolidate style.
     - Ensure we're testing the current dropbear-initramfs version.
     - Use KVM acceleration when possible.  Also, try to create /dev/kvm if
       missing (for instance in a chroot where /dev is not managed by udev).
     - Raise timeout values so the test has a chance to complete when KVM is
       not supported/used.
     - Adjust copyright.
     - Replace 'Depends: libguestfs-tools, sleepenh, time' with 'Depends:
       cryptsetup-initramfs, fdisk, initramfs-tools-core, lvm2'.  Instead of
       using guestfish(1) to set up a first system which is in turn used to set
       up the target system, we build a custom initramfs image containing the
       required dependencies, boot into it and entirely set up the target
       system from there.
     - Unconditionally dump (in real time) the guest's serial console into the
       standard output.  Before it was only done upon error.
     - Use a random key file instead of a hardcoded/pre-chosen passphrase.
     - Restrict the guest's ability to reach external hosts.
     - Assign static addresses under 10.0.2.128/25 instead of using DHCP.  That
       way we don't have to include 'isc-dhcp-client' in the debootstrap chroot.
     - Use dropbear instead of OpenSSH in the main system as well, not just in
       the initramfs.  After all we're testing dropbear here :-)
     - Instead of having the root and swap (resume) devices each in its own LV
       held by a LUKS device, we put the root FS directly on the root device,
       and add a new plain dm-crypt partition for a transient swap device.
       This removes 'Depends: lvm2'.  Consequently, the test is renamed to
       'remote-unlocking'.
Checksums-Sha1:
 975171b439bc7d0a2d1ce07709e49a5993b04d7b 2537 dropbear_2020.81-4.dsc
 6efc4b800550d5341240979f0aec731f49a7f4bb 30824 dropbear_2020.81-4.debian.tar.xz
 a15da74425db3f186e495ee32611e8a51e56297f 6967 dropbear_2020.81-4_amd64.buildinfo
Checksums-Sha256:
 bd1ef39a72f5f6b142e55d3d172ba495dde819b7641a51c253c2f4e83f2d0883 2537 dropbear_2020.81-4.dsc
 c7d8575fabb70ad6b402f70ca50c5b46343d42fc440f77be753bf23b66d790c0 30824 dropbear_2020.81-4.debian.tar.xz
 224461575fb107ffc9e56b0b0092c2f7bee57d67ace4c4101b0c3f2c1993f0dd 6967 dropbear_2020.81-4_amd64.buildinfo
Files:
 6ff4a54c4a21cccd8543e97da53f0739 2537 net optional dropbear_2020.81-4.dsc
 771793803107c1361746f0db219655d1 30824 net optional dropbear_2020.81-4.debian.tar.xz
 ff2cb8e6b11f333bfcd1516fc5281de2 6967 net optional dropbear_2020.81-4_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Yi5e
-----END PGP SIGNATURE-----