Package: dropbear-initramfs
Version: 2025.88-2
Severity: normal
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
Since Debian 13, i'm no longer able to unlock the LUKS cryptroot through SSH.
In Debian 12, I was able to do something like : echo "password" | ssh
root@remote_server and it worked to unlock the LUKS partition.
However, now it's no longer possible and the LUKS partition stays locked. I do
not know if it is related to a change with dropbear or another package in
Debian 13.
* What exactly did you do (or not do) that was effective (or
ineffective)?
echo "password" | ssh root@remote_server
* What was the outcome of this action?
LUKS partition is not unlocked.
* What outcome did you expect instead?
LUKS is unlocked.
*** End of the template - remove these template lines ***
-- System Information:
Debian Release: 13.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.6.87.2-microsoft-standard-WSL2 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages dropbear-initramfs depends on:
pn busybox | busybox-static <none>
pn dropbear-bin <none>
pn initramfs-tools <none>
ii udev 257.8-1~deb13u2
Versions of packages dropbear-initramfs recommends:
pn cryptsetup-initramfs <none>
dropbear-initramfs suggests no packages.