It works with a classic interactive SSH connection like :  ssh 
root@remote_server (then type the passphrase) but not if I want to unlock 
automatically without an interactive shell or force pseudo-terminal like : echo 
"passphrase" | ssh -tt root@remote_server.



Example :



matthieu@YYYYYYY:~$ echo 'passphrase' | ssh -tt 
[email protected]<mailto:[email protected]> Enter passphrase for key 
'/home/matthieu/.ssh/id_ed25519':

passphrase

Connection to 172.19.128.3 closed.

matthieu@ YYYYYYY:~$



But the LUKS partition is still locked.



For the debug logs :



matthieu@ YYYYYYY:~$ echo 'passphrase' | ssh -vvvv -tt 
[email protected]<mailto:[email protected]>

debug1: OpenSSH_10.0p2 Debian-7, OpenSSL 3.5.4 30 Sep 2025

debug3: Running on Linux 6.6.87.2-microsoft-standard-WSL2 #1 SMP 
PREEMPT_DYNAMIC Thu Jun  5 18:30:46 UTC 2025 x86_64

debug3: Started with: ssh -vvvv -tt [email protected]<mailto:[email protected]>

debug1: Reading configuration data /etc/ssh/ssh_config

debug3: /etc/ssh/ssh_config line 19: Including file 
/etc/ssh/ssh_config.d/20-systemd-ssh-proxy.conf depth 0

debug1: Reading configuration data 
/etc/ssh/ssh_config.d/20-systemd-ssh-proxy.conf

debug1: /etc/ssh/ssh_config line 21: Applying options for *

debug2: resolve_canonicalize: hostname 172.19.128.3 is address

debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> 
'/home/matthieu/.ssh/known_hosts'

debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> 
'/home/matthieu/.ssh/known_hosts2'

debug3: channel_clear_timeouts: clearing

debug3: ssh_connect_direct: entering

debug1: Connecting to 172.19.128.3 [172.19.128.3] port 22.

debug3: set_sock_tos: set socket 3 IP_TOS 0x10

debug1: Connection established.

debug1: identity file /home/matthieu/.ssh/id_rsa type 0

debug1: identity file /home/matthieu/.ssh/id_rsa-cert type -1

debug1: identity file /home/matthieu/.ssh/id_ecdsa type -1

debug1: identity file /home/matthieu/.ssh/id_ecdsa-cert type -1

debug1: identity file /home/matthieu/.ssh/id_ecdsa_sk type -1

debug1: identity file /home/matthieu/.ssh/id_ecdsa_sk-cert type -1

debug1: identity file /home/matthieu/.ssh/id_ed25519 type 3

debug1: identity file /home/matthieu/.ssh/id_ed25519-cert type -1

debug1: identity file /home/matthieu/.ssh/id_ed25519_sk type -1

debug1: identity file /home/matthieu/.ssh/id_ed25519_sk-cert type -1

debug1: identity file /home/matthieu/.ssh/id_xmss type -1

debug1: identity file /home/matthieu/.ssh/id_xmss-cert type -1

debug1: Local version string SSH-2.0-OpenSSH_10.0p2 Debian-7

debug1: Remote protocol version 2.0, remote software version dropbear_2025.88

debug1: compat_banner: no match: dropbear_2025.88

debug2: fd 3 setting O_NONBLOCK

debug1: Authenticating to 172.19.128.3:22 as 'root'

debug3: record_hostkey: found key type ED25519 in file 
/home/matthieu/.ssh/known_hosts:2

debug3: record_hostkey: found key type RSA in file 
/home/matthieu/.ssh/known_hosts:3

debug3: record_hostkey: found key type ECDSA in file 
/home/matthieu/.ssh/known_hosts:4

debug3: load_hostkeys_file: loaded 3 keys from 172.19.128.3

debug1: load_hostkeys: fopen /home/matthieu/.ssh/known_hosts2: No such file or 
directory

debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory

debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or 
directory

debug3: order_hostkeyalgs: have matching best-preference key type 
[email protected]<mailto:[email protected]>, 
using HostkeyAlgorithms verbatim

debug3: send packet: type 20

debug1: SSH2_MSG_KEXINIT sent

debug3: receive packet: type 20

debug1: SSH2_MSG_KEXINIT received

debug2: local client KEXINIT proposal

debug2: KEX algorithms: 
mlkem768x25519-sha256,sntrup761x25519-sha512,[email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c,[email protected]

debug2: host key algorithms: 
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],rsa-sha2-512,rsa-sha2-256<mailto:[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],rsa-sha2-512,rsa-sha2-256>

debug2: ciphers ctos: 
[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr<mailto:[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr>

debug2: ciphers stoc: 
[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr<mailto:[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr>

debug2: MACs ctos: 
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1<mailto:[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1>

debug2: MACs stoc: 
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1<mailto:[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1>

debug2: compression ctos: none,[email protected]

debug2: compression stoc: none,[email protected]

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: peer server KEXINIT proposal

debug2: KEX algorithms: 
sntrup761x25519-sha512,[email protected],mlkem768x25519-sha256,curve25519-sha256,[email protected],ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group14-sha256,[email protected],[email protected]

debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-256

debug2: ciphers ctos: 
[email protected],aes256-ctr,aes128-ctr<mailto:[email protected],aes256-ctr,aes128-ctr>

debug2: ciphers stoc: 
[email protected],aes256-ctr,aes128-ctr<mailto:[email protected],aes256-ctr,aes128-ctr>

debug2: MACs ctos: hmac-sha2-256

debug2: MACs stoc: hmac-sha2-256

debug2: compression ctos: none

debug2: compression stoc: 
[email protected],zlib,none<mailto:[email protected],zlib,none>

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug3: kex_choose_conf: will use strict KEX ordering

debug1: kex: algorithm: mlkem768x25519-sha256

debug1: kex: host key algorithm: ssh-ed25519

debug1: kex: server->client cipher: 
[email protected]<mailto:[email protected]> MAC: 
<implicit> compression: none

debug1: kex: client->server cipher: 
[email protected]<mailto:[email protected]> MAC: 
<implicit> compression: none

debug3: send packet: type 30

debug1: expecting SSH2_MSG_KEX_ECDH_REPLY

debug3: receive packet: type 31

debug1: SSH2_MSG_KEX_ECDH_REPLY received

debug1: Server host key: ssh-ed25519 
SHA256:fOvY62bvHbmOmKn/P79rKdztp9IsZy8/B1qYnKg14eU

debug3: record_hostkey: found key type ED25519 in file 
/home/matthieu/.ssh/known_hosts:2

debug3: record_hostkey: found key type RSA in file 
/home/matthieu/.ssh/known_hosts:3

debug3: record_hostkey: found key type ECDSA in file 
/home/matthieu/.ssh/known_hosts:4

debug3: load_hostkeys_file: loaded 3 keys from 172.19.128.3

debug1: load_hostkeys: fopen /home/matthieu/.ssh/known_hosts2: No such file or 
directory

debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory

debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or 
directory

debug1: Host '172.19.128.3' is known and matches the ED25519 host key.

debug1: Found key in /home/matthieu/.ssh/known_hosts:2

debug3: send packet: type 21

debug1: ssh_packet_send2_wrapped: resetting send seqnr 3

debug2: ssh_set_newkeys: mode 1

debug1: rekey out after 134217728 blocks

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug3: receive packet: type 21

debug1: ssh_packet_read_poll2: resetting read seqnr 3

debug1: SSH2_MSG_NEWKEYS received

debug2: ssh_set_newkeys: mode 0

debug1: rekey in after 134217728 blocks

debug2: KEX algorithms: 
mlkem768x25519-sha256,sntrup761x25519-sha512,[email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c,[email protected]

debug2: host key algorithms: 
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],rsa-sha2-512,rsa-sha2-256<mailto:[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],rsa-sha2-512,rsa-sha2-256>

debug2: ciphers ctos: 
[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr<mailto:[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr>

debug2: ciphers stoc: 
[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr<mailto:[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr>

debug2: MACs ctos: 
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1<mailto:[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1>

debug2: MACs stoc: 
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1<mailto:[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1>

debug2: compression ctos: none,[email protected]

debug2: compression stoc: none,[email protected]

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug3: send packet: type 5

debug3: receive packet: type 7

debug1: SSH2_MSG_EXT_INFO received

debug3: kex_input_ext_info: extension server-sig-algs

debug1: kex_ext_info_client_parse: 
server-sig-algs=<ssh-ed25519,[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],rsa-sha2-256>

debug3: receive packet: type 6

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug3: send packet: type 50

debug3: receive packet: type 51

debug1: Authentications that can continue: publickey

debug3: start over, passed a different list publickey

debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive,password

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Will attempt key: /home/matthieu/.ssh/id_rsa RSA 
SHA256:5lhS69HmDpcTzahu9mQU88x8icoZyxrGDIH0u6TfeuQ

debug1: Will attempt key: /home/matthieu/.ssh/id_ecdsa

debug1: Will attempt key: /home/matthieu/.ssh/id_ecdsa_sk

debug1: Will attempt key: /home/matthieu/.ssh/id_ed25519 ED25519 
SHA256:aG+NuP9JsqFN5/MtOESA5AI0qmp+mc90d0RzbZpTCeM

debug1: Will attempt key: /home/matthieu/.ssh/id_ed25519_sk

debug1: Will attempt key: /home/matthieu/.ssh/id_xmss

debug2: pubkey_prepare: done

debug1: Offering public key: /home/matthieu/.ssh/id_rsa RSA 
SHA256:5lhS69HmDpcTzahu9mQU88x8icoZyxrGDIH0u6TfeuQ

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 51

debug1: Authentications that can continue: publickey

debug1: Trying private key: /home/matthieu/.ssh/id_ecdsa

debug3: no such identity: /home/matthieu/.ssh/id_ecdsa: No such file or 
directory

debug1: Trying private key: /home/matthieu/.ssh/id_ecdsa_sk

debug3: no such identity: /home/matthieu/.ssh/id_ecdsa_sk: No such file or 
directory

debug1: Offering public key: /home/matthieu/.ssh/id_ed25519 ED25519 
SHA256:aG+NuP9JsqFN5/MtOESA5AI0qmp+mc90d0RzbZpTCeM

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 60

debug1: Server accepts key: /home/matthieu/.ssh/id_ed25519 ED25519 
SHA256:aG+NuP9JsqFN5/MtOESA5AI0qmp+mc90d0RzbZpTCeM

debug3: sign_and_send_pubkey: using publickey with ED25519 
SHA256:aG+NuP9JsqFN5/MtOESA5AI0qmp+mc90d0RzbZpTCeM

debug3: sign_and_send_pubkey: signing using ssh-ed25519 
SHA256:aG+NuP9JsqFN5/MtOESA5AI0qmp+mc90d0RzbZpTCeM

Enter passphrase for key '/home/matthieu/.ssh/id_ed25519':

debug3: send packet: type 50

debug3: receive packet: type 52

Authenticated to 172.19.128.3 ([172.19.128.3]:22) using "publickey".

debug2: fd 4 setting O_NONBLOCK

debug1: channel 0: new session [client-session] (inactive timeout: 0)

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug3: send packet: type 90

debug1: Entering interactive session.

debug1: pledge: filesystem

debug3: client_repledge: enter

debug3: receive packet: type 91

debug2: channel_input_open_confirmation: channel 0: callback start

debug2: fd 3 setting TCP_NODELAY

debug3: set_sock_tos: set socket 3 IP_TOS 0x10

debug2: client_session2_setup: id 0

debug2: channel 0: request pty-req confirm 1

debug1: ssh_tty_make_modes: no fd or tio

debug3: send packet: type 98

debug1: Sending environment.

debug3: Ignored env SHELL

debug3: Ignored env WSL2_GUI_APPS_ENABLED

debug3: Ignored env WSL_DISTRO_NAME

debug3: Ignored env HOMEBREW_PREFIX

debug3: Ignored env NAME

debug3: Ignored env PWD

debug3: Ignored env LOGNAME

debug3: Ignored env WSL_PAC_URL

debug3: Ignored env HOME

debug1: channel 0: setting env LANG = "en_US.UTF-8"

debug2: channel 0: request env confirm 0

debug3: send packet: type 98

debug3: Ignored env WSL_INTEROP

debug3: Ignored env LS_COLORS

debug3: Ignored env WAYLAND_DISPLAY

debug3: Ignored env INFOPATH

debug3: Ignored env TERM

debug3: Ignored env USER

debug3: Ignored env HOMEBREW_CELLAR

debug3: Ignored env DISPLAY

debug3: Ignored env SHLVL

debug3: Ignored env HTTP_PROXY

debug3: Ignored env HOMEBREW_REPOSITORY

debug3: Ignored env http_proxy

debug3: Ignored env XDG_RUNTIME_DIR

debug3: Ignored env WSLENV

debug3: Ignored env PATH

debug3: Ignored env DBUS_SESSION_BUS_ADDRESS

debug3: Ignored env HOSTTYPE

debug3: Ignored env PULSE_SERVER

debug3: Ignored env _

debug2: channel 0: request shell confirm 1

debug3: send packet: type 98

debug3: client_repledge: enter

debug2: channel_input_open_confirmation: channel 0: callback done

debug2: channel 0: open confirm rwindow 24576 rmax 32759

debug3: obfuscate_keystroke_timing: starting: interval ~20ms

debug2: channel 0: read<=0 rfd 4 len 0: closed

debug2: channel 0: read failed

debug2: chan_shutdown_read: channel 0: (i0 o0 sock -1 wfd 4 efd 6 [write])

debug2: channel 0: input open -> drain

debug2: channel 0: ibuf empty

debug2: channel 0: send eof

debug3: send packet: type 96

debug2: channel 0: input drain -> closed

debug3: receive packet: type 99

debug2: channel_input_status_confirm: type 99 id 0

debug2: PTY allocation request accepted on channel 0

debug3: receive packet: type 99

debug2: channel_input_status_confirm: type 99 id 0

debug2: shell request accepted on channel 0 passphrase

debug3: receive packet: type 96

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: chan_shutdown_write: channel 0: (i3 o1 sock -1 wfd 5 efd 6 [write])

debug2: channel 0: output drain -> closed

debug3: receive packet: type 98

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

debug3: receive packet: type 97

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send_close2

debug2: channel 0: send close for remote id 0

debug3: send packet: type 97

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

  #0 client-session (t4 [session] r0 nm0 i3/0 o3/0 e[write]/0 fd -1/-1/6 sock 
-1 cc -1 nc0 io 0x00/0x00)



debug3: obfuscate_keystroke_timing: stopping: no active channels (0 chaff 
packets sent) Connection to 172.19.128.3 closed.

debug3: send packet: type 1

Transferred: sent 4148, received 2420 bytes, in 0.0 seconds Bytes per second: 
sent 120380.5, received 70231.6

debug1: Exit status -1

matthieu@YYYYYYY:~$



This above example does not unlock the LUKS partition on Debian 13 but it does 
on Debian 12.



My dropbear options are : DROPBEAR_OPTIONS="-j -k -s -c cryptroot-unlock"



I noticed this behavior as I use Ansible to unlock physical encrypted servers 
with this task :



  - name: Unlock LUKS with ssh

    delegate_to: localhost

    command:

      cmd: "ssh -tt root@{{ inventory_hostname }}"

      stdin: "{{ luks_pwd }}"

    failed_when: false



Matthieu

On Fri, 5 Dec 2025 15:49:43 +0100 Guilhem Moulin <[email protected]> wrote:
> Control: tag -1 unreproducible moreinfo
>
> Remote SSH locking does work on my system as well as in the autopkgtest.
> Please provide a debug trace by adding `set -x` to
>
>     /usr/share/cryptsetup/initramfs/bin/cryptroot-unlock
>
> (and rebuild the initramfs afterwards).
>
> > Versions of packages dropbear-initramfs depends on:
> > pn  busybox | busybox-static  <none>
> > pn  dropbear-bin              <none>
> > pn  initramfs-tools           <none>
> > ii  udev                      257.8-1~deb13u2
> >
> > Versions of packages dropbear-initramfs recommends:
> > pn  cryptsetup-initramfs  <none>
>
> Doesn't look like a viable system for dropbear-initramfs.  Did you run
> reportbug(1) on another system?
>
> --
> Guilhem.


[cid:[email protected]]<https://cloud.letsignit.com/collect/bc/63dbeb6d7caf9a8987642793?p=BxGxVCptkb6gso09XX9Z77h1m8lEwvSmE1kciRoHVxUyGfqL1RgwZRwtyyoY_GIfYCk_w8Kz5cYiqTcAjPSQWUvxh-FJspjjlDDDQWQj0-P7fYBKZ0kmr3z3xvmbluF_rxT5OaW-c3bv9zu5BEdrLA==>

Matthieu MEURILLON

Administrateur SysOps

+377 92 05 05 89

www.smeg.mc<https://cloud.letsignit.com/collect/bc/63dbeb6d7caf9a8987642793?p=BxGxVCptkb6gso09XX9Z77h1m8lEwvSmE1kciRoHVxUyGfqL1RgwZRwtyyoY_GIfYCk_w8Kz5cYiqTcAjPSQWazpElQ9VAA08BGNyh08yrJw6Nu8A6RRalGtc0WuG4oU>



[Facebook]<https://cloud.letsignit.com/collect/bc/63dbeb6d7caf9a8987642793?p=BxGxVCptkb6gso09XX9Z77h1m8lEwvSmE1kciRoHVxUyGfqL1RgwZRwtyyoY_GIfYCk_w8Kz5cYiqTcAjPSQWUvxh-FJspjjlDDDQWQj0-N0T6tFMYApEhXbZeoXLKRD43y6bjX-elrtp2DGZXhQT6hA8fSF2EWwNO7eiyX5nvI=>

[Twitter]<https://cloud.letsignit.com/collect/bc/63dbeb6d7caf9a8987642793?p=BxGxVCptkb6gso09XX9Z77h1m8lEwvSmE1kciRoHVxUyGfqL1RgwZRwtyyoY_GIfYCk_w8Kz5cYiqTcAjPSQWUvxh-FJspjjlDDDQWQj0-Plvw-1c6BgD1ma4h6Bd7BsnIpogO5hOLbYMLW1s3gNNg==>

[Instagram]<https://cloud.letsignit.com/collect/bc/63dbeb6d7caf9a8987642793?p=BxGxVCptkb6gso09XX9Z77h1m8lEwvSmE1kciRoHVxUyGfqL1RgwZRwtyyoY_GIfYCk_w8Kz5cYiqTcAjPSQWUvxh-FJspjjlDDDQWQj0-OutHKrSAOAB-ZFgzhWDZn4Rxm7HGjQijbOWCmg0D5ToxQTTmPUjJGaiVnQ6FKPiPw=>

[LinkedIn]<https://cloud.letsignit.com/collect/bc/63dbeb6d7caf9a8987642793?p=BxGxVCptkb6gso09XX9Z77h1m8lEwvSmE1kciRoHVxUyGfqL1RgwZRwtyyoY_GIfYCk_w8Kz5cYiqTcAjPSQWUvxh-FJspjjlDDDQWQj0-NvXWEQB9EFnTGMHp0zHr0aoyRELWg4Et1jxHe93MY4H-zwHpKctEpXyWNBWSjKIlz4Glgxm-kwHSSbebyiQ68vbbfkElz46Rb_KU0DX9lL868U-TmlvnN27_c7uQRHayw=>


Vos données personnelles sont traitées par le groupe SMEG, dans le cadre du 
traitement ayant pour finalité "Gestion de la messagerie professionnelle 
d'entreprise". Conformément à la Loi n° 1.565 du 3 décembre 2024 relative à la 
protection des données personnelles, vous disposez d'un droit d'accès, de 
rectification, de suppression de vos données, ainsi que d'un droit 
d'opposition, le cas échéant, et de limitation au traitement, en écrivant au 
Délégué à la protection des données du groupe SMEG aux coordonnées suivantes : 
10 avenue de Fontvieille - 98000 Monaco, ou [email protected].




Reply via email to