Bug#1016957: kbd-chooser: please add support for riscv64

2024-05-03 Thread Paul Gevers

Hi Bastian,

On Sat, 9 Sep 2023 19:03:07 +0200 Bastian Germann  wrote:

Control: severity -1 serious


Can you please elaborate? I'm not seeing anything serious in this bug 
report.



On Wed, 10 Aug 2022 21:42:34 +0200 Holger Wansing  wrote:
> kbd-chooser is no longer in use, I think.
> Or am I missing something?

I am raising severity to serious then so that it can be autoremoved from 
testing.


This package is a key package (because of debian-installer), so it can't 
be autoremoved.


Paul


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Making trixie debootstrap-able again?

2024-05-03 Thread Cyril Brulebois
Hi,

Cyril Brulebois  (2024-04-26):
> I'm not sure how we reached this situation but there are a bunch of
> packages in trixie that are not in a suitable state. To reproduce, a
> simple `debootstrap trixie /tmp/trixie` on amd64 is sufficient.

That works again, presumably following the configuration changes in
britney made it complete again, finally migrating stuff.

> Note: I've limited my exploration to amd64, which kept me busy
> already…

That proviso is still true.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant


signature.asc
Description: PGP signature


Processing of partman-crypto_123_source.changes

2024-05-03 Thread Debian FTP Masters
partman-crypto_123_source.changes uploaded successfully to localhost
along with the files:
  partman-crypto_123.dsc
  partman-crypto_123.tar.xz
  partman-crypto_123_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1060422: marked as done (partman-crypto: add support for new cryptsetup options for opal/sed)

2024-05-03 Thread Debian Bug Tracking System
Your message dated Fri, 03 May 2024 22:52:09 +
with message-id 
and subject line Bug#1060422: fixed in partman-crypto 123
has caused the Debian Bug report #1060422,
regarding partman-crypto: add support for new cryptsetup options for opal/sed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1060422: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060422
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: partman-crypto
Tags: patch

Dear Maintainer(s),

cryptsetup 2.7.0, currently in experimental, added support for self
encrypting drives using the OPAL functionality as the encryption layer
(managed by the kernel, not by the TCG utilities), both in standalone
mode and with a nested dm-crypt layer. Key management is done using
LUKS2, just like with dm-crypt, so that all existing functionality
works out of the box (tokens, passphrases, keyfiles, etc). A standard
LUKS2 header is used, which sits unencrypted on the disk as with dm-
crypt, and the nested range is then encrypted using OPAL's
functionality.

I have added support for these new options in partman-crypto, MR on
Salsa is open:

https://salsa.debian.org/installer-team/partman-crypto/-/merge_requests/7

The new options are shown only in the manual partitioning mode, and
only if the kernel, cryptsetup and the device all support this
functionality, otherwise they are hidden. A factory reset option for
the disk is also exposed. A small utility to call the required ioctl to
check for support on a given disk is added too.

I have tested this with a Kingston drive and it seems to work as
expected.

-- 
Kind regards,
Luca Boccassi


signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
Source: partman-crypto
Source-Version: 123
Done: Luca Boccassi 

We believe that the bug you reported is fixed in the latest version of
partman-crypto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1060...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi  (supplier of updated partman-crypto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 03 May 2024 23:26:43 +0100
Source: partman-crypto
Architecture: source
Version: 123
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team 
Changed-By: Luca Boccassi 
Closes: 1060422
Changes:
 partman-crypto (123) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Updated translations ]
   * Occitan (oc.po) by Quentin PAGÈS
   * Tibetian (bo.po)
 .
   [ Luca Boccassi ]
   * Add utility to check for OPAL support on a device
   * Add support for OPAL encryption via cryptsetup and LUKS2 (Closes:
 #1060422)
Checksums-Sha1:
 b8ff68cacfb9bd684753c94744b27e1470855ff1 1795 partman-crypto_123.dsc
 20509715fed43b6a9b195549e661c9566641c7e6 276392 partman-crypto_123.tar.xz
 e7ba75304411170a16d1de5c61cde4fc72564fdf 6595 
partman-crypto_123_source.buildinfo
Checksums-Sha256:
 4cc087464a8c96d3f9e23a7750c9bb8d78fbf86a3ebeb8a8c7b9755cd9e1e911 1795 
partman-crypto_123.dsc
 69b33f8c77accc9786e26e1eaef2c5fde15fbd6b99d6cddae2b1fbd9723077de 276392 
partman-crypto_123.tar.xz
 2a125b56f6054c9c97d1ef8cfec6bb0b9a1ffcdff4b76c92c5cf35cf7a9f479b 6595 
partman-crypto_123_source.buildinfo
Files:
 341466bda9798a78be01625b79429f8d 1795 debian-installer optional 
partman-crypto_123.dsc
 9ddcee54a9dc483e66aceb5b2312099b 276392 debian-installer optional 
partman-crypto_123.tar.xz
 0627b6a0e5628a9e50c562618e2a9b50 6595 debian-installer optional 
partman-crypto_123_source.buildinfo

-BEGIN PGP SIGNATURE-
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partman-crypto_123_source.changes ACCEPTED into unstable

2024-05-03 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 03 May 2024 23:26:43 +0100
Source: partman-crypto
Architecture: source
Version: 123
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team 
Changed-By: Luca Boccassi 
Closes: 1060422
Changes:
 partman-crypto (123) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Updated translations ]
   * Occitan (oc.po) by Quentin PAGÈS
   * Tibetian (bo.po)
 .
   [ Luca Boccassi ]
   * Add utility to check for OPAL support on a device
   * Add support for OPAL encryption via cryptsetup and LUKS2 (Closes:
 #1060422)
Checksums-Sha1:
 b8ff68cacfb9bd684753c94744b27e1470855ff1 1795 partman-crypto_123.dsc
 20509715fed43b6a9b195549e661c9566641c7e6 276392 partman-crypto_123.tar.xz
 e7ba75304411170a16d1de5c61cde4fc72564fdf 6595 
partman-crypto_123_source.buildinfo
Checksums-Sha256:
 4cc087464a8c96d3f9e23a7750c9bb8d78fbf86a3ebeb8a8c7b9755cd9e1e911 1795 
partman-crypto_123.dsc
 69b33f8c77accc9786e26e1eaef2c5fde15fbd6b99d6cddae2b1fbd9723077de 276392 
partman-crypto_123.tar.xz
 2a125b56f6054c9c97d1ef8cfec6bb0b9a1ffcdff4b76c92c5cf35cf7a9f479b 6595 
partman-crypto_123_source.buildinfo
Files:
 341466bda9798a78be01625b79429f8d 1795 debian-installer optional 
partman-crypto_123.dsc
 9ddcee54a9dc483e66aceb5b2312099b 276392 debian-installer optional 
partman-crypto_123.tar.xz
 0627b6a0e5628a9e50c562618e2a9b50 6595 debian-installer optional 
partman-crypto_123_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJFBAEBCgAvFiEErCSqx93EIPGOymuRKGv37813JB4FAmY1ZUsRHGJsdWNhQGRl
Ymlhbi5vcmcACgkQKGv37813JB4c7BAAudZfcJ4FVoKCr6kgAyZzStUXEvc6lt45
RJgauEvFId2LX38fImfQPLCLdTA4RwDgG8tt86Ly69y3kODjQYlKFvq71lWu4oA+
GZ0jDEVjxHUBogjtUiCDRMHbyEId0kOcxhxeYPIa/6Xo4Xqe92O4bLs33Q4G1da7
38YIH52yLrLF5q+Vo7qnLyZgZr+hhPHGS8bH2Mh414KASOvq4E8KzJOF5Cg0qpFA
bQR2zqieQE7E6gY3wMG4+K8y2HMGYQ76V/3qcoUsBJlTbQznlqB+y8dvjMobNXas
8JUqxaGrkjfdDufCgy6DlqAV7voHq+dQAPT8fvLwrPN6IpkHJ4HwsGLAy6dRq5yS
BMqdQk/Ybkk1KwT2NiFhgdAuBTQ++8rMxxwMmxyNRHzoCPcWPUotr9XAS3tE96Fj
QSR6u+3N1FKbVJWsaqIbBQxSopL+8BqYGh0v3Gy22p3raWSSpDLHPRIqtHR3uPmM
dhNxV32nxEEwKQ5Oyrb5kWSG5ibOBVrZSngO4L1LrWBmUvDgftTlqckAvPSAoUTY
BShKoA6LxN79DdfPPN5e/iSTXCZA1/Pm3vu52YmOmOsIZfSrjqT5bw1Wvg7UpC6f
FGkeQ/8zUNIQ9vImQ06UNpQIpoJVgwr5uhmOFXgZoOXmzN5SL6A6b8T25k14DrO1
jnvIkxxuEt0=
=Pf1k
-END PGP SIGNATURE-



pgpSzq7H1M4_r.pgp
Description: PGP signature


Processed: Bug#1060422 marked as pending in partman-crypto

2024-05-03 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1060422 [src:partman-crypto] partman-crypto: add support for new 
cryptsetup options for opal/sed
Ignoring request to alter tags of bug #1060422 to the same tags previously set

-- 
1060422: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060422
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of user-setup_1.97_source.changes

2024-05-03 Thread Debian FTP Masters
user-setup_1.97_source.changes uploaded successfully to localhost
along with the files:
  user-setup_1.97.dsc
  user-setup_1.97.tar.xz
  user-setup_1.97_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#998408: marked as done (debian-installer: "good password" advise)

2024-05-03 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 21:42:01 +0200
with message-id <20240503214201.b0b389be5197d4a9d1253...@mailbox.org>
and subject line Uploading user-setup: update password selection advice
has caused the Debian Bug report #998408,
regarding debian-installer: "good password" advise
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
998408: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998408
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: debian-installer
Version: 20210731+deb11u1
Severity: normal
Tags: upstream
X-Debbugs-Cc: alx.manpa...@gmail.com

Dear Maintainer,

The Debian installer contains the following advise:

"A good password will contain a mixture of letters, numbers and punctuation
and should be changed at regular intervals."

I disagree with this statement, which has been passing around for decades
in many different environments, as a "universal truth" which only causes
headaches and ends up necessarily in .

The opposite is actually true:

- _Good_ passwords don't need to be changed that much.  When was the last
  time you changed your PGP key?  Probably never.

- Especially, if you use a different password for every different account,
  you don't need to change them at all, unless they have been stolen, or
  you suspect that might have happened.

- Adding punctuation to passwords only adds problems to yourself when you
  need to type it in a different keyboard, not to a computer that can
  brute force it.  To put some numbers:

  a) Different characters if you use only (uppercase and lowercase) letters
 and numbers:
   26 letters * 2 + 10 numbers = 62

  b) Now, assume you can use the symbols available in your keyboard.  My
 ANSI keyboard shows 32 different symbols other than the above.
   62 + 32 = 94

  Let's compare a 32-byte password using (b), to a 64-byte password
  using only (a):

62**64 = 5.16e+114 combinations

94**32 = 1.38e+63 combinations

You would only need 38 characters of an alphanumeric password
to have the same strength aprox (1.29e+68) than a braindamaged
symbol password of 32 characters.

  So, you're adding difficulty to typing your own password for no reason
  all when you could just add a few more bytes to your sane password.

  If you're using a password manager, it can surely remember 64 bytes of
  alphanumeric bytes.  I'm not sure if it will remember correctly some
  weird combination of characters.  So if youre using a password manager,
  the best advise would be to use $(makepasswd --chars 64) and forget it.

  I must confess I have passwords that would make xkcd guys laugh, and
  they are for the few sites that still have those weird requirements.
  And when I'm forced to update it, you can guess how I do it :)
  (I don't feel guilty; not my fault).

  And if you need a password that you should remember, like your BIOS
  password, or your login password, you can't use a password manager, so
  there's even more reason to use a memorable but long one, and forget
  about the symbols.  $(goxkcdpwgen) should work for you, and maybe you
  can use some options to it if you want a longer one.

  So my advise would be instead:

  "A good password will not need rare characters, but rather be as long
  as possible.  Having a memorable random password can help it be
  longer, and therefore stronger."

  Or something similar.

Sorry for the rant :-)

Thanks,

Alex


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.14.0-3-amd64 (SMP w/12 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Version: 1.97


Forgot to mention bug closure in changelog before uploading, so closing now
manually.

-- 
Holger Wansing 
PGP-Fingerprint: 496A C6E8 1442 4B34 8508  3529 59F1 87CA 156E B076--- End Message ---


Bug#868869: marked as done (debian-installer should not recommend to change password periodically (and more))

2024-05-03 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 21:42:01 +0200
with message-id <20240503214201.b0b389be5197d4a9d1253...@mailbox.org>
and subject line Uploading user-setup: update password selection advice
has caused the Debian Bug report #868869,
regarding debian-installer should not recommend to change password periodically 
(and more)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
868869: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868869
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: debian-installer
Severity: wishlist
Tags: patch

Hi,

>> A good password will contain a mixture of letters, numbers and punctuation
>> and should be changed at regular intervals.

 Now debian-installer recommends to change root password periodically, however,
 nowadays it SHOULD NOT. e.g. NIST publishes Digital Identity Guidelines,
 in "5.1.1.2 Memorized Secret Verifiers" it says

> Verifiers SHOULD NOT impose other composition rules (e.g., requiring 
> mixtures of different character types or prohibiting consecutively 
> repeated characters) for memorized secrets. Verifiers SHOULD NOT 
> require memorized secrets to be changed arbitrarily (e.g., periodically). 

 see https://pages.nist.gov/800-63-3/sp800-63b.html

 We should follow it to provide secure environment for users, at least.
 Patch attached.


-- 
Regards,

 Hideki Yamane henrich @ debian.or.jp/org
 http://wiki.debian.org/HidekiYamane
>From 0cbb696c3a3bde3cb9f32f6778396eb341a0f137 Mon Sep 17 00:00:00 2001
From: Hideki Yamane 
Date: Wed, 19 Jul 2017 20:15:03 +0900
Subject: [PATCH] Do not recommend insecure password customs

see Digital Identity Guidelines by NIST
https://pages.nist.gov/800-63-3/sp800-63b.html

> Verifiers SHOULD NOT impose other composition rules (e.g., requiring
> mixtures of different character types or prohibiting consecutively
> repeated characters) for memorized secrets. Verifiers SHOULD NOT
> require memorized secrets to be changed arbitrarily (e.g., periodically).
---
 debian/user-setup-udeb.templates | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/debian/user-setup-udeb.templates b/debian/user-setup-udeb.templates
index 45e16b4..df58475 100644
--- a/debian/user-setup-udeb.templates
+++ b/debian/user-setup-udeb.templates
@@ -40,9 +40,6 @@ _Description: Root password:
  that is not easy to guess. It should not be a word found in dictionaries,
  or a word that could be easily associated with you.
  .
- A good password will contain a mixture of letters, numbers and punctuation
- and should be changed at regular intervals.
- .
  The root user should not have an empty password. If you leave this
  empty, the root account will be disabled and the system's initial user
  account will be given the power to become root using the "sudo"
-- 
2.13.2

--- End Message ---
--- Begin Message ---
Version: 1.97


Forgot to mention bug closure in changelog before uploading, so closing now
manually.

-- 
Holger Wansing 
PGP-Fingerprint: 496A C6E8 1442 4B34 8508  3529 59F1 87CA 156E B076--- End Message ---


Bug#1064617: marked as done (Passwords should not be changed frequently)

2024-05-03 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 21:42:01 +0200
with message-id <20240503214201.b0b389be5197d4a9d1253...@mailbox.org>
and subject line Uploading user-setup: update password selection advice
has caused the Debian Bug report #1064617,
regarding Passwords should not be changed frequently
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1064617: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064617
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: debian-installer

I just did an installation with the 2024-02-24
debian-testing-amd64-netinst.iso image.  I forget the exact wording
used, but when setting up a user, d-i printed advice that user passwords
should be changed frequently.  This is no longer current good advice
(since 2017):

 "Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily
 (e.g., periodically).  However, verifiers SHALL force a change if there
 is evidence of compromise of the authenticator."

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf

I happen to like their suggestion of providing a password-strength meter,
but that would be a separate bug.  This bug is simply a request to remove
this outdated suggestion text from d-i.
--- End Message ---
--- Begin Message ---
Version: 1.97


Forgot to mention bug closure in changelog before uploading, so closing now
manually.

-- 
Holger Wansing 
PGP-Fingerprint: 496A C6E8 1442 4B34 8508  3529 59F1 87CA 156E B076--- End Message ---


Uploading user-setup: update password selection advice

2024-05-03 Thread Holger Wansing
Version: 1.97


Forgot to mention bug closure in changelog before uploading, so closing now
manually.

-- 
Holger Wansing 
PGP-Fingerprint: 496A C6E8 1442 4B34 8508  3529 59F1 87CA 156E B076



user-setup_1.97_source.changes ACCEPTED into unstable

2024-05-03 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 03 May 2024 21:14:17 +0200
Source: user-setup
Architecture: source
Version: 1.97
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team 
Changed-By: Holger Wansing 
Changes:
 user-setup (1.97) unstable; urgency=medium
 .
   * Team upload
 .
   [ Philip Hands ]
   * Change template: update password selection advice, to get rid of outdated
 advice about password selection and renewals, and ensure that people know
 what to expect if they leave the root password blank.
 .
   [ Updated translations ]
   * Arabic (ar.po) by Der Marschall
   * Belarusian (be.po) by Viktar Siarheichyk
   * Catalan (ca.po) by d
   * Esperanto (eo.po) by phlostically
   * Spanish (es.po) by gallegonovato
   * Estonian (et.po) by Kristjan Räts
   * Galician (gl.po) by gallegonovato
   * Hebrew (he.po) by Yaron Shahrabani
   * Hindi (hi.po) by Scrambled777
   * Hungarian (hu.po) by SZERVÁC Attila
   * Indonesian (id.po) by Andika Triwidada
   * Japanese (ja.po) by Kenshi Muto
   * Kabyle (kab.po) by ButterflyOfFire
   * Macedonian (mk.po) by Kristijan Fremen Velkovski
   * Malayalam (ml.po) by Manoj Karingamadathil
   * Norwegian Bokmal (nb.po) by Petter Reinholdtsen
   * Dutch (nl.po) by Frans Spiesschaert
   * Norwegian Nynorsk (nn.po) by Ola Haugen Havrevoll
   * Occitan (oc.po) by Quentin PAGÈS
   * Polish (pl.po) by Matthaiks
   * Portuguese (pt.po) by Miguel Figueiredo
   * Romanian (ro.po) by ThinkRoot
   * Swedish (sv.po) by bittin1ddc447d824349b2
   * Turkish (tr.po) by Oğuz Ersen
   * Ukrainian (uk.po) by Сергій
Checksums-Sha1:
 b978b7c51fc45f90fb90fd9a93cd05f5907dcd8c 1759 user-setup_1.97.dsc
 11af3e6a3a501b376f0c22ea4b4747d456b1abfb 120468 user-setup_1.97.tar.xz
 06001b68b3c23097671950b52d44b4113ddd93af 6401 user-setup_1.97_amd64.buildinfo
Checksums-Sha256:
 aaf03d5ee575c9da97540db9f218df35936ba72fa0164ce9f8446bf37db56677 1759 
user-setup_1.97.dsc
 ca29704bd732a54935a1514f74ee5fd1b7edc9c374744a41879af158ea255c7b 120468 
user-setup_1.97.tar.xz
 bbab06a782596dbe9c1d6ec53bc72968ddee032bf472deca10c91cfb12340d05 6401 
user-setup_1.97_amd64.buildinfo
Files:
 1ead4d3762b88d452ce17fd590178550 1759 debian-installer optional 
user-setup_1.97.dsc
 c6209e2d2e68eb9e9bd428f5c2536cac 120468 debian-installer optional 
user-setup_1.97.tar.xz
 5ff8774b2a4174c2823bb31039ef7ce2 6401 debian-installer optional 
user-setup_1.97_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=/KRX
-END PGP SIGNATURE-



pgpfzSQqLaNrH.pgp
Description: PGP signature


Processed: Re: Bug#1060422: partman-crypto: add support for new cryptsetup options for opal/sed

2024-05-03 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 pending
Bug #1060422 [src:partman-crypto] partman-crypto: add support for new 
cryptsetup options for opal/sed
Added tag(s) pending.

-- 
1060422: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060422
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1060422: partman-crypto: add support for new cryptsetup options for opal/sed

2024-05-03 Thread Luca Boccassi
Control: tags -1 pending

On Thu, 11 Jan 2024 19:55:18 + Luca Boccassi 
wrote:
> On Thu, 11 Jan 2024 at 14:22, Holger Levsen 
wrote:
> >
> > On Thu, Jan 11, 2024 at 11:56:28AM +, Luca Boccassi wrote:
> > [...]
> > > How about if I changed the Description from:
> > >  Self-encrypting disk (opal with LUKS2)
> > > to something like:
> > >  Firmware-backed self-encrypting disk (vendor-implemented OPAL
with
> > > LUKS2)
> > > Would that suffice? If not, do you have an alternative wording in
mind?
> >
> > sounds much better (and sufficient, for all the reasons you
mentioned)
> > to me, thanks!
> 
> Thank you for the feedback, MR on Salsa is updated as described.

Now that cryptsetup 2.7.0 is in testing, I'll team upload later tonight

-- 
Kind regards,
Luca Boccassi


signature.asc
Description: This is a digitally signed message part


Bug#1069897: Netcfg to get search domain

2024-05-03 Thread Frédéric Guyot
This will require a bit more work than anticipated.

The patch posted above will only do half of the job.
netcfg will call udhcp with the "-O search" option added which will update
/etc/resolv.conf with the correct search domain values assuming that the
patch for /etc/udhcpc/default.script is also applied along this one.

Now the problem is that netcfg is calling the "netcfg_write_resolv"
function from static.c that will overwrite any changes made by udhcpc on
resolv.conf and will only keep the domain and nameservers.

https://salsa.debian.org/installer-team/netcfg/-/blob/master/dhcp.c#L513
https://salsa.debian.org/installer-team/netcfg/-/blob/master/dhcp.c#L616
https://salsa.debian.org/installer-team/netcfg/-/blob/master/static.c?ref_type=heads#L261