diff options
Diffstat (limited to '')
-rw-r--r-- | debian/control | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/debian/control b/debian/control new file mode 100644 index 0000000..389a454 --- /dev/null +++ b/debian/control @@ -0,0 +1,26 @@ +Source: cryptsetup-nuke-password +Section: admin +Priority: optional +Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org> +Uploaders: Raphaël Hertzog <raphael@offensive-security.com>, Jonas Meurer <jonas@freesources.org> +Build-Depends: debhelper-compat (= 13), shunit2, po-debconf +Standards-Version: 4.6.2 +Homepage: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password +Vcs-Browser: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password +Vcs-Git: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password.git + +Package: cryptsetup-nuke-password +Architecture: any +Depends: cryptsetup-bin, ${shlibs:Depends}, ${misc:Depends} +Enhances: cryptsetup-initramfs +Description: Erase the LUKS keys with a special password on the unlock prompt + Installing this package lets you configure a special "nuke password" that + can be used to destroy the encryption keys required to unlock the encrypted + partitions. This password can be entered in the usual early-boot prompt + asking the passphrase to unlock the encrypted partition(s). + . + This provides a relatively stealth way to make your data unreadable in + case you fear that your computer is going to be seized. + . + After installation, use “dpkg-reconfigure cryptsetup-nuke-password” to + configure your nuke password. |