summaryrefslogtreecommitdiffstats
path: root/debian/control
diff options
context:
space:
mode:
Diffstat (limited to 'debian/control')
-rw-r--r--debian/control26
1 files changed, 26 insertions, 0 deletions
diff --git a/debian/control b/debian/control
new file mode 100644
index 0000000..389a454
--- /dev/null
+++ b/debian/control
@@ -0,0 +1,26 @@
+Source: cryptsetup-nuke-password
+Section: admin
+Priority: optional
+Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
+Uploaders: Raphaël Hertzog <raphael@offensive-security.com>, Jonas Meurer <jonas@freesources.org>
+Build-Depends: debhelper-compat (= 13), shunit2, po-debconf
+Standards-Version: 4.6.2
+Homepage: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password
+Vcs-Browser: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password
+Vcs-Git: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password.git
+
+Package: cryptsetup-nuke-password
+Architecture: any
+Depends: cryptsetup-bin, ${shlibs:Depends}, ${misc:Depends}
+Enhances: cryptsetup-initramfs
+Description: Erase the LUKS keys with a special password on the unlock prompt
+ Installing this package lets you configure a special "nuke password" that
+ can be used to destroy the encryption keys required to unlock the encrypted
+ partitions. This password can be entered in the usual early-boot prompt
+ asking the passphrase to unlock the encrypted partition(s).
+ .
+ This provides a relatively stealth way to make your data unreadable in
+ case you fear that your computer is going to be seized.
+ .
+ After installation, use “dpkg-reconfigure cryptsetup-nuke-password” to
+ configure your nuke password.