From edee58e75c1715e38c92b310bf8d996cc4951f78 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Wed, 17 Apr 2024 16:14:45 +0200 Subject: Adding debian version 4+nmu1. Signed-off-by: Daniel Baumann --- debian/control | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 debian/control (limited to 'debian/control') diff --git a/debian/control b/debian/control new file mode 100644 index 0000000..389a454 --- /dev/null +++ b/debian/control @@ -0,0 +1,26 @@ +Source: cryptsetup-nuke-password +Section: admin +Priority: optional +Maintainer: Debian Security Tools +Uploaders: Raphaël Hertzog , Jonas Meurer +Build-Depends: debhelper-compat (= 13), shunit2, po-debconf +Standards-Version: 4.6.2 +Homepage: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password +Vcs-Browser: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password +Vcs-Git: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password.git + +Package: cryptsetup-nuke-password +Architecture: any +Depends: cryptsetup-bin, ${shlibs:Depends}, ${misc:Depends} +Enhances: cryptsetup-initramfs +Description: Erase the LUKS keys with a special password on the unlock prompt + Installing this package lets you configure a special "nuke password" that + can be used to destroy the encryption keys required to unlock the encrypted + partitions. This password can be entered in the usual early-boot prompt + asking the passphrase to unlock the encrypted partition(s). + . + This provides a relatively stealth way to make your data unreadable in + case you fear that your computer is going to be seized. + . + After installation, use “dpkg-reconfigure cryptsetup-nuke-password” to + configure your nuke password. -- cgit v1.2.3