summaryrefslogtreecommitdiffstats
path: root/debian/control
blob: 3007a677cdf99b9ca2f5e335cdaec2fe2e89e314 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Source: cryptsetup-nuke-password
Section: admin
Priority: optional
Maintainer: Progress Linux Maintainers <maintainers@lists.progress-linux.org>
XSBC-Uploaders: Daniel Baumann <daniel.baumann@progress-linux.org>
XSBC-Original-Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
XSBC-Original-Uploaders: Raphaël Hertzog <raphael@offensive-security.com>, Jonas Meurer <jonas@freesources.org>
Bugs: mailto:maintainers@lists.progress-linux.org
Build-Depends: debhelper-compat (= 13), shunit2, po-debconf
Standards-Version: 4.6.2
Homepage: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password
Vcs-Browser: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password
Vcs-Git: https://salsa.debian.org/pkg-security-team/cryptsetup-nuke-password.git

Package: cryptsetup-nuke-password
Architecture: any
Depends: cryptsetup-bin, ${shlibs:Depends}, ${misc:Depends}
Enhances: cryptsetup-initramfs
Description: Erase the LUKS keys with a special password on the unlock prompt
 Installing this package lets you configure a special "nuke password" that
 can be used to destroy the encryption keys required to unlock the encrypted
 partitions. This password can be entered in the usual early-boot prompt
 asking the passphrase to unlock the encrypted partition(s).
 .
 This provides a relatively stealth way to make your data unreadable in
 case you fear that your computer is going to be seized.
 .
 After installation, use “dpkg-reconfigure cryptsetup-nuke-password” to
 configure your nuke password.