[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1114764: marked as done (ITP: fido2luks -- Unlock LUKS volumes at boot time using a FIDO2 token)



Your message dated Wed, 01 Oct 2025 18:00:12 +0000
with message-id <E1v417c-00A4ch-2r@fasolo.debian.org>
and subject line Bug#1114764: fixed in fido2luks 0.0.3-1~exp1
has caused the Debian Bug report #1114764,
regarding ITP: fido2luks -- Unlock LUKS volumes at boot time using a FIDO2 token
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1114764: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114764
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Alberto Garcia <berto@igalia.com>
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name    : fido2luks
  Version         : 0.0.3
  Upstream Contact: Alberto Garcia <berto@igalia.com>
* URL             : https://github.com/bertogg/fido2luks
* License         : GPL-2+
  Programming Lang: POSIX shell
  Description     : Unlock LUKS volumes at boot time using a FIDO2 token

fido2luks is an extension to initramfs-tools to unlock LUKS-encrypted
disks at boot time using a FIDO2 token.

It is designed for LUKS volumes where a FIDO2 token was enrolled using
systemd-cryptenroll --fido2-device.

 ---

Additional info:

systemd allows unlocking LUKS volumes with a FIDO2 token such as the
Nitrokey, YubiKey, etc.

However for full disk encryption scenarios there is currently no way
in Debian to do it at boot time with initramfs-tools, as many users
have noted. The solution involves switching to dracut, and there are a
few tutorials available on the web.

This package provides a simple shell script that can do the job
without having to switch the initramfs implementation.

--- End Message ---
--- Begin Message ---
Source: fido2luks
Source-Version: 0.0.3-1~exp1
Done: Alberto Garcia <berto@igalia.com>

We believe that the bug you reported is fixed in the latest version of
fido2luks, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1114764@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Garcia <berto@igalia.com> (supplier of updated fido2luks package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 23 Sep 2025 21:33:22 +0200
Source: fido2luks
Binary: fido2luks
Architecture: source all
Version: 0.0.3-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Alberto Garcia <berto@igalia.com>
Changed-By: Alberto Garcia <berto@igalia.com>
Description:
 fido2luks  - Unlock a LUKS volume on boot using a FIDO2 token
Closes: 1114764
Changes:
 fido2luks (0.0.3-1~exp1) experimental; urgency=medium
 .
   * Initial release (Closes: #1114764).
Checksums-Sha1:
 a35c29516ae768c853337799bc2c7bd361b7e301 1850 fido2luks_0.0.3-1~exp1.dsc
 93033aeba275eac8e7c1e01a2594a4984bba7944 10616 fido2luks_0.0.3.orig.tar.xz
 a2e398492a8cd6d10cfe3dd89de38bb883905f1b 2372 fido2luks_0.0.3-1~exp1.debian.tar.xz
 c61b4ddddfba2a5137aa68150691064a3df1a0fd 6076 fido2luks_0.0.3-1~exp1_all.deb
 3e13e5e6955dc4b7a22b5dd10beeb3fd37c7beef 5747 fido2luks_0.0.3-1~exp1_amd64.buildinfo
Checksums-Sha256:
 7a77b0b3d035d96154a8da7b0b807d256c80b763febfd6075e75d481f16eb08b 1850 fido2luks_0.0.3-1~exp1.dsc
 2532929e3762f2c46a4c11b109227d912066e932cc9a7a553d00ca3f241ae0f9 10616 fido2luks_0.0.3.orig.tar.xz
 fe558e1bb56bc7bfc8e0fd2995acd981fbc506b5c9051f3847fffff20660251e 2372 fido2luks_0.0.3-1~exp1.debian.tar.xz
 dd9661273fc2d825f6cab437980912e334587380b7e9def200d1c187fa6e87e2 6076 fido2luks_0.0.3-1~exp1_all.deb
 469e5c0c1975a33eb8d8af5583c331b67526f606f41a703ddea09a8f303b20cf 5747 fido2luks_0.0.3-1~exp1_amd64.buildinfo
Files:
 5ec770f6aa611a4d6d55f905cb811fb4 1850 admin optional fido2luks_0.0.3-1~exp1.dsc
 e842daef3af2ed6f230d1a984c6483a8 10616 admin optional fido2luks_0.0.3.orig.tar.xz
 8a378c132a48afd75fa0ab48ac2ee088 2372 admin optional fido2luks_0.0.3-1~exp1.debian.tar.xz
 b93184325ee92e41af2aa70472202df6 6076 admin optional fido2luks_0.0.3-1~exp1_all.deb
 963a68bc74641b7d8f1015b658efe900 5747 admin optional fido2luks_0.0.3-1~exp1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=gdWG
-----END PGP SIGNATURE-----

Attachment: pgpSxOxAFLvT5.pgp
Description: PGP signature


--- End Message ---

Reply to: