cryptctl-2.3-lp150.21.2.x86_64.rpm


Advertisement

Description

cryptctl - A utility for setting up LUKS-based disk encryption

Property Value
Distribution openSUSE Leap 15.0
Repository Security all
Package name cryptctl
Package version 2.3
Package release lp150.21.2
Package architecture x86_64
Package type rpm
Installed size 6.34 MB
Download size 1.80 MB
Official Mirror widehat.opensuse.org
A disk encryption utility that helps setting up LUKS-based disk encryption using
randomly generated keys, and keep all keys on a dedicated key server.

Alternatives

Package Version Architecture Repository
cryptctl-2.3-lp150.2.6.x86_64.rpm 2.3 x86_64 openSUSE Oss
cryptctl - - -

Requires

Name Value
btrfsprogs -
cryptsetup -
e2fsprogs -
libc.so.6(GLIBC_2.2.5)(64bit) -
libpthread.so.0()(64bit) -
libpthread.so.0(GLIBC_2.2.5)(64bit) -
libpthread.so.0(GLIBC_2.3.2)(64bit) -
rsync -
systemd -
util-linux -
xfsprogs -

Provides

Name Value
config(cryptctl) = 2.3-lp150.21.2
cryptctl = 2.3-lp150.21.2
cryptctl(x86-64) = 2.3-lp150.21.2

Download

Type URL
Binary Package cryptctl-2.3-lp150.21.2.x86_64.rpm
Source Package cryptctl-2.3-lp150.21.2.src.rpm

Install Howto

  1. Add the Security repository:
    # zypper addrepo http://widehat.opensuse.org/opensuse/repositories/security/openSUSE_Leap_15.0/ security
  2. Install cryptctl rpm package:
    # zypper install cryptctl

Files

Path
/etc/cryptctl/
/etc/cryptctl/servertls/
/usr/lib/systemd/system/cryptctl-auto-unlock@.service
/usr/lib/systemd/system/cryptctl-client.service
/usr/lib/systemd/system/cryptctl-server.service
/usr/lib/udev/rules.d/99-cryptctl-auto-unlock.rules
/usr/sbin/cryptctl
/usr/sbin/rccryptctl-server
/usr/share/doc/packages/cryptctl/LICENSE
/usr/share/fillup-templates/sysconfig.cryptctl-client
/usr/share/fillup-templates/sysconfig.cryptctl-server
/usr/share/man/man8/cryptctl.8.gz
/var/lib/cryptctl/

Changelog

2017-11-23 - rbrown@suse.com
- Replace references to /var/adm/fillup-templates with new
%_fillupdir macro (boo#1069468)
2017-10-23 - hguo@suse.com
- Add previously missing systemd service cryptctl-client.service
into RPM content, continue with bsc#1056082.
2017-08-28 - hguo@suse.com
- Upgrade to upstream release 2.3 that brings a new feature to allow
system administrators to issue mount/umount commands to client
computers via key server. (bsc#1056082)
2017-06-07 - hguo@suse.com
- Upgrade to upstream release 2.2 that brings important enhancements
in effort of implementing fate#322979:
* System administrator may now optionally turn off TLS certificate
verification on KMIP server. Note that, certificate verification
is enforced by default.
* Improve handling of boolean answers from interactive command line.
* Improve error handling in KMIP client.
2017-06-01 - hguo@suse.com
- Upgrade to upstream release 2.1 that brings important enhancements
in effort of implementing fate#322979:
* Improve KMIP compatibility with key prefix names and proper
serialisation of authentication header.
* Fail over KMIP connection using a server list.
* Destroy key on KMIP after its tracking record is erased from DB.
2017-05-11 - hguo@suse.com
- Upgrade to upstream release 2.0 that brings a protocol evolution
together with several new features:
* Optionally utilise an external KMIP-v1.3 compatible service to
store actual encryption key.
* Optionally verify client identity before serving its key requests.
* Password is hashed before transmitting over TLS-secured channel.
* Fix an issue that previously allowed a malicious administrator
to craft RPC request to overwrite files outside of key database.
Implemented accordint to fate#322979 and fate#322293.
2017-04-28 - hguo@suse.com
- Upgrade to 1.99pre that introduces a library for decoding, encoding,
and serialisation operations of KMIP v1.3 for fate#322979.
2016-11-16 - hguo@suse.com
- Upgrade to 1.2.6 for accumulated bug fixes (bsc#1006219):
* Prevent user from attempting to encrypt a disk with mounted
partitions, or an existing encrypted+opened disk.
* Ensure CA path input is an absolute path.
* Fix two mistakes in handling of timeout input.
* Fix minor formatting issue in manual page.
* Suppress consecutive failure messages in the journal of
ReportAlive and AutoOnlineUnlockFS routines.
2016-09-16 - hguo@suse.com
- Implement mandatory enhancements:
* Do not allow encrypting a remote file system.
* Implement command for erasing an encrypted file system.
- Bump version to 1.2.5 for fate#320367.
2016-09-02 - hguo@suse.com
- Implement mandatory enhancements:
* Make workflow across all sub-commands consistent in invocation
style.
* Implement auto-unlocking of encrypted disks.
* Show key record usage and details on demand.
- Bump version to 1.2.4 for fate#320367.

See Also

Package Description
ctunnel-0.7-lp150.1.1.x86_64.rpm Crypto Tunnel for Proxying and Forwarding TCP Connections
daes-0.41-lp150.3.1.x86_64.rpm AES Command Line Encryption Tool
eid-mw-4.0.6+1620-lp150.2.1.x86_64.rpm Belgium electronic identity card PKCS#11 module and Firefox plugin
eid-mw-devel-4.0.6+1620-lp150.2.1.x86_64.rpm Belgium electronic identity card PKCS#11 module - development package
eid-mw-firefox-4.0.6+1620-lp150.2.1.x86_64.rpm Firefox Extension for Belgium eID Middleware
eid-mw-libs-4.0.6+1620-lp150.2.1.x86_64.rpm Belgium electronic identity card PKCS#11 module - libraries
encfs-1.9.2-lp150.60.1.x86_64.rpm Userspace Encrypted File System
encfs-lang-1.9.2-lp150.60.1.noarch.rpm Translations for package encfs
envoy-14-lp150.11.2.x86_64.rpm A ssh/gpg-agent wrapper leveraging cgroups and systemd/socket activation
etherape-0.9.17-lp150.42.2.x86_64.rpm A Graphical Network Monitor
etherape-lang-0.9.17-lp150.42.2.noarch.rpm Translations for package etherape
evmctl-1.1-lp150.47.1.i586.rpm IMA/EVM signing utility
evmctl-1.1-lp150.47.1.x86_64.rpm IMA/EVM signing utility
fail2ban-0.10.3.1-lp150.102.1.noarch.rpm Bans IP addresses that make too many authentication failures
fipscheck-1.5.0-lp150.34.3.i586.rpm A library for integrity verification of FIPS validated modules
Advertisement
Advertisement