Package: dropbear Version: 2012.55-1.3 Severity: normal Tags: patch Dear Maintainer,
When installing dropbear after creating a cryptroot setup dropbear creates new keys in /etc/initramfs-tools/etc/dropbear/ instead of using the keys in /etc/dropbear/. This can cause headaches when the ssh client compains of changed host keys. A work-around is to use "ssh -o StrictHostKeyChecking=no" whenever ssh-ing in to supply the root fs password. The attached untested patch to the debian/dropbear.postinst file should fix the problem. -- System Information: Debian Release: 7.1 APT prefers stable APT policy: (500, 'stable'), (500, 'oldstable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages dropbear depends on: ii libc6 2.13-38 ii zlib1g 1:1.2.7.dfsg-13 dropbear recommends no packages. Versions of packages dropbear suggests: ii openssh-client 1:6.0p1-4 pn runit <none> ii udev 175-7.2 ii xauth 1:1.0.7-1 -- no debconf information
--- dropbear.postinst 2013-07-03 22:30:56.000000000 -0500 +++ dropbear.postinst-new 2013-07-03 22:52:50.290774015 -0500 @@ -65,6 +65,15 @@ # if dropbear is to be installed to initramfs, we have to update initramfs. if ( test -r /etc/initramfs-tools/initramfs.conf || test -r /usr/share/initramfs-tools/conf-hooks.d/* ) && test -x /usr/sbin/update-initramfs; then + # copy host keys + for keytype in "dss" "rsa"; do + if [ ! -f "/etc/initramfs-tools/etc/dropbear/dropbear_${keytype}_host_key" ]; then + mkdir -p "/etc/initramfs-tools/etc/dropbear" + cp -a "/etc/dropbear/dropbear_${keytype}_host_key" \ + "/etc/initramfs-tools/etc/dropbear/dropbear_${keytype}_host_key" + fi + done + # update initramfs for i in /etc/initramfs-tools/initramfs.conf /usr/share/initramfs-tools/conf-hooks.d/*; do if [ -e "${i}" ]; then . "${i}"