Package: dropbear-initramfs
Version: 2025.88-2
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

Since Debian 13, i'm no longer able to unlock the LUKS cryptroot through SSH. 
In Debian 12, I was able to do something like : echo "password" | ssh 
root@remote_server and it worked to unlock the LUKS partition.
However, now it's no longer possible and the LUKS partition stays locked. I do 
not know if it is related to a change with dropbear or another package in 
Debian 13.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

echo "password" | ssh root@remote_server

   * What was the outcome of this action?

LUKS partition is not unlocked.

   * What outcome did you expect instead?

LUKS is unlocked.

*** End of the template - remove these template lines ***

-- System Information:
Debian Release: 13.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.6.87.2-microsoft-standard-WSL2 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages dropbear-initramfs depends on:
pn  busybox | busybox-static  <none>
pn  dropbear-bin              <none>
pn  initramfs-tools           <none>
ii  udev                      257.8-1~deb13u2

Versions of packages dropbear-initramfs recommends:
pn  cryptsetup-initramfs  <none>

dropbear-initramfs suggests no packages.

Reply via email to