Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP1:GA
cryptctl.15733
cryptctl.changes
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File cryptctl.changes of Package cryptctl.15733
------------------------------------------------------------------- Thu Nov 23 13:44:21 UTC 2017 - rbrown@suse.com - Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468) ------------------------------------------------------------------- Mon Oct 23 14:26:02 UTC 2017 - hguo@suse.com - Add previously missing systemd service cryptctl-client.service into RPM content, continue with bsc#1056082. ------------------------------------------------------------------- Mon Aug 28 13:37:13 UTC 2017 - hguo@suse.com - Upgrade to upstream release 2.3 that brings a new feature to allow system administrators to issue mount/umount commands to client computers via key server. (bsc#1056082) ------------------------------------------------------------------- Wed Jun 7 12:11:50 UTC 2017 - hguo@suse.com - Upgrade to upstream release 2.2 that brings important enhancements in effort of implementing fate#322979: * System administrator may now optionally turn off TLS certificate verification on KMIP server. Note that, certificate verification is enforced by default. * Improve handling of boolean answers from interactive command line. * Improve error handling in KMIP client. ------------------------------------------------------------------- Thu Jun 1 13:00:57 UTC 2017 - hguo@suse.com - Upgrade to upstream release 2.1 that brings important enhancements in effort of implementing fate#322979: * Improve KMIP compatibility with key prefix names and proper serialisation of authentication header. * Fail over KMIP connection using a server list. * Destroy key on KMIP after its tracking record is erased from DB. ------------------------------------------------------------------- Thu May 11 14:00:39 UTC 2017 - hguo@suse.com - Upgrade to upstream release 2.0 that brings a protocol evolution together with several new features: * Optionally utilise an external KMIP-v1.3 compatible service to store actual encryption key. * Optionally verify client identity before serving its key requests. * Password is hashed before transmitting over TLS-secured channel. * Fix an issue that previously allowed a malicious administrator to craft RPC request to overwrite files outside of key database. Implemented accordint to fate#322979 and fate#322293. ------------------------------------------------------------------- Fri Apr 28 08:32:46 UTC 2017 - hguo@suse.com - Upgrade to 1.99pre that introduces a library for decoding, encoding, and serialisation operations of KMIP v1.3 for fate#322979. ------------------------------------------------------------------- Wed Nov 16 14:45:31 UTC 2016 - hguo@suse.com - Upgrade to 1.2.6 for accumulated bug fixes (bsc#1006219): * Prevent user from attempting to encrypt a disk with mounted partitions, or an existing encrypted+opened disk. * Ensure CA path input is an absolute path. * Fix two mistakes in handling of timeout input. * Fix minor formatting issue in manual page. * Suppress consecutive failure messages in the journal of ReportAlive and AutoOnlineUnlockFS routines. ------------------------------------------------------------------- Fri Sep 16 09:37:42 UTC 2016 - hguo@suse.com - Implement mandatory enhancements: * Do not allow encrypting a remote file system. * Implement command for erasing an encrypted file system. - Bump version to 1.2.5 for fate#320367. ------------------------------------------------------------------- Fri Sep 2 14:36:01 UTC 2016 - hguo@suse.com - Implement mandatory enhancements: * Make workflow across all sub-commands consistent in invocation style. * Implement auto-unlocking of encrypted disks. * Show key record usage and details on demand. - Bump version to 1.2.4 for fate#320367. ------------------------------------------------------------------- Thu Aug 18 14:44:23 UTC 2016 - hguo@suse.com - Implement mandatory enhancements: * Remove necessity for a backup directory to be involved for encryption routine. * Optimise certificate generation prompts. * Remove unused error messages and fix several of their typos. * Remove unnecessary safety checks. * Make the encryption routine work with btrfs and LVM. - Bump version to 1.2.3 fate#320367. ------------------------------------------------------------------- Wed Aug 3 14:13:05 UTC 2016 - hguo@suse.com - Upon request, generate a self-signed TLS certificate for experimental purposes. - Bump version to 1.2.2 fate#320367. ------------------------------------------------------------------- Mon Aug 1 13:50:48 UTC 2016 - hguo@suse.com - Implement mandatory features: * Encrypt empty directory skips backup steps. * Explain key revocation and TLS mechanisms in manual page. - Bump version to 1.2.1 fate#320367. ------------------------------------------------------------------- Mon Jul 11 12:07:09 UTC 2016 - hguo@suse.com - Implement mandatory features: * List and edit key records * Unlock file system via key record file * Use custom options to mount unlocked file system Enhance usability: * Make encryption procedure's pre-check more thorough * Improve overall command prompts - Bump version to 1.2 fate#320367. ------------------------------------------------------------------- Fri Jul 1 14:30:10 UTC 2016 - hguo@suse.com - A preview version with most of the desired functions implemented: * Key database * Key RPC server * Client encryption and decryption routines Bump version to 1.1 fate#320367. ------------------------------------------------------------------- Wed Jun 8 10:22:03 UTC 2016 - hguo@suse.com - First version, only to help with building ISOs. Implement fate#320367.
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor