Status of Debian Edu "Buster"

(development started in July 2017)

Released at the Debian 10 Buster release date (July 06 2019)

See the release announcement.

Updated at Debian 10.1 Buster point release date (September 07 2019)

Among others, the packages debian-edu-config, gosa* and debian-edu-doc* have been updated. It is recommended to update the main server first, then LTSP chroots (in case they exist) and other clients (like workstations) in the Debian Edu network.
Please note that the updated debian-edu-config package includes CFengine configuration file changes, so cf-agent -I -D installation needs to be run after upgrading the package (see the Buster manual Maintenance chapter).

Debian Edu Installer Logo

Installation

Instead of the default xfce desktop environment, mate, gnome, lxde, lxqt or kde can be used by editing the kernel desktop parameter (default: desktop=xfce). See the Buster manual installation chapter how to edit kernel command line parameters.

Debian Edu ISOs for 64-bit and 32-bit PCs (both AMD and Intel processors) are available from the usual Debian places.

Download using http

The netinst iso image can be used for installation from CD/DVD and USB flash drives and is available for two Debian architectures: amd64 (64-bit) or i386 (32-bit). As the name implies, Internet access is required for the installation.

The BD image is approximately 5 GB large and can be used for installation of amd64 or i386 machines, also without access to the Internet. Like the netinst image it can be installed on USB flash drives or disk media of sufficient size.

Download using rsync

Also recommended to update an already existing image.

Unofficial images including non-free firmware - use only if really needed

Verify the downloaded image file

Detailed instructions for verifying these images are part of the Debian-CD FAQ.


Known problems that need to be fixed elsewhere

Known problems we fixed via workarounds, real fix needed elsewhere


Fixed in Git (master branch)

Fixed + done (related packages migrated to buster or unstable)

cp /etc/gosa/gosa.conf.orig /etc/gosa/gosa.conf
cat /dev/null > /etc/gosa/gosa.secrets
service apache2 reload

Please note that this change disables gosa-admin password encryption (GOsa² -> LDAP connection); the generated (random) password is used in this case.

rm /etc/apache2/mods-available/userdir.load 
cp /etc/apache2/mods-available/status.load /etc/apache2/mods-available/userdir.load 
sed -i 's/status/userdir/g' /etc/apache2/mods-available/userdir.load 
ln -s /etc/apache2/mods-available/userdir.load /etc/apache2/mods-available/debian-edu-userdir.load 
a2enmod debian-edu-userdir