Debian Edu Installer Logo

Status of Debian Edu "Buster"

(development started in July 2017)

Released at the Debian 10 Buster release date (July 06 2019)
See the release announcement.

Updated at Debian 10.1 Buster point release date (September 07 2019)
Among others, the packages debian-edu-config, gosa* and debian-edu-doc* have been updated. It is recommended to update the main server first, then LTSP chroots (in case they exist) and other clients (like workstations) in the Debian Edu network.
Please note that the updated debian-edu-config package includes CFengine configuration file changes, so cf-agent -I -D installation needs to be run after upgrading the package (see the Buster manual Maintenance chapter).

Updated at Debian 10.2 Buster point release date (November 16 2019)
Among others, the packages debian-edu-config and standardskriver have been updated, see the related announcement.

Updated at Debian 10.3 Buster point release date (February 08 2020)
Among others, the package debian-edu-config has been updated, see the related announcement.

Updated at Debian 10.4 Buster point release date (May 09 2020)
Among others, the package debian-edu-config has been updated, see the related announcement. New users are no longer forced to accept the self-signed certificate as an insecure one (Firefox-ESR and Thunderbird).

Updated at Debian 10.5 Buster point release date (Aug 01 2020)
Among others, the package debian-edu-config has been updated, see the related announcement. The loss of dynamically allocated IPv4 addresses has been fixed.

Updated at Debian 10.6 Buster point release date (Sep 26 2020)
See the related announcement; there are no changes concerning Debian Edu packages.

Updated at Debian 10.7 Buster point release date (Dec 05 2020)
See the related announcement; there are no changes concerning Debian Edu packages.

Updated at Debian 10.8 Buster point release date (Feb 06 2021)
Among others, the package debian-edu-config has been updated, see the related announcement. The host keytabs cleanup code has been moved out of gosa-modify-host into a standalone script, reducing LDAP calls to a single query and thus improving performance. (No cf-agent run required to activate the change.)

Updated at Debian 10.9 Buster point release date (Mar 27 2021)
See the related announcement; there are no changes concerning Debian Edu packages.

Updated at Debian 10.10 Buster point release date (Jun 19 2021)
See the related announcement; there are no changes concerning Debian Edu packages.

Installation

Instead of the default xfce desktop environment, mate, gnome, lxde, lxqt or kde can be used by editing the kernel desktop parameter (default: desktop=xfce). See the Buster manual installation chapter how to edit kernel command line parameters.

Debian Edu ISOs for 64-bit and 32-bit PCs (both AMD and Intel processors) are available from the usual Debian places (updated to Debian Edu 10.9):

Download using HTTPS

The netinst iso image can be used for installation from CD/DVD and USB flash drives and is available for two Debian architectures: amd64 (64-bit) or i386 (32-bit). As the name implies, Internet access is required for the installation.

The BD images are 5.3 GB (amd64) / 5.4 GB (i386) large and can be used for installation of amd64 or i386 machines, also without access to the Internet. Like the netinst image it can be installed on USB flash drives or disk media of sufficient size.

Download using rsync

Also recommended to update an already existing image.

Unofficial images including non-free firmware - use only if really needed

https://get.debian.org/cdimage/unofficial/non-free/cd-including-firmware/archive/latest-oldstable/amd64/iso-bd/

Verify the downloaded image file

Detailed instructions for verifying these images are part of the Debian-CD FAQ.


Known problems we want to fix

Known problems that can be fixed locally

cd /etc/dhcp
mv dhcpd.conf dhcpd.conf.cfsaved
ln -s debian-edu-dhcpd.conf dhcpd.conf
service isc-dhcp-server restart

Known problems that need to be fixed elsewhere

Known problems we fixed via workarounds, real fix needed elsewhere


Fixed + done (related packages migrated to buster or unstable)

cp /etc/gosa/gosa.conf.orig /etc/gosa/gosa.conf
cat /dev/null > /etc/gosa/gosa.secrets
service apache2 reload

Please note that this change disables gosa-admin password encryption (GOsa² -> LDAP connection); the generated (random) password is used in this case.

rm /etc/apache2/mods-available/userdir.load 
cp /etc/apache2/mods-available/status.load /etc/apache2/mods-available/userdir.load 
sed -i 's/status/userdir/g' /etc/apache2/mods-available/userdir.load 
ln -s /etc/apache2/mods-available/userdir.load /etc/apache2/mods-available/debian-edu-userdir.load 
a2enmod debian-edu-userdir