This is the last call for comments for the review of debconf templates for yubico-pam.
The reviewed templates will be sent on Friday, January 13, 2012 to this bug report and a mail will be sent to this list with "[BTS]" as a subject tag. --
Template: libpam-yubico/module_args Type: string Default: mode=client try_first_pass id=N key=K _Description: Parameters for Yubico PAM: The Yubico PAM module supports two modes of operation: online validation of YubiKey OTPs or offline validation of YubiKey HMAC-SHA-1 responses to challenges. . The default is online validation, and for that to work you need to get a free API key at https://upgrade.yubico.com/getapikey/ and enter the key id as "id=NNNN" and the base64 secret as "key=...". . All the available parameters for the Yubico PAM module are described in /usr/share/doc/libpam-yubico/README.gz. To avoid accidental lock-outs the module will not be active until it is enabled with the "pam-auth-update" command.
Source: yubico-pam Maintainer: Yubico Open Source Maintainers <ossma...@yubico.com> Uploaders: Fredrik Thulin <fred...@yubico.com>, Simon Josefsson <si...@josefsson.org> Section: admin Priority: optional Build-Depends: debhelper (>= 8), po-debconf, pkg-config, cdbs, libykclient-dev (>= 2.4), libpam0g-dev, libldap2-dev, libykpers-1-dev (>= 1.5.2), libyubikey-dev Standards-Version: 3.9.2 Homepage: http://code.google.com/p/yubico-pam/ DM-Upload-Allowed: yes Package: libpam-yubico Architecture: any Depends: libpam-runtime (>= 1.0.1-6~), libykclient3 (>= 2.4), libldap-2.4-2, libykpers-1-1 (>= 1.5.2), debconf | debconf-2.0, ${shlibs:Depends}, ${misc:Depends} Description: two-factor password and Yubikey OTP PAM module This package provides the Yubico PAM module. It enables the use of two-factor authentication, with existing logins and passwords plus a YubiKey One-Time Password that is validated against an online validation service. The default is the free YubiCloud, but it is easy to set up a custom service. . A second mode of operation is available using the YubiKey's HMAC-SHA-1 Challenge-Response functionality. This allows for offline validation using a YubiKey, for example on a laptop computer. However, this only works for local logins, not for instance SSH logins.
signature.asc
Description: Digital signature