yubico-pam 2.11-1 source package in Ubuntu

Changelog

yubico-pam (2.11-1) unstable; urgency=low


  [ Christian Perrier <email address hidden> ]
  * Debconf templates and debian/control reviewed by the debian-l10n-
    english team as part of the Smith review project. Closes: #654848
  * [Debconf translation updates]
  * Russian (Yuri Kozlov).  Closes: #656344
  * Danish (Joe Hansen).  Closes: #656514
  * Dutch; (Jeroen Schot).  Closes: #657147
  * German (Chris Leick).  Closes: #657214
  * Czech (Michal Simunek).  Closes: #657535
  * Swedish (Martin Bagge / brother).  Closes: #657547
  * Spanish; (Jardi A. Martínez Jordán).  Closes: #657946
  * French (Julien Patriarca).  Closes: #658079
  * Polish (Michał Kułach).  Closes: #658165
  * Portuguese (Miguel Figueiredo).  Closes: #658420

  [ Fredrik Thulin ]
  * Fix crash-bug with challenge-response mode when button-press is
    required, but button isn't pressed.
  * Fix a memset() of wrong size, reported by clang.
  * Add prefix matching to LDAP fetched values.

 -- Simon Josefsson <email address hidden>  Fri, 10 Feb 2012 15:47:07 +0100

Upload details

Uploaded by:
Yubico Open Source Maintainers
Uploaded to:
Sid
Original maintainer:
Yubico Open Source Maintainers
Architectures:
any
Section:
admin
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Precise release universe admin

Downloads

File Size SHA-256 Checksum
yubico-pam_2.11-1.dsc 1.5 KiB 1593f4b3a5a64320bc76d23602a94cb2435cc6bbef4dcff51a96a793c4a52482
yubico-pam_2.11.orig.tar.gz 351.9 KiB 90f27e978313349ed6de19a57c3603b48f7c99fba02fe046396bf56b838d125f
yubico-pam_2.11-1.debian.tar.gz 11.1 KiB effcdeda4a55ed0736e79b2874468d7750f3e3bee1288095ce9ea9d06d4ac217

No changes file available.

Binary packages built by this source

libpam-yubico: two-factor password and YubiKey OTP PAM module

 This package provides the Yubico PAM module. It enables the use of
 two-factor authentication, with existing logins and passwords plus
 a YubiKey One-Time Password that is validated against an online
 validation service. The default is the free YubiCloud, but it is easy
 to set up a custom service.
 .
 A second mode of operation is available using the YubiKey's HMAC-SHA-1
 Challenge-Response functionality. This allows for offline validation
 using a YubiKey, for example on a laptop computer. However, this only
 works for local logins, not for instance SSH logins.