[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[RFR] templates://radiusd-livingston/{templates}



Please find, for review, the debconf templates of radiusd-livingston.

This review will last from Thursday, May 10, 2007 to Sunday, May 20, 2007.

Please send reviews as unified diffs (diff -u) against the original
files. Comments about your proposed changes will be appreciated.

Your review should be sent as an answer to this mail.

When appropriate, I will send intermediate requests for review, with
"[RFRn]" (n>=2) as a subject tag.

When we will reach a consensus, I send a "Last Chance For
Comments" mail with "[LCFC]" as a subject tag.

Finally, the reviewed templates will be sent to the package maintainer
as a bug report, and a mail will be sent to this list with "[BTS]" as
a subject tag.

Some addtional comments ...

I took a few liberties in rewriting the control file. Specifically I
added a paragraph to give a bit more explanation about RADIUS
servers in general. This may not be appropriate but I like the long
description to provide solid info. Users perusing 'apt-cache show'
or equivalent will then have a better idea about what the package
does.

I rewrote the templates file, but my guess is that this file will
become unnecessary. See
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422325.

There are three config files (users, clients, and proxy) that I
believe should be written to /etc/radiusd-livingston as part of the
install process. Instead they are written to
/u/s/doc/radiusd-livingston/examples and the user is asked, via
debconf notes, to copy them manually to /etc/radiusd-livingston.

I would suggest that the three config files - users, clients, proxy
- be left intact with examples but commented out completely and copied to
/etc/radiusd-livingston as part of the install. A new file
README.Debian could be added instructing the user to edit these
files in /etc/radiusd-livingston.

It is interesting because debian/rules has some commented out lines
that do copy these three config files to /etc/radiusd-livingston.

Kevin

-- 
Kevin Coyner  GnuPG key: 1024D/8CE11941
Template: radiusd-livingston/configure_clients
Type: note
_Description: You must configure clients for your RADIUS server.
 Copy the example file /usr/share/doc/radiusd-livingston/examples/clients to
 /etc/radiusd-livingston/clients and edit it for each RADIUS client you intend
 to service.

Template: radiusd-livingston/configure_users
Type: note
_Description: You must configure users for your RADIUS server.
 Copy the example file /usr/share/doc/radiusd-livingston/examples/users to
 /etc/radiusd-livingston/users and edit it for each RADIUS user you intend to
 service.
--- ../radiusd-livingston.old/debian/templates	2007-05-06 06:34:10.000000000 -0400
+++ debian/templates	2007-05-09 21:19:21.000000000 -0400
@@ -1,14 +1,13 @@
 Template: radiusd-livingston/configure_clients
 Type: note
-_Description: You must configure your RADIUS server.
- Use /usr/share/doc/radiusd-livingston/examples/clients
- to generate a /etc/radiusd-livingston/clients for each
- RADIUS client you service.
+_Description: You must configure clients for your RADIUS server.
+ Copy the example file /usr/share/doc/radiusd-livingston/examples/clients to
+ /etc/radiusd-livingston/clients and edit it for each RADIUS client you intend
+ to service.
 
 Template: radiusd-livingston/configure_users
 Type: note
-_Description: You must configure your RADIUS server.
- Use /usr/share/doc/radiusd-livingston/examples/users
- to generate a /etc/radiusd-livingston/users for each
- RADIUS user you service.
-
+_Description: You must configure users for your RADIUS server.
+ Copy the example file /usr/share/doc/radiusd-livingston/examples/users to
+ /etc/radiusd-livingston/users and edit it for each RADIUS user you intend to
+ service.
--- ../radiusd-livingston.old/debian/control	2007-05-06 06:34:10.000000000 -0400
+++ debian/control	2007-05-09 20:59:12.000000000 -0400
@@ -12,8 +12,19 @@
 Replaces: radius-server
 Provides: radius-server
 Description: Remote Authentication Dial-In User Service (RADIUS) server
- Provides the RADIUS server from Lucent Technologies Inc, formerly
- Livingston Enterprises Inc.
+ RADIUS is an AAA (authentication, authorization and accounting) protocol for
+ managing client access to network services. This version of the RADIUS server
+ is from Lucent Technologies Inc., formerly known as Livingston Enterprises
+ Inc., and is described by RFC's 2865 to 2869.
  .
- RADIUS is a means of managing clients' access to network services, and
- is described by RFCs 2865 to 2869.
+ Some ISP's (commonly modem, DSL, or wireless 802.11 services) require you to
+ enter a username and password in order to connect to the Internet. Before
+ access to the network is granted, this information is passed to a Network
+ Access Server (NAS) device over the link-layer protocol and then to a RADIUS
+ server over the RADIUS protocol. The RADIUS server checks that the
+ information is correct using authentication schemes like PAP, CHAP or EAP. If
+ accepted, the server will then authorize access to the ISP system and select
+ an IP address, L2TP parameters, etc.
+ .
+ RADIUS is also commonly used for accounting purposes so that the users can be
+ billed accordingly.
Source: radiusd-livingston
Section: net
Priority: optional
Maintainer: Paul Martin <pm@debian.org>
Build-Depends: debhelper (>>5), libdb4.5-dev
Standards-Version: 3.7.2

Package: radiusd-livingston
Architecture: any
Depends: ${shlibs:Depends}
Conflicts: radius-server
Replaces: radius-server
Provides: radius-server
Description: Remote Authentication Dial-In User Service (RADIUS) server
 RADIUS is an AAA (authentication, authorization and accounting) protocol for
 managing client access to network services. This version of the RADIUS server
 is from Lucent Technologies Inc., formerly known as Livingston Enterprises
 Inc., and is described by RFC's 2865 to 2869.
 .
 Some ISP's (commonly modem, DSL, or wireless 802.11 services) require you to
 enter a username and password in order to connect to the Internet. Before
 access to the network is granted, this information is passed to a Network
 Access Server (NAS) device over the link-layer protocol and then to a RADIUS
 server over the RADIUS protocol. The RADIUS server checks that the
 information is correct using authentication schemes like PAP, CHAP or EAP. If
 accepted, the server will then authorize access to the ISP system and select
 an IP address, L2TP parameters, etc.
 .
 RADIUS is also commonly used for accounting purposes so that the users can be
 billed accordingly.

Attachment: signature.asc
Description: Digital signature


Reply to: