The yubico-pam package introduced new or modified debconf templates. This is often a good moment for a review to help the package maintainer following the general suggested writing style and track down typos and errors in the use of English language. A bug report has been sent against the package: 654848 If someone wants to pick up this review, please answer to this mail, in the mailing list, with an [ITR] (Intent To Review) label. The templates file is attached. To propose the file you reviewed for peer review, please send a [RFR] (Request For Review) mail with the reviewed file attached...then a few days later, when no more contributions come, a summary mail with a [LCFC] (Last Chance For Comments) label. These RFR and LCFC mails should CC the opened bug report. Finally, after no more comments coming to the LCFC mail, you can send the reviewed templates file in the bug report. Then, please notify the list with a last mail using a [BTS] label with the bug number. Helping the package maintainer to deal with induced translation updates at that moment will be nice. If you're not comfortable with that part of the process, please hand it off to a translator. --
Template: libpam-yubico/module_args Type: string Default: mode=client try_first_pass id=N key=K _Description: Parameters for Yubico PAM: The Yubico PAM module supports two modes of operation - online validation of YubiKey OTPs or offline validation of YubiKey HMAC-SHA-1 responses to challenges. . The default is online validation, and for that to work you need to get an API key (they are free) at https://upgrade.yubico.com/getapikey/ and enter the key id as "id=NNNN" and the base64 secret as "key=...". . All the available parameters for the Yubico PAM module are described in /usr/share/doc/libpam-yubico/README.gz. Template: libpam-yubico/disabled_by_default Type: note _Description: Yubico PAM module disabled by default To avoid locking anyone out of their system, the Yubico PAM module is not activated by default. Use the program `pam-auth-update' to enable it.
Source: yubico-pam Maintainer: Yubico Open Source Maintainers <ossmaint@yubico.com> Uploaders: Fredrik Thulin <fredrik@yubico.com>, Simon Josefsson <simon@josefsson.org> Section: admin Priority: optional Build-Depends: debhelper (>= 8), po-debconf, pkg-config, cdbs, libykclient-dev (>= 2.4), libpam0g-dev, libldap2-dev, libykpers-1-dev (>= 1.5.2), libyubikey-dev Standards-Version: 3.9.2 Homepage: http://code.google.com/p/yubico-pam/ DM-Upload-Allowed: yes Package: libpam-yubico Architecture: any Depends: libpam-runtime (>= 1.0.1-6~), libykclient3 (>= 2.4), libldap-2.4-2, libykpers-1-1 (>= 1.5.2), debconf | debconf-2.0, ${shlibs:Depends}, ${misc:Depends} Description: Yubico two-factor password+OTP (YubiKey) PAM module This is the Yubico PAM module. It enables you to set up your system to require two-factor authentication with your normal username and password and a YubiKey OTP that is validated against an online validation service. . The default validation service is the free YubiCloud, but you can easily set up and use your own validation service. . A second mode of operation is available using the YubiKeys HMAC-SHA-1 Challenge-Response functionality. Using this mode, you can accomplish offline validation using a YubiKey, for example on a laptop computer. This only works for local logins though, and not for logging in using for example SSH.
Attachment:
signature.asc
Description: Digital signature