[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[TAF] templates://yubico-pam/{libpam-yubico.templates}



The yubico-pam package introduced new or modified debconf
templates. This is often a good moment for a review to help the
package maintainer following the general suggested writing style and
track down typos and errors in the use of English language.

A bug report has been sent against the package: 654848

If someone wants to pick up this review, please answer to this mail,
in the mailing list, with an [ITR] (Intent To Review) label.

The templates file is attached.

To propose the file you reviewed for peer review, please send a [RFR]
(Request For Review) mail with the reviewed file attached...then a few
days later, when no more contributions come, a summary mail with a
[LCFC] (Last Chance For Comments) label.

These RFR and LCFC mails should CC the opened bug report.

Finally, after no more comments coming to the LCFC mail, you can send
the reviewed templates file in the bug report.

Then, please notify the list with a last mail using a [BTS] label
with the bug number.

Helping the package maintainer to deal with induced translation
updates at that moment will be nice. If you're not comfortable with
that part of the process, please hand it off to a translator.

-- 


Template: libpam-yubico/module_args
Type: string
Default: mode=client try_first_pass id=N key=K
_Description: Parameters for Yubico PAM:
 The Yubico PAM module supports two modes of operation - online
 validation of YubiKey OTPs or offline validation of YubiKey HMAC-SHA-1
 responses to challenges.
 .
 The default is online validation, and for that to work you need to get
 an API key (they are free) at https://upgrade.yubico.com/getapikey/ and
 enter the key id as "id=NNNN" and the base64 secret as "key=...".
 .
 All the available parameters for the Yubico PAM module are described
 in /usr/share/doc/libpam-yubico/README.gz.

Template: libpam-yubico/disabled_by_default
Type: note
_Description: Yubico PAM module disabled by default
 To avoid locking anyone out of their system, the Yubico PAM module is
 not activated by default. Use the program `pam-auth-update' to enable it.
Source: yubico-pam
Maintainer: Yubico Open Source Maintainers <ossmaint@yubico.com>
Uploaders: Fredrik Thulin <fredrik@yubico.com>, Simon Josefsson <simon@josefsson.org>
Section: admin
Priority: optional
Build-Depends: debhelper (>= 8),
	       po-debconf,
	       pkg-config,
	       cdbs,
	       libykclient-dev (>= 2.4),
	       libpam0g-dev,
	       libldap2-dev,
	       libykpers-1-dev (>= 1.5.2),
	       libyubikey-dev
Standards-Version: 3.9.2
Homepage: http://code.google.com/p/yubico-pam/
DM-Upload-Allowed: yes

Package: libpam-yubico
Architecture: any
Depends: libpam-runtime (>= 1.0.1-6~),
	 libykclient3 (>= 2.4),
	 libldap-2.4-2,
	 libykpers-1-1 (>= 1.5.2),
	 debconf | debconf-2.0,
	 ${shlibs:Depends},
	 ${misc:Depends}
Description: Yubico two-factor password+OTP (YubiKey) PAM module
 This is the Yubico PAM module. It enables you to set up your system to
 require two-factor authentication with your normal username and password
 and a YubiKey OTP that is validated against an online validation service.
 .
 The default validation service is the free YubiCloud, but you can easily
 set up and use your own validation service.
 .
 A second mode of operation is available using the YubiKeys HMAC-SHA-1
 Challenge-Response functionality. Using this mode, you can accomplish
 offline validation using a YubiKey, for example on a laptop computer.
 This only works for local logins though, and not for logging in using
 for example SSH.

Attachment: signature.asc
Description: Digital signature


Reply to: