[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#795982: marked as done (ITP: yubikey-luks -- YubiKey two factor authentication for LUKS disks)



Your message dated Thu, 27 Aug 2015 11:00:32 +0000
with message-id <E1ZUuv2-0001sC-Pa@franck.debian.org>
and subject line Bug#795982: fixed in yubikey-luks 0.3.3+3.ge11e4c1-1
has caused the Debian Bug report #795982,
regarding ITP: yubikey-luks -- YubiKey two factor authentication for LUKS disks
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
795982: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795982
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package: wnpp
Severity: wishlist
Owner: Markus Frosch <lazyfrosch@debian.org>

* Package name    : yubikey-luks
  Version         : 0.3.3
  Upstream Author : Cornelius Kölbel <corny@cornelinux.de>
* URL             : https://github.com/cornelinux/yubikey-luks
* License         : BSD-3-Clause
  Programming Lang: Shell
  Description     : YubiKey two factor authentication for LUKS disks


With this extension to the initramfs-tools, you can unlock a LUKS encrypted
disk using your YubiKey as a second factor.

The challenge-response mechanism of the YubiKey is used to generate a response
based on a PIN/password you have to enter.

Only the combination of the correct password and the matching YubiKey will
generate a response, that is a valid key of the LUKS disk. Alternatively
you can use any other LUKS passphrase when the YubiKey is not present.


Note for WNPP: dracut is not supported


- -- 
markus@lazyfrosch.de / lazyfrosch@debian.org
http://www.lazyfrosch.de
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJV0y3qAAoJEPJhXZqrmHtuMNoH/jjUYewkkh5H2F6Ea4HD5+6o
v3jloBy+sXL3WOpB4ubt67rSMgd30M/1U8wZ39t4osi9MrGshL8XCTZA0U+ExtTk
K8ETyu8WYIr7inF4iiR8iV2co4vWCfGZ7fgyo8V25zT60ZT0NYf0oRGwsGK9gFLB
cRVvMi8JZTX/0MFbWh7GMbwo8Xc1wT2a0febwLvBRTgv/lYdeSX6vmFEB2UcSYJ9
YzeKHnprX6hpiwOVISM6PP8d8CcjoL1mw2JQ4HeO+8CEh9n3xkehdelRVrJs98Lb
jpnCA6j6opxpVgFoQCoyzvSOkEtj0YBjCfnSBe8x07NWv96qhkOlkmte1/r4bBs=
=O+i4
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Source: yubikey-luks
Source-Version: 0.3.3+3.ge11e4c1-1

We believe that the bug you reported is fixed in the latest version of
yubikey-luks, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 795982@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Frosch <lazyfrosch@debian.org> (supplier of updated yubikey-luks package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 17 Aug 2015 11:47:27 +0200
Source: yubikey-luks
Binary: yubikey-luks
Architecture: source all
Version: 0.3.3+3.ge11e4c1-1
Distribution: unstable
Urgency: medium
Maintainer: Markus Frosch <lazyfrosch@debian.org>
Changed-By: Markus Frosch <lazyfrosch@debian.org>
Description:
 yubikey-luks - YubiKey two factor authentication for LUKS disks
Closes: 795982
Changes:
 yubikey-luks (0.3.3+3.ge11e4c1-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #795982)
Checksums-Sha1:
 b154ad489956c54c4abe8f9de3fab137b2525567 1617 yubikey-luks_0.3.3+3.ge11e4c1-1.dsc
 29e79274be86f96349fa59489fb995dc6548af52 4336 yubikey-luks_0.3.3+3.ge11e4c1.orig.tar.xz
 aa88b3d4e3f6d1d72616122a37356593da22a0eb 3500 yubikey-luks_0.3.3+3.ge11e4c1-1.debian.tar.xz
 8c5ce1bd640c9b807e7ac4b0c7468517ca3e4cdf 6304 yubikey-luks_0.3.3+3.ge11e4c1-1_all.deb
Checksums-Sha256:
 9e15ac32a7fad8ac8561deac11088e0d59219742ab7f104612ac509d8dc37bb2 1617 yubikey-luks_0.3.3+3.ge11e4c1-1.dsc
 7e16bf11b1085c4a050f8f134dad5f5d3e9df56ba892aed714e4e76856f3ee0c 4336 yubikey-luks_0.3.3+3.ge11e4c1.orig.tar.xz
 9bd42f398220b57ba769be1b4a209294c1048de0c44d70f3facb0f13ee04ecbf 3500 yubikey-luks_0.3.3+3.ge11e4c1-1.debian.tar.xz
 5f4a37ed6eb136cb0ec2dd93d3e06fb3b059387e023780fbac6c32406159f2ed 6304 yubikey-luks_0.3.3+3.ge11e4c1-1_all.deb
Files:
 4f9cf94468c382f9d989e670cd0cdaf4 1617 admin extra yubikey-luks_0.3.3+3.ge11e4c1-1.dsc
 3815b5d4cfb95f1ed446aa471a5de2ea 4336 admin extra yubikey-luks_0.3.3+3.ge11e4c1.orig.tar.xz
 cfd18bbe703d0acba5f7ee33dad3a4e1 3500 admin extra yubikey-luks_0.3.3+3.ge11e4c1-1.debian.tar.xz
 71d36ea2666eb1a61d9fe5799718dcb4 6304 admin extra yubikey-luks_0.3.3+3.ge11e4c1-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJV0zB8AAoJEPJhXZqrmHtuH1cIAKhiSbLEeLO8w9Pahwqng/er
/MVu1tUKy7f810Mcx4++2/L3X2//M6EDXs4QZIPrCLptMQGTDhqaM1mj0hTs7wZx
CT/Klu7ASsB/EKNA2ctHkpC1mYb8O6+X7Q46j8zC0z+sPRuxJu232C6lM9dK0BjN
2uvfqFo3p0ASRy5FzhpKEroUVD8h+OgYO0ODcBjEcytFVUoWtOZtou5q8YRP9rYO
ptShhzRUv8jmo/9YN2SVkicSV/D2oNVFFc56vX+6DYRUxNPT368GpyjGX2LE1cJH
RyUyad2JQJ8P6w72e7rT8wQK25xOEeH1ecnWsqAuOcESwdtzISqDX5HEQ9Hjfgw=
=aDbZ
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: