diff options
author | Ulrich Müller <ulm@gentoo.org> | 2007-12-25 19:56:53 +0000 |
---|---|---|
committer | Ulrich Müller <ulm@gentoo.org> | 2007-12-25 19:56:53 +0000 |
commit | 3b96cf493ebde51df267322f0eb8ba96c010e181 (patch) | |
tree | 9f71d6b5a52a1e60d5802febda846f3fa93f5a6c /app-admin | |
parent | Add upstream patch to hide passwords with http://user:password@.../ URLs. (diff) | |
download | gentoo-2-3b96cf493ebde51df267322f0eb8ba96c010e181.tar.gz gentoo-2-3b96cf493ebde51df267322f0eb8ba96c010e181.tar.bz2 gentoo-2-3b96cf493ebde51df267322f0eb8ba96c010e181.zip |
Add myself as maintainer.
(Portage version: 2.1.4_rc11)
Diffstat (limited to 'app-admin')
-rw-r--r-- | app-admin/skey/ChangeLog | 5 | ||||
-rw-r--r-- | app-admin/skey/metadata.xml | 48 |
2 files changed, 28 insertions, 25 deletions
diff --git a/app-admin/skey/ChangeLog b/app-admin/skey/ChangeLog index 755911a45576..6e093004e2a9 100644 --- a/app-admin/skey/ChangeLog +++ b/app-admin/skey/ChangeLog @@ -1,6 +1,9 @@ # ChangeLog for app-admin/skey # Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.49 2007/12/25 15:29:38 phreak Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.50 2007/12/25 19:56:53 ulm Exp $ + + 25 Dec 2007; Ulrich Mueller <ulm@gentoo.org> metadata.xml: + Add myself as maintainer. 25 Dec 2007; Christian Heim <phreak@gentoo.org> metadata.xml: Removing taviso from metadata.xml as per #202471. Assigning to diff --git a/app-admin/skey/metadata.xml b/app-admin/skey/metadata.xml index b69016cc84c8..d98b44f17251 100644 --- a/app-admin/skey/metadata.xml +++ b/app-admin/skey/metadata.xml @@ -1,30 +1,30 @@ <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> <pkgmetadata> - <herd>no-herd</herd> - <maintainer> - <email>maintainer-needed@gentoo.org</email> - </maintainer> - <longdescription lang="en"> - From RFC2289: - One form of attack on networked computing systems is eavesdropping on - network connections to obtain authentication information such as the - login IDs and passwords of legitimate users. Once this information is - captured, it can be used at a later time to gain access to the system. - One-time password systems are designed to counter this type of attack, - called a "replay attack." +<herd>no-herd</herd> +<maintainer> + <email>ulm@gentoo.org</email> +</maintainer> +<longdescription lang="en"> + From RFC2289: + One form of attack on networked computing systems is eavesdropping on + network connections to obtain authentication information such as the + login IDs and passwords of legitimate users. Once this information is + captured, it can be used at a later time to gain access to the system. + One-time password systems are designed to counter this type of attack, + called a "replay attack." - The authentication system described in this document uses a secret - pass-phrase to generate a sequence of one-time (single use) passwords. - With this system, the user's secret pass-phrase never needs to cross the - network at any time such as during authentication or during pass-phrase - changes. Thus, it is not vulnerable to replay attacks. Added security is - provided by the property that no secret information need be stored on - any system, including the server being protected. + The authentication system described in this document uses a secret + pass-phrase to generate a sequence of one-time (single use) passwords. + With this system, the user's secret pass-phrase never needs to cross the + network at any time such as during authentication or during pass-phrase + changes. Thus, it is not vulnerable to replay attacks. Added security + is provided by the property that no secret information need be stored on + any system, including the server being protected. - The OTP system protects against external passive attacks against the - authentication subsystem. It does not prevent a network eavesdropper - from gaining access to private information and does not provide - protection against either "social engineering" or active attacks. - </longdescription> + The OTP system protects against external passive attacks against the + authentication subsystem. It does not prevent a network eavesdropper from + gaining access to private information and does not provide protection + against either "social engineering" or active attacks. +</longdescription> </pkgmetadata> |