summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorUlrich Müller <ulm@gentoo.org>2008-05-11 12:36:10 +0000
committerUlrich Müller <ulm@gentoo.org>2008-05-11 12:36:10 +0000
commiteeaebcfabfb03f6060eaecb04c41f07b6f95e7f7 (patch)
treeb846def56f74d2f1895e55021862288d182c6def /sys-auth/skey/metadata.xml
parentppc stable, bug #220391 (diff)
downloadgentoo-2-eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7.tar.gz
gentoo-2-eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7.tar.bz2
gentoo-2-eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7.zip
Package move from app-admin/skey to sys-auth/skey.
(Portage version: 2.1.5_rc10, RepoMan options: --force)
Diffstat (limited to 'sys-auth/skey/metadata.xml')
-rw-r--r--sys-auth/skey/metadata.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/sys-auth/skey/metadata.xml b/sys-auth/skey/metadata.xml
new file mode 100644
index 000000000000..d98b44f17251
--- /dev/null
+++ b/sys-auth/skey/metadata.xml
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>no-herd</herd>
+<maintainer>
+ <email>ulm@gentoo.org</email>
+</maintainer>
+<longdescription lang="en">
+ From RFC2289:
+ One form of attack on networked computing systems is eavesdropping on
+ network connections to obtain authentication information such as the
+ login IDs and passwords of legitimate users. Once this information is
+ captured, it can be used at a later time to gain access to the system.
+ One-time password systems are designed to counter this type of attack,
+ called a "replay attack."
+
+ The authentication system described in this document uses a secret
+ pass-phrase to generate a sequence of one-time (single use) passwords.
+ With this system, the user's secret pass-phrase never needs to cross the
+ network at any time such as during authentication or during pass-phrase
+ changes. Thus, it is not vulnerable to replay attacks. Added security
+ is provided by the property that no secret information need be stored on
+ any system, including the server being protected.
+
+ The OTP system protects against external passive attacks against the
+ authentication subsystem. It does not prevent a network eavesdropper from
+ gaining access to private information and does not provide protection
+ against either "social engineering" or active attacks.
+</longdescription>
+</pkgmetadata>