diff options
author | Ulrich Müller <ulm@gentoo.org> | 2008-05-11 12:36:10 +0000 |
---|---|---|
committer | Ulrich Müller <ulm@gentoo.org> | 2008-05-11 12:36:10 +0000 |
commit | eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7 (patch) | |
tree | b846def56f74d2f1895e55021862288d182c6def /sys-auth/skey/metadata.xml | |
parent | ppc stable, bug #220391 (diff) | |
download | gentoo-2-eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7.tar.gz gentoo-2-eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7.tar.bz2 gentoo-2-eeaebcfabfb03f6060eaecb04c41f07b6f95e7f7.zip |
Package move from app-admin/skey to sys-auth/skey.
(Portage version: 2.1.5_rc10, RepoMan options: --force)
Diffstat (limited to 'sys-auth/skey/metadata.xml')
-rw-r--r-- | sys-auth/skey/metadata.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/sys-auth/skey/metadata.xml b/sys-auth/skey/metadata.xml new file mode 100644 index 000000000000..d98b44f17251 --- /dev/null +++ b/sys-auth/skey/metadata.xml @@ -0,0 +1,30 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>no-herd</herd> +<maintainer> + <email>ulm@gentoo.org</email> +</maintainer> +<longdescription lang="en"> + From RFC2289: + One form of attack on networked computing systems is eavesdropping on + network connections to obtain authentication information such as the + login IDs and passwords of legitimate users. Once this information is + captured, it can be used at a later time to gain access to the system. + One-time password systems are designed to counter this type of attack, + called a "replay attack." + + The authentication system described in this document uses a secret + pass-phrase to generate a sequence of one-time (single use) passwords. + With this system, the user's secret pass-phrase never needs to cross the + network at any time such as during authentication or during pass-phrase + changes. Thus, it is not vulnerable to replay attacks. Added security + is provided by the property that no secret information need be stored on + any system, including the server being protected. + + The OTP system protects against external passive attacks against the + authentication subsystem. It does not prevent a network eavesdropper from + gaining access to private information and does not provide protection + against either "social engineering" or active attacks. +</longdescription> +</pkgmetadata> |