1 |
phreak 07/12/25 15:29:39 |
2 |
|
3 |
Modified: metadata.xml ChangeLog |
4 |
Log: |
5 |
Removing taviso from metadata.xml as per #202471. Assigning to maintainer-needed. |
6 |
(Portage version: 2.1.3.19) |
7 |
|
8 |
Revision Changes Path |
9 |
1.2 app-admin/skey/metadata.xml |
10 |
|
11 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-admin/skey/metadata.xml?rev=1.2&view=markup |
12 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-admin/skey/metadata.xml?rev=1.2&content-type=text/plain |
13 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-admin/skey/metadata.xml?r1=1.1&r2=1.2 |
14 |
|
15 |
Index: metadata.xml |
16 |
=================================================================== |
17 |
RCS file: /var/cvsroot/gentoo-x86/app-admin/skey/metadata.xml,v |
18 |
retrieving revision 1.1 |
19 |
retrieving revision 1.2 |
20 |
diff -u -r1.1 -r1.2 |
21 |
--- metadata.xml 5 Sep 2003 13:15:59 -0000 1.1 |
22 |
+++ metadata.xml 25 Dec 2007 15:29:38 -0000 1.2 |
23 |
@@ -1,17 +1,30 @@ |
24 |
<?xml version="1.0" encoding="UTF-8"?> |
25 |
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> |
26 |
<pkgmetadata> |
27 |
-<herd>no-herd</herd> |
28 |
-<maintainer> |
29 |
- <email>taviso@g.o</email> |
30 |
- <name>Tavis Ormandy</name> |
31 |
-</maintainer> |
32 |
-<longdescription> |
33 |
-From RFC2289: |
34 |
-One form of attack on networked computing systems is eavesdropping on network connections to obtain authentication information such as the login IDs and passwords of legitimate users. Once this information is captured, it can be used at a later time to gain access to the system. One-time password systems are designed to counter this type of attack, called a "replay attack." |
35 |
+ <herd>no-herd</herd> |
36 |
+ <maintainer> |
37 |
+ <email>maintainer-needed@g.o</email> |
38 |
+ </maintainer> |
39 |
+ <longdescription lang="en"> |
40 |
+ From RFC2289: |
41 |
+ One form of attack on networked computing systems is eavesdropping on |
42 |
+ network connections to obtain authentication information such as the |
43 |
+ login IDs and passwords of legitimate users. Once this information is |
44 |
+ captured, it can be used at a later time to gain access to the system. |
45 |
+ One-time password systems are designed to counter this type of attack, |
46 |
+ called a "replay attack." |
47 |
|
48 |
-The authentication system described in this document uses a secret pass-phrase to generate a sequence of one-time (single use) passwords. With this system, the user's secret pass-phrase never needs to cross the network at any time such as during authentication or during pass-phrase changes. Thus, it is not vulnerable to replay attacks. Added security is provided by the property that no secret information need be stored on any system, including the server being protected. |
49 |
+ The authentication system described in this document uses a secret |
50 |
+ pass-phrase to generate a sequence of one-time (single use) passwords. |
51 |
+ With this system, the user's secret pass-phrase never needs to cross the |
52 |
+ network at any time such as during authentication or during pass-phrase |
53 |
+ changes. Thus, it is not vulnerable to replay attacks. Added security is |
54 |
+ provided by the property that no secret information need be stored on |
55 |
+ any system, including the server being protected. |
56 |
|
57 |
-The OTP system protects against external passive attacks against the authentication subsystem. It does not prevent a network eavesdropper from gaining access to private information and does not provide protection against either "social engineering" or active attacks. |
58 |
-</longdescription> |
59 |
+ The OTP system protects against external passive attacks against the |
60 |
+ authentication subsystem. It does not prevent a network eavesdropper |
61 |
+ from gaining access to private information and does not provide |
62 |
+ protection against either "social engineering" or active attacks. |
63 |
+ </longdescription> |
64 |
</pkgmetadata> |
65 |
|
66 |
|
67 |
|
68 |
1.49 app-admin/skey/ChangeLog |
69 |
|
70 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-admin/skey/ChangeLog?rev=1.49&view=markup |
71 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-admin/skey/ChangeLog?rev=1.49&content-type=text/plain |
72 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-admin/skey/ChangeLog?r1=1.48&r2=1.49 |
73 |
|
74 |
Index: ChangeLog |
75 |
=================================================================== |
76 |
RCS file: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v |
77 |
retrieving revision 1.48 |
78 |
retrieving revision 1.49 |
79 |
diff -u -r1.48 -r1.49 |
80 |
--- ChangeLog 8 Dec 2007 17:15:55 -0000 1.48 |
81 |
+++ ChangeLog 25 Dec 2007 15:29:38 -0000 1.49 |
82 |
@@ -1,6 +1,10 @@ |
83 |
# ChangeLog for app-admin/skey |
84 |
# Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2 |
85 |
-# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.48 2007/12/08 17:15:55 ulm Exp $ |
86 |
+# $Header: /var/cvsroot/gentoo-x86/app-admin/skey/ChangeLog,v 1.49 2007/12/25 15:29:38 phreak Exp $ |
87 |
+ |
88 |
+ 25 Dec 2007; Christian Heim <phreak@g.o> metadata.xml: |
89 |
+ Removing taviso from metadata.xml as per #202471. Assigning to |
90 |
+ maintainer-needed. |
91 |
|
92 |
08 Dec 2007; Ulrich Mueller <ulm@g.o> skey-1.1.5-r5.ebuild, |
93 |
skey-1.1.5-r6.ebuild: |
94 |
|
95 |
|
96 |
|
97 |
-- |
98 |
gentoo-commits@g.o mailing list |