python-spake2 0.7-3 source package in Ubuntu

Changelog

python-spake2 (0.7-3) unstable; urgency=high

  * QA upload.
  * Set maintainer to Debian QA Group. (see #833947)
  * Fix the python3-spake2 dependencies. (Closes: #867457)

 -- Adrian Bunk <email address hidden>  Thu, 06 Jul 2017 20:32:40 +0300

Upload details

Uploaded by:
Debian QA Group on 2017-07-07
Uploaded to:
Sid
Original maintainer:
Debian QA Group
Architectures:
all
Section:
misc
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section
Bionic release on 2017-10-24 universe misc
Artful release on 2017-07-07 universe misc

Builds

Artful: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
python-spake2_0.7-3.dsc 1.9 KiB b46f4f39226434bef29a9c972e3db232e8c870a596bc58d31c45ac70285d5c31
python-spake2_0.7.orig.tar.gz 54.9 KiB d2281458eed1048cb12fbab6ac02b06a8520ae9f2c30be330ea4c5b558a4b766
python-spake2_0.7-3.debian.tar.xz 2.4 KiB 0b50a9ae67397b5e214e2a163b23fedf175fdec02d9cc47ab3816727519199f1

Available diffs

No changes file available.

Binary packages built by this source

python-spake2: SPAKE2 password-authenticated key exchange (pure python)

 This library implements the SPAKE2 password-authenticated key
 exchange ("PAKE") algorithm. This allows two parties, who share a
 weak password, to safely derive a strong shared secret (and therefore
 build an encrypted+authenticated channel).
 .
 A passive attacker who eavesdrops on the connection learns no
 information about the password or the generated secret. An active
 attacker (man-in-the-middle) gets exactly one guess at the password,
 and unless they get it right, they learn no information about the
 password or the generated secret. Each execution of the protocol
 enables one guess. The use of a weak password is made safer by the
 rate-limiting of guesses: no off-line dictionary attack is available
 to the network-level attacker, and the protocol does not depend upon
 having previously-established confidentiality of the network (unlike
 e.g. sending a plaintext password over TLS).
 .
 The protocol requires the exchange of one pair of messages, so only
 one round trip is necessary to establish the session key. If
 key-confirmation is necessary, that will require a second round
 trip.

python3-spake2: SPAKE2 password-authenticated key exchange (pure python)

 This library implements the SPAKE2 password-authenticated key
 exchange ("PAKE") algorithm. This allows two parties, who share a
 weak password, to safely derive a strong shared secret (and therefore
 build an encrypted+authenticated channel).
 .
 A passive attacker who eavesdrops on the connection learns no
 information about the password or the generated secret. An active
 attacker (man-in-the-middle) gets exactly one guess at the password,
 and unless they get it right, they learn no information about the
 password or the generated secret. Each execution of the protocol
 enables one guess. The use of a weak password is made safer by the
 rate-limiting of guesses: no off-line dictionary attack is available
 to the network-level attacker, and the protocol does not depend upon
 having previously-established confidentiality of the network (unlike
 e.g. sending a plaintext password over TLS).
 .
 The protocol requires the exchange of one pair of messages, so only
 one round trip is necessary to establish the session key. If
 key-confirmation is necessary, that will require a second round
 trip.