yubikey-ksm 1.15-4 source package in Ubuntu

Changelog

yubikey-ksm (1.15-4) unstable; urgency=low

  * Fix debian/watch file.

 -- Simon Josefsson <email address hidden>  Fri, 21 Aug 2015 12:17:50 +0200

Upload details

Uploaded by:
Debian Authentication Maintainers
Uploaded to:
Sid
Original maintainer:
Debian Authentication Maintainers
Architectures:
all
Section:
misc
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Xenial: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
yubikey-ksm_1.15-4.dsc 1.6 KiB df07e36e0ee29494a259225792643d00466514d729be01f8e171b75d4063fec9
yubikey-ksm_1.15.orig.tar.gz 25.0 KiB 2133786e9d81e3b1b65e65b86c93f94ad6104fade1964a8e26eba7dc56fa1503
yubikey-ksm_1.15-4.debian.tar.xz 16.4 KiB a8b349178d4044c4a82bce42c8c0ba5a4e4e0994d7e1e7cf2e6aaea050600445

Available diffs

No changes file available.

Binary packages built by this source

yubikey-ksm: Key Storage Module for YubiKey One-Time Password (OTP) tokens

 YubiKeys are USB tokens that act like keyboards and generate one-time
 passwords. This package contains a server written in PHP for use
 with Apache that decrypt YubiKey One-Time Passwords (OTPs), normally
 only used by YubiKey OTP validation servers. The architecture is
 that a set of validation servers manage the token counters and
 respond to OTP requests from clients, and utilize a set of back-end
 YubiKey Key Storage Module (KSM) servers to perform the actual AES
 key decryption. The protocols are openly published. This implementation
 store the AES keys in a database unencrypted, which can be protected
 using file-system encryption mechanisms Another KSM implementation
 is available in the yhsm-yubikey-ksm package that use the YubiHSM hardware
 to protect the decryption process. Sometimes the KSM runs on another
 server than the validation server, but it is possible to run both on
 the same machine. After installing and configuring this package you
 will have a YubiKey KSM server up and running via Apache.