Package: libpam-ssh
Version: 1.91.0-6
Severity: wishlist
Tags: patch
For better readability, wrap your text to 80 columns under README.Debian
Patch attached.
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages libpam-ssh depends on:
ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an
ii libpam0g 0.76-22 Pluggable Authentication Modules l
ii libssl0.9.7 0.9.7e-3 SSL shared libraries
-- no debconf information
--
Jesus Climent info:www.pumuki.org
Unix SysAdm|Linux User #66350|Debian Developer|2.6.10|Helsinki Finland
GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429 7E18 66FC 1D7F 8694 6D69
Thank you for pressing the self destruct button.
--[Computer] (Spaceballs)
--- README.Debian 2005-01-24 22:13:33.000000000 +0200
+++ /tmp/README.Debian 2005-02-06 22:04:56.000000000 +0200
@@ -17,10 +17,11 @@
pam-ssh-auth must be included after @include common-auth.
-If you have more than one ssh key (with the same or empty passphrase), you
have to link them
-to ~/.ssh/is_dsa{1,2,3} in order to make pam-ssh try to use them. Basically
you could have
-four keys : ~/.ssh/is_dsa, ~/.ssh/is_dsa1 and so on.
+If you have more than one ssh key (with the same or empty passphrase), you have
+to link them to ~/.ssh/is_dsa{1,2,3} in order to make pam-ssh try to use them.
+Basically you could have four keys : ~/.ssh/is_dsa, ~/.ssh/is_dsa1 and so on.
-Theses keys are added automatically : id_dsa,id_rsa,identity,id_dsa1,id_dsa2
and id_dsa3
+Theses keys are added automatically : id_dsa,id_rsa,identity,id_dsa1,id_dsa2
+and id_dsa3
-- Aurelien Labrosse <[EMAIL PROTECTED]>, Sun, 15 Feb 2004 19:59:55 +0100