Your message dated Thu, 27 Aug 2015 11:00:32 +0000
with message-id <e1zuuv2-0001sc...@franck.debian.org>
and subject line Bug#795982: fixed in yubikey-luks 0.3.3+3.ge11e4c1-1
has caused the Debian Bug report #795982,
regarding ITP: yubikey-luks -- YubiKey two factor authentication for LUKS disks
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
795982: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795982
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package: wnpp
Severity: wishlist
Owner: Markus Frosch <lazyfro...@debian.org>
* Package name : yubikey-luks
Version : 0.3.3
Upstream Author : Cornelius Kölbel <co...@cornelinux.de>
* URL : https://github.com/cornelinux/yubikey-luks
* License : BSD-3-Clause
Programming Lang: Shell
Description : YubiKey two factor authentication for LUKS disks
With this extension to the initramfs-tools, you can unlock a LUKS encrypted
disk using your YubiKey as a second factor.
The challenge-response mechanism of the YubiKey is used to generate a response
based on a PIN/password you have to enter.
Only the combination of the correct password and the matching YubiKey will
generate a response, that is a valid key of the LUKS disk. Alternatively
you can use any other LUKS passphrase when the YubiKey is not present.
Note for WNPP: dracut is not supported
- --
mar...@lazyfrosch.de / lazyfro...@debian.org
http://www.lazyfrosch.de
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJV0y3qAAoJEPJhXZqrmHtuMNoH/jjUYewkkh5H2F6Ea4HD5+6o
v3jloBy+sXL3WOpB4ubt67rSMgd30M/1U8wZ39t4osi9MrGshL8XCTZA0U+ExtTk
K8ETyu8WYIr7inF4iiR8iV2co4vWCfGZ7fgyo8V25zT60ZT0NYf0oRGwsGK9gFLB
cRVvMi8JZTX/0MFbWh7GMbwo8Xc1wT2a0febwLvBRTgv/lYdeSX6vmFEB2UcSYJ9
YzeKHnprX6hpiwOVISM6PP8d8CcjoL1mw2JQ4HeO+8CEh9n3xkehdelRVrJs98Lb
jpnCA6j6opxpVgFoQCoyzvSOkEtj0YBjCfnSBe8x07NWv96qhkOlkmte1/r4bBs=
=O+i4
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
Source: yubikey-luks
Source-Version: 0.3.3+3.ge11e4c1-1
We believe that the bug you reported is fixed in the latest version of
yubikey-luks, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 795...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Markus Frosch <lazyfro...@debian.org> (supplier of updated yubikey-luks package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 17 Aug 2015 11:47:27 +0200
Source: yubikey-luks
Binary: yubikey-luks
Architecture: source all
Version: 0.3.3+3.ge11e4c1-1
Distribution: unstable
Urgency: medium
Maintainer: Markus Frosch <lazyfro...@debian.org>
Changed-By: Markus Frosch <lazyfro...@debian.org>
Description:
yubikey-luks - YubiKey two factor authentication for LUKS disks
Closes: 795982
Changes:
yubikey-luks (0.3.3+3.ge11e4c1-1) unstable; urgency=medium
.
* Initial release. (Closes: #795982)
Checksums-Sha1:
b154ad489956c54c4abe8f9de3fab137b2525567 1617
yubikey-luks_0.3.3+3.ge11e4c1-1.dsc
29e79274be86f96349fa59489fb995dc6548af52 4336
yubikey-luks_0.3.3+3.ge11e4c1.orig.tar.xz
aa88b3d4e3f6d1d72616122a37356593da22a0eb 3500
yubikey-luks_0.3.3+3.ge11e4c1-1.debian.tar.xz
8c5ce1bd640c9b807e7ac4b0c7468517ca3e4cdf 6304
yubikey-luks_0.3.3+3.ge11e4c1-1_all.deb
Checksums-Sha256:
9e15ac32a7fad8ac8561deac11088e0d59219742ab7f104612ac509d8dc37bb2 1617
yubikey-luks_0.3.3+3.ge11e4c1-1.dsc
7e16bf11b1085c4a050f8f134dad5f5d3e9df56ba892aed714e4e76856f3ee0c 4336
yubikey-luks_0.3.3+3.ge11e4c1.orig.tar.xz
9bd42f398220b57ba769be1b4a209294c1048de0c44d70f3facb0f13ee04ecbf 3500
yubikey-luks_0.3.3+3.ge11e4c1-1.debian.tar.xz
5f4a37ed6eb136cb0ec2dd93d3e06fb3b059387e023780fbac6c32406159f2ed 6304
yubikey-luks_0.3.3+3.ge11e4c1-1_all.deb
Files:
4f9cf94468c382f9d989e670cd0cdaf4 1617 admin extra
yubikey-luks_0.3.3+3.ge11e4c1-1.dsc
3815b5d4cfb95f1ed446aa471a5de2ea 4336 admin extra
yubikey-luks_0.3.3+3.ge11e4c1.orig.tar.xz
cfd18bbe703d0acba5f7ee33dad3a4e1 3500 admin extra
yubikey-luks_0.3.3+3.ge11e4c1-1.debian.tar.xz
71d36ea2666eb1a61d9fe5799718dcb4 6304 admin extra
yubikey-luks_0.3.3+3.ge11e4c1-1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJV0zB8AAoJEPJhXZqrmHtuH1cIAKhiSbLEeLO8w9Pahwqng/er
/MVu1tUKy7f810Mcx4++2/L3X2//M6EDXs4QZIPrCLptMQGTDhqaM1mj0hTs7wZx
CT/Klu7ASsB/EKNA2ctHkpC1mYb8O6+X7Q46j8zC0z+sPRuxJu232C6lM9dK0BjN
2uvfqFo3p0ASRy5FzhpKEroUVD8h+OgYO0ODcBjEcytFVUoWtOZtou5q8YRP9rYO
ptShhzRUv8jmo/9YN2SVkicSV/D2oNVFFc56vX+6DYRUxNPT368GpyjGX2LE1cJH
RyUyad2JQJ8P6w72e7rT8wQK25xOEeH1ecnWsqAuOcESwdtzISqDX5HEQ9Hjfgw=
=aDbZ
-----END PGP SIGNATURE-----
--- End Message ---