libpam-ssh 1.98-2 source package in Ubuntu

Changelog

libpam-ssh (1.98-2) unstable; urgency=low


  * Set ssh-agent real GID to ssh group GID, as ssh-agent is installed
    setgid wrt to the ssh group; it allows one to pass (and to honour)
    environment variables otherwise discarded by glibc, as TMPDIR.
  * Fix ssh-agent TMPDIR honouring, see previous enhancement; TMP is
    no more honoured to stick closer to openssh approach.
  * Handle inexistent per-user configuration direction for session phase
    by shortcutting the process.
  * Let the ssh-agent to determine the apropriate shell style; this is
    now possible because the ssh-agent now possesses the user UID.
  * Move silent-ssh-single-sign-on into debian/pam-configs and rename it
    ssh wrt to the emerging custom.
  * Revisit README.Debian and NEWS.Debian to reflect changes.
  * Refresh pam_ssh manpage.
  * debian/control, Vcs-* headers canonicalization.
  * Slightly improve log messaging for closing sessions.

 -- Jerome Benoit <email address hidden>  Sun, 14 Jul 2013 13:35:55 +0000

Upload details

Uploaded by:
Jerome Benoit
Uploaded to:
Sid
Original maintainer:
Jerome Benoit
Architectures:
any
Section:
misc
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libpam-ssh_1.98-2.dsc 1.9 KiB 1ebc13c05bb1057d75011c20e84fe28fbd1b8e65502aab854938b08f115d05e5
libpam-ssh_1.98.orig.tar.bz2 286.1 KiB 30312f242c00551b120cc39defd3745b8cb50408ea845e8688d18d2a28b51180
libpam-ssh_1.98-2.debian.tar.xz 72.9 KiB c36e98ccc1b23a8f6bc70a66aac98a0f98030b065b433cacfb47375b1cf2d439

Available diffs

No changes file available.

Binary packages built by this source

libpam-ssh: Authenticate using SSH keys

 This pluggable authentication module (PAM) provides single sign-on
 using secure shell (SSH) keys:
 - during authentication, the user types a SSH passphrase and is authenticated
   if the passphrase successfully decrypts the user's SSH private keys;
 - in session phase, a ssh-agent process is started and decrypted keys are
   added, and thus the user can SSH to other hosts that accept key
   authentication without typing more passwords for the entire session.