File: control

package info (click to toggle)
pwdhash 1.7-7
  • links: PTS, VCS
  • area: main
  • in suites: squeeze
  • size: 156 kB
  • ctags: 64
  • sloc: xml: 12; makefile: 2
file content (36 lines) | stat: -rw-r--r-- 1,503 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
Source: pwdhash
Section: web
Priority: optional
Maintainer: Benjamin Drung <bdrung@ubuntu.com>
Uploaders: Debian Mozilla Extension Maintainers <pkg-mozext-maintainers@lists.alioth.debian.org>
Build-Depends: cdbs,
               debhelper (>= 7),
               mozilla-devscripts (>= 0.19~)
Standards-Version: 3.8.4
DM-Upload-Allowed: yes
Homepage: https://www.pwdhash.com/
Vcs-git: git://git.debian.org/git/pkg-mozext/pwdhash.git
Vcs-Browser: http://git.debian.org/?p=pkg-mozext/pwdhash.git;a=summary

Package: xul-ext-pwdhash
Architecture: all
Depends: ${misc:Depends}
Recommends: ${xpi:Recommends}
Provides: ${xpi:Provides}
Enhances: ${xpi:Enhances}
Conflicts: mozilla-pwdhash (<< 1.7-4~)
Replaces: mozilla-pwdhash (<< 1.7-4~)
Description: per-site password generator for Mozilla browsers
 PwdHash is a browser extension (compatible with Iceweasel, Firefox
 and Seamonkey) to transparently convert a user's password into a
 site-specific password which is not tied to the machine on which it
 was generated.
 .
 Hashing is triggered by prefixing the password with '@@' or by using
 the shortcut key 'F2'. The password field in focus is replaced by the
 hash value. Should the site be compromised, the attacker can now only
 see the hash of the password, not the password itself.
 .
 PwdHash does not encrypt passwords, but it makes brute-force attacks much
 less effective. It also means phishing sites can only steal a hash that's
 specific to the spoof page and useless on the site being imitated.