1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
|
Source: yubikey-luks
Section: admin
Priority: optional
Maintainer: Debian Authentication Maintainers <team+auth@tracker.debian.org>
Uploaders:
Markus Frosch <lazyfrosch@debian.org>,
Nicolas Braud-Santoni <nicolas@braud-santoni.eu>
Build-Depends: debhelper-compat (= 13), dh-exec
Standards-Version: 4.5.1
Homepage: https://github.com/cornelinux/yubikey-luks
Vcs-Browser: https://salsa.debian.org/auth-team/yubikey-luks
Vcs-Git: https://salsa.debian.org/auth-team/yubikey-luks.git
Package: yubikey-luks
Architecture: all
Depends: cryptsetup-run, initramfs-tools, yubikey-personalization (>= 1.5), ${misc:Depends}
Recommends: cryptsetup-initramfs, expect
Description: YubiKey two factor authentication for LUKS disks
With this extension to the initramfs-tools, you can unlock a LUKS encrypted
disk using your YubiKey as a second factor.
.
The challenge-response mechanism of the YubiKey is used to generate a response
based on a PIN/password you have to enter.
.
Only the combination of the correct password and the matching YubiKey will
generate a response, that is a valid key of the LUKS disk. Alternatively
you can use any other LUKS passphrase when the YubiKey is not present.
|