MainInclusionReportPamKeyring

Differences between revisions 2 and 3
Revision 2 as of 2007-02-11 18:36:30
Size: 1540
Editor: 213
Comment: Confirmation of upstream
Revision 3 as of 2008-08-06 16:36:03
Size: 1558
Editor: localhost
Comment: converted to 1.6 markup
Deletions are marked like this. Additions are marked like this.
Line 10: Line 10:
  * No [http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pam-keyring CVE entries].
  * No [http://secunia.com/search/?search=pam-keyring Secunia history].
  * No [[http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pam-keyring|CVE entries]].
  * No [[http://secunia.com/search/?search=pam-keyring|Secunia history]].
Line 16: Line 16:
  * No [http://bugs.debian.org/src:pam-keyring Debian bugs]
  * [http://packages.qa.debian.org/p/pam-keyring.html Maintenance in Debian]: How to describe myself :) , not a DD
  * Active [http://www.hekanetworks.com/pam_keyring/ Upstream]: little bit overworked ATM
  * No [http:// Upstream bug tracker] found
  * No [[http://bugs.debian.org/src:pam-keyring|Debian bugs]]
  * [[http://packages.qa.debian.org/p/pam-keyring.html|Maintenance in Debian]]: How to describe myself :) , not a DD
  * Active [[http://www.hekanetworks.com/pam_keyring/|Upstream]]: little bit overworked ATM
  * No [[http://|Upstream bug tracker]] found
Line 22: Line 22:
  * Meets [http://www.pathname.com/fhs/ FHS], [http://www.de.debian.org/doc/debian-policy/ Debian Policy]
  * Meets [http://www.netfort.gr.jp/~dancer/column/libpkg-guide/libpkg-guide.html Debian library packaging guide] standards
  * Meets [[http://www.pathname.com/fhs/|FHS]], [[http://www.de.debian.org/doc/debian-policy/|Debian Policy]]
  * Meets [[http://www.netfort.gr.jp/~dancer/column/libpkg-guide/libpkg-guide.html|Debian library packaging guide]] standards

Main Inclusion Report for pam-keyring

Requirements

  1. Availability: http://archive.ubuntu.com/ubuntu/pool/universe/p/pam-keyring/ ; available for all supported architectures

  2. Rationale:

    • Ease the life of the user at loggin by avoiding him to entering his password several times for applications using gnome-keyring
    • Direct connection to protected wifi using network-manager at loggin
  3. Security:

  4. Quality assurance:

  5. Standards compliance:

  6. Dependencies:

    • All in Main

Reviewers

MainInclusionReportPamKeyring (last edited 2008-08-06 16:36:03 by localhost)