Donkey

From Free Software Directory
Jump to: navigation, search

Reviews: 0 ... further results.

[edit]

Donkey

https://devel.ringlet.net/security/donkey/
One Time Password calculator

Donkey is an alternative for S/KEY's "key" command. This means that donkey is also an alternative for "keyinit". Since the entry is printed to stdout (not to /etc/skeykeys), you can easily send it to remote operator by e-mail (with PGP signature or something). So, it is possible to initiate S/KEY without login from the console of the host.



Download




Categories





Licensing

License

Verified by

Verified on

Notes

Verified by

Debian

Verified on

20 March 2013

Notes

License: GPL-2

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License Version 2 as published by the Free Software Foundation.

On Debian systems, the complete text of the GNU General Public

License can be found in file "/usr/share/common-licenses/GPL-2".

Verified by

Debian

Verified on

20 March 2013

Notes

License: GPL-2+

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

On Debian systems, the complete text of the GNU General Public

License can be found in file "/usr/share/common-licenses/GPL-2".

License

Other

Verified by

Debian

Verified on

20 March 2013

Notes

License: other

other All rights reserved. . License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. . License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing the derived work. . RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. . These notices must be retained in any copies of any part of this

documentation and/or software.

License

Other

Verified by

Debian

Verified on

20 March 2013

Notes

License: other

other All rights reserved. . License to copy and use this software is granted for non-commercial Internet Privacy-Enhanced Mail provided that it is identified as the "RSA Data Security, Inc. MD2 Message Digest Algorithm" in all material mentioning or referencing this software or this function. . RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. . These notices must be retained in any copies of any part of this

documentation and/or software.

License

Other

Verified by

Debian

Verified on

20 March 2013

Notes

License: other

other All rights reserved. . License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. . License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. . RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. . These notices must be retained in any copies of any part of this

documentation and/or software.

License

Other

Verified by

Debian

Verified on

20 March 2013

Notes

License: other

other All rights reserved. . Redistribution and use in source and binary forms are permitted provided that: (1) source distributions retain this entire copyright notice and comment, and (2) distributions may not be sold for profit on physical media such as disks, tapes, and CD-ROMS, without expressed

written permission.




Leaders and contributors

Contact(s)Role
Kazuhiko Yamamoto contact


Resources and communication

AudienceResource typeURI
Downloadhttp://freebsd.unixfreunde.de/sources/
Debian (Ref)https://tracker.debian.org/pkg/donkey
Python (Ref)https://pypi.org/project/donkey
Ruby (Ref)https://rubygems.org/gems/donkey


Software prerequisites

This entry (in part or in whole) was last reviewed on 16 April 2018.



Entry




Property "Submitted by" (as page type) with input value "{{{Submitted by}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.




























"contact" is not in the list (Maintainer, Contributor, Developer, Sponsor, Unknown) of allowed values for the "Role" property.


"Python (Ref)" is not in the list (General, Help, Bug Tracking, Support, Developer) of allowed values for the "Resource audience" property.


"Ruby (Ref)" is not in the list (General, Help, Bug Tracking, Support, Developer) of allowed values for the "Resource audience" property.


"Debian (Ref)" is not in the list (General, Help, Bug Tracking, Support, Developer) of allowed values for the "Resource audience" property.








Date 2013-03-20
Source Debian import
Source link http://packages.debian.org/sid/donkey

[[Category:]]



Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.