Your message dated Tue, 15 Oct 2002 10:59:14 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#82613: fixed in crack 5.0a-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 17 Jan 2001 09:35:42 +0000 >From [EMAIL PROTECTED] Wed Jan 17 03:35:41 2001 Return-path: <[EMAIL PROTECTED]> Received: from hekate.coven.vmh.net [195.117.182.26] (qmailr) by master.debian.org with smtp (Exim 3.12 1 (Debian)) id 14Ip0H-0000x8-00; Wed, 17 Jan 2001 03:35:41 -0600 Received: (qmail 10823 invoked by uid 1000); 17 Jan 2001 09:35:21 -0000 Date: 17 Jan 2001 09:35:21 -0000 Message-ID: <[EMAIL PROTECTED]> From: Pawel Wiecek <[EMAIL PROTECTED]> Subject: wnpp: ITP: crack -- password security checker (cracker) To: [EMAIL PROTECTED] X-Mailer: bug 3.3.7 Delivered-To: [EMAIL PROTECTED] Package: wnpp Version: N/A Severity: wishlist I'd like to package CRACK, the well know password security checker. It has a nice licence, derived from Artistic and is no doubt a useful tool for an administrator. It can be found at: ftp://ftp.cerias.purdue.edu/pub/tools/unix/pwdutils/crack ftp://ftp.cert.dfn.de/pub/tools/password/Crack/ --------------------------------------- Received: (at 82613-close) by bugs.debian.org; 15 Oct 2002 15:09:47 +0000 >From [EMAIL PROTECTED] Tue Oct 15 10:09:47 2002 Return-path: <[EMAIL PROTECTED]> Received: from auric.debian.org [206.246.226.45] (mail) by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 181TKM-0003p5-00; Tue, 15 Oct 2002 10:09:47 -0500 Received: from troup by auric.debian.org with local (Exim 3.35 1 (Debian)) id 181TAA-0002QN-00; Tue, 15 Oct 2002 10:59:14 -0400 From: Pawel Wiecek <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.17 $ Subject: Bug#82613: fixed in crack 5.0a-1 Message-Id: <[EMAIL PROTECTED]> Sender: James Troup <[EMAIL PROTECTED]> Date: Tue, 15 Oct 2002 10:59:14 -0400 Delivered-To: [EMAIL PROTECTED] We believe that the bug you reported is fixed in the latest version of crack, which is due to be installed in the Debian FTP archive: crack-common_5.0a-1_all.deb to pool/main/c/crack/crack-common_5.0a-1_all.deb crack-md5_5.0a-1_i386.deb to pool/main/c/crack/crack-md5_5.0a-1_i386.deb crack_5.0a-1.diff.gz to pool/main/c/crack/crack_5.0a-1.diff.gz crack_5.0a-1.dsc to pool/main/c/crack/crack_5.0a-1.dsc crack_5.0a-1_i386.deb to pool/main/c/crack/crack_5.0a-1_i386.deb crack_5.0a.orig.tar.gz to pool/main/c/crack/crack_5.0a.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Pawel Wiecek <[EMAIL PROTECTED]> (supplier of updated crack package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 13 Oct 2002 21:38:05 +0200 Source: crack Binary: crack-md5 crack crack-common Architecture: source all i386 Version: 5.0a-1 Distribution: unstable Urgency: low Maintainer: Pawel Wiecek <[EMAIL PROTECTED]> Changed-By: Pawel Wiecek <[EMAIL PROTECTED]> Description: crack - Password guessing program crack-common - Password guessing program crack-md5 - Password guessing program Closes: 82613 Changes: crack (5.0a-1) unstable; urgency=low . * Initial Release with GREAT help of Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>, who actually made most of dirty work (Closes: #82613) * There are currently a lot of lintian errors but these are *not* the packages fault. The package uses a special header for dictionary files (#!xdawg) which gets confused for an interpreter definition. DAWG wordlist files format is specified in the FAQ (jfs) * DAWG wordlist are generated *after* installation, on the first run (in order to prevent this package from increasing in size) (jfs) * Since sources need to be hacked (as described in the docs) to provide MD5 or crypt (DES) functionality there are two conflicting packages created (jfs) * Created a simple wrapper script that merges passwd database for clueless people (jfs) * Created a new script based on Crack only for compilation (Crack.make) and removed the compilation stuff from Crack since packages will not include the sources (jfs) * Applied recommended patch (see FAQ) for libc problems when compiling Crack (jfs) * Since debian takes care of distributing the proper binaries in packages for the given architectures, the script/binstamp has been modified to always return 'debian' if running on a Debian system (jfs) * GHS compatibility -- the program configuration uses /usr/share/dict (instead of /usr/dict) (jfs) * The package Recommends: wordlist (jfs) * Fixed a couple of spelling errors and other minor stuff like that (cov) * Fixed debian/rules so the package actually builds from source (cov) * Bumped standards-version to 3.5.6 (cov) * Fixed many lintian errors and warnings, including some quite important policy violations (cov) Files: dc8e775bad1244fc2300af109796cba3 575 admin optional crack_5.0a-1.dsc 528935ca4640c2f4514c200890a58aed 2964828 admin optional crack_5.0a.orig.tar.gz 0aa1880182dcb89eb60c21b3d74dc893 19793 admin optional crack_5.0a-1.diff.gz e41ae23e4ae18916a18f5fb4987eea8c 2859940 admin optional crack-common_5.0a-1_all.deb 662807e48fac89d63e922a6e1fb06b0c 24724 admin optional crack_5.0a-1_i386.deb 520c4c22757d1e353e835a4d79c0a5bc 24204 admin optional crack-md5_5.0a-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.0 (GNU/Linux) iD8DBQE9qplEBOdjEO/Bh3ARAlUUAJ4kOuevjlqzKKnGqGfuYmmTS1IfCACfX7YT c7Rin5hWQRLt4QiRS/RYO/w= =vN+f -----END PGP SIGNATURE-----