[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#116903: marked as done (ITP: Raccess -- Security Tool to audit remote systems)



Your message dated Sat, 27 Oct 2001 15:15:32 -0400
with message-id <E15xYvc-0002uC-00@auric.debian.org>
and subject line Bug#116903: fixed in raccess 0.4-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Darren Benham
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Oct 2001 10:58:01 +0000
>From seamus@debian.org Wed Oct 24 05:58:01 2001
Return-path: <seamus@debian.org>
Received: from torrente.es.tiscali.com [212.166.64.114] 
	by master.debian.org with esmtp (Exim 3.12 1 (Debian))
	id 15wLjV-0002cB-00; Wed, 24 Oct 2001 05:58:01 -0500
Received: from there (212.166.64.40) by torrente.es.tiscali.com (5.5.021)
        id 3BB9CE1A0002C8BA for submit@bugs.debian.org; Wed, 24 Oct 2001 12:57:43 +0200
Message-ID: <[🔎] 3BB9CE1A0002C8BA@torrente.es.tiscali.com> (added by postmaster@torrente.es.tiscali.com)
Content-Type: text/plain;
  charset="iso-8859-1"
From: Angel Ramos <seamus@debian.org>
Reply-To: seamus@debian.org
Organization: Debian GNU/Linux
To: submit@bugs.debian.org
Subject: ITP: Raccess -- Security Tool to audit remote systems
Date: Wed, 24 Oct 2001 12:54:33 +0200
X-Mailer: KMail [version 1.3.2]
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Delivered-To: submit@bugs.debian.org

Package: wnpp
Severity: wishlist

Remote Access Session is a security tool to analyze the integrity of
systems. The program tries to gain access to a system using the most
advanced tecniques of remote intrusion. It lets to work on normal mode
(fast) and hard mode (more intensive).

I am the author and it is actually under development and it just has a few 
features of the future final version:
 *Fast scanning capabilities.
 *Advanced scanning capabilities. This tool doesn't block againts
  firewall and it's fast.
 *Total service's banner info added: Includes web server detectio
  version and named version, and the classical too (ftp, pop ...)
 *Writes reports with info of the host analized to the hard disk.
 *Remote OS detect feature with QueSO.

It has a text interface and is very light and faster than other complex 
scanners as Nessus. With raccess you have a complete info of the remote 
security host in just 2 minutes.  It's perfect for a fast overview of the 
remote security of your hosts.
The final version will incorporate remote exploits and more exhaustive 
attacks in order to test more dept your network.


---------------------------------------
Received: (at 116903-close) by bugs.debian.org; 27 Oct 2001 19:30:11 +0000
>From troup@auric.debian.org Sat Oct 27 14:30:11 2001
Return-path: <troup@auric.debian.org>
Received: from auric.debian.org [206.246.226.45] (mail)
	by master.debian.org with esmtp (Exim 3.12 1 (Debian))
	id 15xZ9m-0004Uj-00; Sat, 27 Oct 2001 14:30:10 -0500
Received: from troup by auric.debian.org with local (Exim 3.12 1 (Debian))
	id 15xYvc-0002uC-00; Sat, 27 Oct 2001 15:15:32 -0400
From: Angel Ramos <seamus@debian.org>
To: 116903-close@bugs.debian.org
X-Katie: $Revision: 1.59 $
Subject: Bug#116903: fixed in raccess 0.4-1
Message-Id: <E15xYvc-0002uC-00@auric.debian.org>
Sender: James Troup <troup@auric.debian.org>
Date: Sat, 27 Oct 2001 15:15:32 -0400
Delivered-To: 116903-close@bugs.debian.org

We believe that the bug you reported is fixed in the latest version of
raccess, which has been installed in the Debian FTP archive:

raccess_0.4.orig.tar.gz
  to pool/main/r/raccess/raccess_0.4.orig.tar.gz
raccess_0.4-1_i386.deb
  to pool/main/r/raccess/raccess_0.4-1_i386.deb
raccess_0.4-1.diff.gz
  to pool/main/r/raccess/raccess_0.4-1.diff.gz
raccess_0.4-1.dsc
  to pool/main/r/raccess/raccess_0.4-1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 116903@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Angel Ramos <seamus@debian.org> (supplier of updated raccess package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 24 Oct 2001 11:51:45 +0200
Source: raccess
Binary: raccess
Architecture: source i386
Version: 0.4-1
Distribution: unstable
Urgency: low
Maintainer: Angel Ramos <seamus@debian.org>
Changed-By: Angel Ramos <seamus@debian.org>
Description: 
 raccess    - Security Tool to audit remote systems
Closes: 116903
Changes: 
 raccess (0.4-1) unstable; urgency=low
 .
   * Initial Release (Closes: #116903).
   * Some changes in the source to make it compatible with
     QueSO debian package.
Files: 
 d03d96e82164717ddbae9dde80190464 595 net optional raccess_0.4-1.dsc
 4fa35d8a05772bb770a071416e51a0be 79244 net optional raccess_0.4.orig.tar.gz
 6174bf397dea031965cbdceb9e519600 2775 net optional raccess_0.4-1.diff.gz
 783c7c172bc5ae9594da76a6134bbded 9180 net optional raccess_0.4-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE71rzGoSMQNVMgBdoRAptLAJ95+5HvZmOAlvXegPovgwYshCDfQQCdHiL0
SuOnj35DiQMHzPPt+uh9Xyk=
=wdlV
-----END PGP SIGNATURE-----



Reply to: