Bug#162689: marked as done (ITP: fragroute - Test a NIDS by attempting to evade using fragmented packets)
Your message dated Mon, 30 Sep 2002 14:18:52 -0400
with message-id <E17w588-00027t-00@auric.debian.org>
and subject line Bug#162689: fixed in fragroute 1.2-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 28 Sep 2002 17:20:15 +0000
>From sfllaw@engmail.uwaterloo.ca Sat Sep 28 12:20:14 2002
Return-path: <sfllaw@engmail.uwaterloo.ca>
Received: from engmail.uwaterloo.ca [129.97.50.62]
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 17vLGI-0000Rr-00; Sat, 28 Sep 2002 12:20:14 -0500
Received: (from sfllaw@localhost)
by engmail.uwaterloo.ca (8.11.6/8.11.6) id g8SHKDU15402
for submit@bugs.debian.org; Sat, 28 Sep 2002 13:20:13 -0400 (EDT)
Date: Sat, 28 Sep 2002 13:20:13 -0400
From: Simon Law <sfllaw@engmail.uwaterloo.ca>
To: submit@bugs.debian.org
Subject: ITP: fragroute - Test a NIDS by attempting to evade using fragmented packets
Message-ID: <[🔎] 20020928172013.GE12503@engmail.uwaterloo.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4i
X-No-CC: If you CC me on this list, I will feed you to Branden Robinson.
Delivered-To: submit@bugs.debian.org
Package: wnpp
Version: N/A; reported 2002-09-28
Severity: wishlist
* Package name : fragroute
Version : 1.2
Upstream Author : Dug Song <dugsong@monkey.org>
* URL : http://www.monkey.org/~dugsong/fragroute/
* License : 3-clause BSD
Description : Test a NIDS by attempting to evade using fragmented packets
fragroute intercepts, modifies, and rewrites egress traffic destined
for a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.
.
It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.
.
This tool was written in good faith to aid in the testing of network
intrusion detection systems, firewalls, and basic TCP/IP stack
behaviour. Please do not abuse this software.
---------------------------------------
Received: (at 162689-close) by bugs.debian.org; 30 Sep 2002 18:23:15 +0000
>From rmurray@auric.debian.org Mon Sep 30 13:23:15 2002
Return-path: <rmurray@auric.debian.org>
Received: from auric.debian.org [206.246.226.45] (mail)
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 17w5CM-0003gr-00; Mon, 30 Sep 2002 13:23:14 -0500
Received: from rmurray by auric.debian.org with local (Exim 3.35 1 (Debian))
id 17w588-00027t-00; Mon, 30 Sep 2002 14:18:52 -0400
From: Simon Law <sfllaw@debian.org>
To: 162689-close@bugs.debian.org
X-Katie: $Revision: 1.17 $
Subject: Bug#162689: fixed in fragroute 1.2-1
Message-Id: <E17w588-00027t-00@auric.debian.org>
Sender: Ryan Murray <rmurray@auric.debian.org>
Date: Mon, 30 Sep 2002 14:18:52 -0400
Delivered-To: 162689-close@bugs.debian.org
We believe that the bug you reported is fixed in the latest version of
fragroute, which is due to be installed in the Debian FTP archive:
fragroute_1.2-1.diff.gz
to pool/main/f/fragroute/fragroute_1.2-1.diff.gz
fragroute_1.2-1.dsc
to pool/main/f/fragroute/fragroute_1.2-1.dsc
fragroute_1.2-1_i386.deb
to pool/main/f/fragroute/fragroute_1.2-1_i386.deb
fragroute_1.2.orig.tar.gz
to pool/main/f/fragroute/fragroute_1.2.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 162689@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Simon Law <sfllaw@debian.org> (supplier of updated fragroute package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sat, 28 Sep 2002 13:27:13 -0400
Source: fragroute
Binary: fragroute
Architecture: source i386
Version: 1.2-1
Distribution: unstable
Urgency: low
Maintainer: Simon Law <sfllaw@debian.org>
Changed-By: Simon Law <sfllaw@debian.org>
Description:
fragroute - Test a NIDS by attempting to evade using fragmented packets
Closes: 162689
Changes:
fragroute (1.2-1) unstable; urgency=low
.
* Initial Release. (Closes: Bug#162689)
* Use libdumbnet instead of libdnet.
* Make autoconf work better at detecting libraries.
Files:
4d1ce1c8a43ee1fa972a5ac5fc8c90b7 559 net optional fragroute_1.2-1.dsc
7e4de763fae35a50e871bdcd1ac8e23a 85247 net optional fragroute_1.2.orig.tar.gz
b7bfa74504f91403ed7df9374e328857 36656 net optional fragroute_1.2-1.diff.gz
c776816ea50790e07930a1d7eb8a7d0f 35282 net optional fragroute_1.2-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.0 (GNU/Linux)
iD8DBQE9lfsnLiz2e3eWpgsRAgjbAJ902ZFDOuoC4WxpEkQgGfJ9LktstgCgz/Z+
tvRC2a2L6r2Kteh7o/p92IY=
=OXY0
-----END PGP SIGNATURE-----
Reply to: