[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#282076: marked as done (O: pwgen -- Automatic Password generation)

Your message dated Wed, 15 Jun 2005 01:32:36 -0400
with message-id <E1DiQVw-0000U2-00@newraff.debian.org>
and subject line Bug#282076: fixed in pwgen 2.04-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

Received: (at submit) by bugs.debian.org; 19 Nov 2004 14:52:29 +0000
>From djpig@merkel.debian.org Fri Nov 19 06:52:29 2004
Return-path: <djpig@merkel.debian.org>
Received: from merkel.debian.org [] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CVA7h-0001KC-00; Fri, 19 Nov 2004 06:52:29 -0800
Received: from djpig by merkel.debian.org with local (Exim 3.35 1 (Debian))
	id 1CVA7f-0000Fj-00; Fri, 19 Nov 2004 07:52:27 -0700
To: Debian Bug Tracking System <submit@bugs.debian.org>
X-Debbugs-CC: Vincent Renardias <vincent@debian.org>
Subject: O: pwgen -- Automatic Password generation
Message-Id: <E1CVA7f-0000Fj-00@merkel.debian.org>
From: Frank Lichtenheld <djpig@merkel.debian.org>
Date: Fri, 19 Nov 2004 07:52:27 -0700
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25

Package: wnpp
Severity: normal

The current maintainer of pwgen, Vincent Renardias <vincent@debian.org>,
has orphaned this package.  If you want to be the new maintainer, please
take it -- see http://www.debian.org/devel/wnpp/index.html#howto-o for
detailed instructions how to adopt a package properly.

Some information about this package:

Package: pwgen
Binary: pwgen
Version: 2.03-1
Priority: optional
Section: admin
Maintainer: Vincent Renardias <vincent@debian.org>
Build-Depends: debmake
Architecture: any
Standards-Version: 3.2.1
Format: 1.0
Directory: pool/main/p/pwgen
Files: e8b0a866f5f6c8c02e55e2033d13a6f8 647 pwgen_2.03-1.dsc
 1a73657a0a10f3c3d00933036369e702 23367 pwgen_2.03.orig.tar.gz
 3fb15ad45294fca6c60c3f9a87b41bd8 4653 pwgen_2.03-1.diff.gz

Package: pwgen
Priority: optional
Section: admin
Installed-Size: 29
Maintainer: Vincent Renardias <vincent@debian.org>
Architecture: i386
Version: 2.03-1
Depends: libc6 (>= 2.3.1-1)
Filename: pool/main/p/pwgen/pwgen_2.03-1_i386.deb
Size: 9190
MD5sum: 25dea73d1f2649e01db7d9ec72bfcb29
Description: Automatic Password generation
 pwgen generates random, meaningless but pronounceable passwords.
 These passwords contain either only lowercase letters, or upper
 and lower case mixed, or digits thrown in.
 Uppercase letters and digits are placed in a way that eases
 remembering their position when memorizing only the word.

Received: (at 282076-close) by bugs.debian.org; 15 Jun 2005 05:39:21 +0000
>From katie@ftp-master.debian.org Tue Jun 14 22:39:21 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DiQcT-0003ke-00; Tue, 14 Jun 2005 22:39:21 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1DiQVw-0000U2-00; Wed, 15 Jun 2005 01:32:36 -0400
From: tytso@mit.edu (Theodore Y. Ts'o)
To: 282076-close@bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#282076: fixed in pwgen 2.04-1
Message-Id: <E1DiQVw-0000U2-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Wed, 15 Jun 2005 01:32:36 -0400
Delivered-To: 282076-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 5

Source: pwgen
Source-Version: 2.04-1

We believe that the bug you reported is fixed in the latest version of
pwgen, which is due to be installed in the Debian FTP archive:

  to pool/main/p/pwgen/pwgen_2.04-1.diff.gz
  to pool/main/p/pwgen/pwgen_2.04-1.dsc
  to pool/main/p/pwgen/pwgen_2.04-1_i386.deb
  to pool/main/p/pwgen/pwgen_2.04.orig.tar.gz

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 282076@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Theodore Y. Ts'o <tytso@mit.edu> (supplier of updated pwgen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)

Hash: SHA1

Format: 1.7
Date: Wed, 15 Jun 2005 00:39:10 -0400
Source: pwgen
Binary: pwgen
Architecture: source i386
Version: 2.04-1
Distribution: unstable
Urgency: low
Maintainer: Theodore Y. Ts'o <tytso@mit.edu>
Changed-By: Theodore Y. Ts'o <tytso@mit.edu>
 pwgen      - Automatic Password generation
Closes: 51307 154561 182595 276307 276976 282076 311461
 pwgen (2.04-1) unstable; urgency=low
   * New upstream version.
   * Adopt maintainership of pwgen.  (Closes: #282076)
   * Fix minor bug in man page.  (Closes: #311461)
   * Convert from debmake to debhelper
   * Add the --sha1 option so that pwgen uses the SHA1 hash to generate
     (not so) random passwords.
   * Add --symbols option which adds special symbols to the password.
     (Closes: #154561)
   * Add short options for --no-capitalize and --no-numerals and make those
     options work when --secure is specified.
   * Add --ambiguous option which avoids characters that can be confused by
     the user.  (Closes: #51307)
   * Fix bug where --no-capitalized and --no-numerals were ignored for short
     passwords.  (Closes: #276307)
   * In the pwgen man page, explain that human-memorable passwords are
     subject to off-line brute force attacks.  (Closes: #276976)
   * Allow one or more capital letters and digits in human-friendly
     passwords (Closes: #182595)
 f6a75e4e0f2169e187948e8f624a3877 544 admin optional pwgen_2.04-1.dsc
 c6116603f89a65d1b6ea4bdce00106fb 47276 admin optional pwgen_2.04.orig.tar.gz
 27337e7ac1433e6bbb7304cb292b333b 20 admin optional pwgen_2.04-1.diff.gz
 7807f22617f13270d79753ca8f01b136 16756 admin optional pwgen_2.04-1_i386.deb

Version: GnuPG v1.4.1 (GNU/Linux)


Reply to: