[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#427848: marked as done (RFP: libapache2-authenntlm-perl -- Perform Microsoft NTLM and Basic User Authentication)



Your message dated Tue, 10 Jul 2007 22:36:12 +0200
with message-id <4693EDBC.9020401@scunc.net>
and subject line FWD: libapache2-authenntlm-perl_0.02-3_i386.changes ACCEPTED
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


Package: wnpp
Severity: wishlist


* Package name    : libapache2-authenntlm-perl
  Version         : 0.02
  Upstream Author : Shannon Eric Peevey <speeves@unt.edu>
* URL             : http://search.cpan.org/~speeves
* License         : GPL / Artistic
  Programming Lang: Perl
  Description     : Perform Microsoft NTLM and Basic User Authentication

The purpose of this module is to perform a user authentication via
Microsoft's NTLM protocol. This protocol is supported by all versions of
the Internet Explorer and is mainly useful for intranets. Depending on
your preferences setting IE will supply your windows logon credentials
to the web server when the server asks for NTLM authentication. This
saves the user to type in his/her password again.

The NTLM protocol performs a challenge/response to exchange a random
number (nonce) and get back a md4 hash, which is built from the user's
password and the nonce. This makes sure that no password goes over the
wire in plain text.

The main advantage of the Perl implementation is, that it can be easily
extended to verify the user/password against other sources than a
windows domain controller.

The defaultf implementation is to go to the domain controller for the
given domain and verify the user. If you want to verify the user against
another source, you can inherit from Apache2::AuthenNTLM and override
it's methods.


- -- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-4-vserver-686 (SMP w/1 CPU core)
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGZyZEjWcQfAgCZA8RCFgAAJ9KwbiCnzjOCw/zLygDD9SqhjdZaQCfdfBx
6FY9eWzUzfFB7B1PjYDzY64=
=AI4V
-----END PGP SIGNATURE-----


--- End Message ---
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


Accepted libapache2-authenntlm-perl 0.02-3 (source i386):
http://packages.qa.debian.org/liba/libapache2-authenntlm-perl/news/20070709T215222Z.html

This closes this bug.

Hendrik

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGk+25jWcQfAgCZA8RCOPzAKCQyDVT3Cmv4RHWfIaFm2NHSLNcQgCfY5vV
Byj/bHHLEn7Hi6HOJBnw25U=
=BXMO
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: