Bug#427848: marked as done (RFP: libapache2-authenntlm-perl -- Perform Microsoft NTLM and Basic User Authentication)
Your message dated Tue, 10 Jul 2007 22:36:12 +0200
with message-id <4693EDBC.9020401@scunc.net>
and subject line FWD: libapache2-authenntlm-perl_0.02-3_i386.changes ACCEPTED
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: libapache2-authenntlm-perl -- Perform Microsoft NTLM and Basic User Authentication
- From: Hendrik Frenzel <hfrenzel@scunc.net>
- Date: Wed, 06 Jun 2007 23:25:29 +0200
- Message-id: <46672649.2030500@scunc.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package: wnpp
Severity: wishlist
* Package name : libapache2-authenntlm-perl
Version : 0.02
Upstream Author : Shannon Eric Peevey <speeves@unt.edu>
* URL : http://search.cpan.org/~speeves
* License : GPL / Artistic
Programming Lang: Perl
Description : Perform Microsoft NTLM and Basic User Authentication
The purpose of this module is to perform a user authentication via
Microsoft's NTLM protocol. This protocol is supported by all versions of
the Internet Explorer and is mainly useful for intranets. Depending on
your preferences setting IE will supply your windows logon credentials
to the web server when the server asks for NTLM authentication. This
saves the user to type in his/her password again.
The NTLM protocol performs a challenge/response to exchange a random
number (nonce) and get back a md4 hash, which is built from the user's
password and the nonce. This makes sure that no password goes over the
wire in plain text.
The main advantage of the Perl implementation is, that it can be easily
extended to verify the user/password against other sources than a
windows domain controller.
The defaultf implementation is to go to the domain controller for the
given domain and verify the user. If you want to verify the user against
another source, you can inherit from Apache2::AuthenNTLM and override
it's methods.
- -- System Information:
Debian Release: lenny/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.18-4-vserver-686 (SMP w/1 CPU core)
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGZyZEjWcQfAgCZA8RCFgAAJ9KwbiCnzjOCw/zLygDD9SqhjdZaQCfdfBx
6FY9eWzUzfFB7B1PjYDzY64=
=AI4V
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Accepted libapache2-authenntlm-perl 0.02-3 (source i386):
http://packages.qa.debian.org/liba/libapache2-authenntlm-perl/news/20070709T215222Z.html
This closes this bug.
Hendrik
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGk+25jWcQfAgCZA8RCOPzAKCQyDVT3Cmv4RHWfIaFm2NHSLNcQgCfY5vV
Byj/bHHLEn7Hi6HOJBnw25U=
=BXMO
-----END PGP SIGNATURE-----
--- End Message ---
Reply to: