[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#653758: marked as done (ITP: reaver -- brute force attack tool against Wifi Protected Setup)



Your message dated Sun, 26 Feb 2012 15:18:34 +0000
with message-id <E1S1fru-0001uD-Tf@franck.debian.org>
and subject line Bug#653758: fixed in reaver 1.4-2
has caused the Debian Bug report #653758,
regarding ITP: reaver -- brute force attack tool against Wifi Protected Setup
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
653758: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=653758
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist

* Package name : reaver
Version : 1.2
Upstream Author : Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>
* URL : http://code.google.com/p/reaver-wps/
* License : GPL
Description : Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.



--- End Message ---
--- Begin Message ---
Source: reaver
Source-Version: 1.4-2

We believe that the bug you reported is fixed in the latest version of
reaver, which is due to be installed in the Debian FTP archive:

reaver_1.4-2.debian.tar.gz
  to main/r/reaver/reaver_1.4-2.debian.tar.gz
reaver_1.4-2.dsc
  to main/r/reaver/reaver_1.4-2.dsc
reaver_1.4-2_amd64.deb
  to main/r/reaver/reaver_1.4-2_amd64.deb
reaver_1.4.orig.tar.gz
  to main/r/reaver/reaver_1.4.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 653758@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bartosz Fenski <fenio@debian.org> (supplier of updated reaver package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 21 Feb 2012 18:36:48 +0100
Source: reaver
Binary: reaver
Architecture: source amd64
Version: 1.4-2
Distribution: unstable
Urgency: low
Maintainer: Bartosz Fenski <fenio@debian.org>
Changed-By: Bartosz Fenski <fenio@debian.org>
Description: 
 reaver     - brute force attack tool against Wifi Protected Setup PIN number
Closes: 653758
Changes: 
 reaver (1.4-2) unstable; urgency=low
 .
   * Added missed copyright notes.
 .
 reaver (1.4-1) unstable; urgency=low
 .
   * New upstream version.
   * Includes wash binary and some additional README files.
 .
 reaver (1.3-1) unstable; urgency=low
 .
   * Initial release (Closes: #653758)
Checksums-Sha1: 
 e7a068bbca623b8db9535a909f3d09a85ef1856c 1063 reaver_1.4-2.dsc
 2ebec75c3979daa7b576bc54adedc60eb0e27a21 766603 reaver_1.4.orig.tar.gz
 41b76dd3bbfdea509f7445a8cfc8f73e3161ed13 2837 reaver_1.4-2.debian.tar.gz
 8dd4f47414b32f8e6c86e00acff5c8d267669b1e 229356 reaver_1.4-2_amd64.deb
Checksums-Sha256: 
 d59fe4dda10d63cfe1ef7b1168f43644d23c2591e5d85a2b9b716e1cce931d2a 1063 reaver_1.4-2.dsc
 add3050a4a05fe0ab6bfb291ee2de8e9b8a85f1e64ced93ee27a75744954b22d 766603 reaver_1.4.orig.tar.gz
 02fc1b0b0468cb9a6aba916edd97801785344d579bb8f10e66c6f8ad02333aa3 2837 reaver_1.4-2.debian.tar.gz
 86ead75a751697fd988effb5e317a0671dd3c244e71942863363234fee9eb6e0 229356 reaver_1.4-2_amd64.deb
Files: 
 82e6f8a769468d3f8730bec311c4d989 1063 net extra reaver_1.4-2.dsc
 05441dda7bacfcbe1e831c85d1ea3bc9 766603 net extra reaver_1.4.orig.tar.gz
 6af5ce947fd3b255ac9fba1203b25082 2837 net extra reaver_1.4-2.debian.tar.gz
 90f8c3b38256ca5daf7f1adad6849adb 229356 net extra reaver_1.4-2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk9D3OcACgkQhQui3hP+/EAb9wCeMaxf9nWhTWYMBn3IEJHllGUU
fQgAoNEzWURuqmv1NLwUVgJHVOCi133Q
=6Oh5
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: