Your message dated Fri, 13 Jul 2012 21:32:50 +0000 with message-id <E1SpnTm-000532-Qu@franck.debian.org> and subject line Bug#572656: fixed in pam-shield 0.9.6-1 has caused the Debian Bug report #572656, regarding ITA: pam-shield -- locks out remote attackers trying to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 572656: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572656 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: O: pam-shield -- locks out remote attackers trying password guessing
- From: Jan Hauke Rahm <jhr@debian.org>
- Date: Fri, 5 Mar 2010 15:26:39 +0100
- Message-id: <20100305142636.GA14050@ca.home.jhr-online.de>
Package: wnpp Severity: normal The current maintainer of pam-shield, Mateusz Kaduk <mateusz@kaduk.net>, is not active anymore. Therefore, I orphan this package now. Maintaining a package requires time and skills. Please only adopt this package if you will have enough time and attention to work on it. If you want to be the new maintainer, please see http://www.debian.org/devel/wnpp/index.html#howto-o for detailed instructions how to adopt a package properly. Some information about this package: Package: pam-shield Binary: libpam-shield Version: 0.9.2-3.2 Priority: optional Section: admin Maintainer: Mateusz Kaduk <mateusz@kaduk.net> Build-Depends: debhelper (>= 5), libgdbm-dev, libpam0g-dev, quilt, autoconf, automake (>= 1.11), libtool Architecture: any Standards-Version: 3.8.3 Format: 1.0 Directory: pool/main/p/pam-shield Files: af74b304d28e62709a5ae9b75964a2fa 1103 pam-shield_0.9.2-3.2.dsc 169e279bc37dff0ab40cc46e340d3d79 24393 pam-shield_0.9.2.orig.tar.gz 03371d7aa1afd9b17756d287701a7d17 6780 pam-shield_0.9.2-3.2.diff.gz Homepage: http://www.ka.sara.nl/home/walter/pam_shield/ Checksums-Sha1: ef1e803599b66160d1c3fc55c260de5d22d6dbc0 24393 pam-shield_0.9.2.orig.tar.gz ef05ff7d0025ed3885b538211f9959865930443e 6780 pam-shield_0.9.2-3.2.diff.gz Checksums-Sha256: 30c4ca0a5263484a139e9de95092ebc4db9f26fa88f981dc1f9a578448551c4d 24393 pam-shield_0.9.2.orig.tar.gz 1e08e5e67ac5a255911fe96f90009071026b3a81564d539879a81622acae38e0 6780 pam-shield_0.9.2-3.2.diff.gz Package: libpam-shield Priority: optional Section: admin Installed-Size: 104 Maintainer: Mateusz Kaduk <mateusz@kaduk.net> Architecture: amd64 Source: pam-shield Version: 0.9.2-3.2 Depends: libc6 (>= 2.2.5), libgdbm3, libpam0g (>= 0.99.7.1) Suggests: iproute, iptables Filename: pool/main/p/pam-shield/libpam-shield_0.9.2-3.2_amd64.deb Size: 23528 MD5sum: 8b581df912a2d5498e2fd3af6abe1df1 SHA1: ac42c3a5d0b90b9d8641016983f9976aec9c1aa6 SHA256: 4163710a6f44a6870229ca382285006ecbdc5d2c9793ffffb31fcd500c16a86e Description: locks out remote attackers trying password guessing In certain situations it is not possible to use host based authentication and here pam-shield comes in use. . It locks out brute-force password crackers using null-route or iptables rules. Homepage: http://www.ka.sara.nl/home/walter/pam_shield/Attachment: signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
- To: 572656-close@bugs.debian.org
- Subject: Bug#572656: fixed in pam-shield 0.9.6-1
- From: Jonathan Niehof <jtniehof@gmail.com>
- Date: Fri, 13 Jul 2012 21:32:50 +0000
- Message-id: <E1SpnTm-000532-Qu@franck.debian.org>
Source: pam-shield Source-Version: 0.9.6-1 We believe that the bug you reported is fixed in the latest version of pam-shield, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 572656@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jonathan Niehof <jtniehof@gmail.com> (supplier of updated pam-shield package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 03 Jun 2012 13:08:23 -0600 Source: pam-shield Binary: libpam-shield Architecture: source amd64 Version: 0.9.6-1 Distribution: experimental Urgency: low Maintainer: Jonathan Niehof <jtniehof@gmail.com> Changed-By: Jonathan Niehof <jtniehof@gmail.com> Description: libpam-shield - locks out remote attackers trying password guessing Closes: 457642 488841 488847 563065 572656 579514 Changes: pam-shield (0.9.6-1) experimental; urgency=low . * New maintainer. (Closes: #572656). * Switch to dpkg-source 3.0 (quilt) format. * Bump Standards Version to 3.9.3.0. (No changes needed). * Update to debhelper 8. -dh_clean now handles *-stamp (7) -new dh_prep. (7) -no debhelper 8 specific changes * New homepage; updated watchfile. * Lintian fixups: -Add misc:Depends to control (debhelper-but-no-misc-depends) -Add override for INSTALL (package-contains-upstream-install-documentation) -Add DEP-3 headers to patches (quilt-patch-missing-description) * Rename cron job so run-parts will actually run it. * Support pam-auth-update. (Closes: #579514) * New upstream release: -Add manpage for shield.conf (Closes: #488847). -Ensure cron job does not return 0 (Closes: #563065). -Add --force option to shield-purge (Closes: #457642). -Wait for database if it isn't writable (Closes: #488841). -Modify shield-purge to work without arguments. -Fix a memory leak in shield-purge. -Fix shield-purge to traverse entire database. -Treat missing DNS parameters properly -Fix race condition (blocking same IP multiple times) -Continue on errors from read_config -Use IP blackhole routing to block -Optional ufw-based blocking Checksums-Sha1: 52a3880ec2683a13f5780a731bc16b7532811684 2497 pam-shield_0.9.6-1.dsc fcc7d0ed228293422e313fb7e433a239789365d3 317625 pam-shield_0.9.6.orig.tar.gz f37d75a95f05b0d894b11d57cf00fb9e975032a6 4966 pam-shield_0.9.6-1.debian.tar.gz 85451510bd527a989e6438fee6b7e98da812f81d 37978 libpam-shield_0.9.6-1_amd64.deb Checksums-Sha256: b7dc224d89e8b3b0c977ff1f12fe902b630fd607b82bd325720c18cba161f606 2497 pam-shield_0.9.6-1.dsc a2df966d9c748461fd66f571f780dbf1430ef95735bc2bc482a09d4bedc37b57 317625 pam-shield_0.9.6.orig.tar.gz 94b75c0bf35cff465e9a9c0f3846f25e092d7208963987e0744b0f74bdfbbb8e 4966 pam-shield_0.9.6-1.debian.tar.gz 351d44e1f7d2b072a3f556a0c122b3ff50926cb087490ae78c151cf3a597635b 37978 libpam-shield_0.9.6-1_amd64.deb Files: 04784d5150acdcffa11d8981a0ffb80e 2497 admin optional pam-shield_0.9.6-1.dsc bbc10819e391f2333a7fdf534c29bd07 317625 admin optional pam-shield_0.9.6.orig.tar.gz 8b80c57bbac4adaebff426f68f990fec 4966 admin optional pam-shield_0.9.6-1.debian.tar.gz 17bec98d1aa37207e98f6a1ee3c1a2f2 37978 admin optional libpam-shield_0.9.6-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQQcBAEBCAAGBQJQAJA/AAoJELjWss0C1vRzbhIf/2GbnN1TuzZvF2R5wPef3TRU L3B83QyuWVBpbMYFOwwdLQkuq8O6U3l5hE5jhGo9byKkYxtFpe7cvXr0WNt/OYMi zPVqurBtK7tROKqW6wDnGWvGenHDnOIbtXvVKnIBJNmyEt4Lt6fP9p4b1G6rYd76 qslpIndtOtmUc+Nko1ZWvN8Rue8zexHnNMVSEceyJQ/GbQlkIgig3tW+DuIhpH3Y u4HeARzXKy6kVSwIerml8zRhj2EPSHZV583MOWb23HYyjgEOKpfIkcjFVIBEOfS/ 5PgqYpVMgXCghrjGKz+vzLpqp8GISoNoov1kTtdGYWNhOFgDCE8a1/vBq14I5fZ+ HIKnZIvZt/i0GQMas73Crt5EUt3N1+AXBNP1zrnNyuXQnykSF/vY2mIpawFXs3Cf 8SVMmJCRWuRyzB+UGOpxFQz3Z65/Qez3e7QugrfQ+BBKZ4Gu11y7P+IDlYgvCixv 4KiSZ74gULfIABDCakLAQ7r9wJ8XUj6O/DvcCxtxGg0cGYW0YMkkp0gVahVNW4sJ ZvnJxFrDnNkGLeVP4De/1Rv2/SIHPaoOPKiCA9h/B8cwJbBhDkAv7hptqAbAfAuT Fl5V8CV5DuU6tzuQTJKUXAKf5oQaRBvfA4xNY/RGpHct96u2dfCymU1O4j9e22Ky NYuZm34pORqCutAeoCDgaOizM8piu4RPVUPq1cVjHJzhsB3Uzw2m4dZDgGCRJe4V LzQ7lk84D9DGg1k+8/arZIv4elD8aq/fXjracb0gt+aiyByl9P87qO+i+/sl52cl viraFJhJwVvuUhUo4U2B4hDJGlkyUuSG0oFR+QxBLK9CmbGo5BodiwK1KiElq7B6 WS4cw/AGH7FucLUlaU7HKtEGDWFTrLUWI+4bT2CsulrIsx9+r/vi7Xpr3cNN22p3 1+7oto8Evz/suxX7gvzzQMyFZzD3FA6BOyEYG0TafoU5g6reNRdsGVNMo+2rfXAz UEUvxgiHGDJ5XeoXw46cr48BF+EklmeLNmjo05QYoLijB0IniUoGhNrafGHTDWnl BWl/T5OzKCDE1zn/Sc5okiE5qDEQgiu26OFv+8xO3pnb6AKzC4hnr9wD0hr4HoRL XIHWWK/+nlYPgSfRlrUkxVNkYhGDPFnxIJCny0qfJ4pjEUMf4noHWm0JqXVMysd8 wCZu+PWwB4HyuA59fce+rJd+bkWRcfs7lORoLFVLsfz22OOlkwZ4dBf8Ec+YoCgE 84wRJDsN9Fw/0a+jYvgiWROYR7l8/pSwQixhoAVQPea55ajoQVDcIqELUv3zsVKK yW1fPfrE/wMAZYqgktZmOYxpKlZHfh4X4IK0GJyLY/VnEgntgGA6a6XWFv9/3H0= =q5DQ -----END PGP SIGNATURE-----
--- End Message ---