[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#725753: marked as done (ITP: krb5-strength -- Password strength checking for Kerberos KDCs)



Your message dated Sun, 27 Oct 2013 06:00:09 +0000
with message-id <E1VaJOT-0001u0-OD@franck.debian.org>
and subject line Bug#725753: fixed in krb5-strength 2.0-1
has caused the Debian Bug report #725753,
regarding ITP: krb5-strength -- Password strength checking for Kerberos KDCs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
725753: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725753
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Russ Allbery <rra@debian.org>

* Package name    : krb5-strength
  Version         : 2.0
  Upstream Author : Russ Allbery <rra@stanford.edu>
* URL             : http://www.eyrie.org/~eagle/software/krb5-strength/
* License         : Expat
  Programming Lang: C, Perl
  Description     : Password strength checking for Kerberos KDCs

krb5-strength provides a password quality plugin for the MIT Kerberos KDC
(specifically the kadmind server) and an external password quality
program for use with the Heimdal kpasswdd server.  Passwords can be
tested with CrackLib, checked against a CDB database of known weak
passwords, checked for length, checked for non-printable or non-ASCII
characters that may be difficult to enter reproducibly, required to
contain a non-alphabetic character, or any combination of these tests.

No dictionary is shipped with this package.  A CrackLib dictionary can be
created with the tools in cracklib-runtime, a CDB database can be created
from a password list (obtained separately) using the tools included in
this package, or both.

--- End Message ---
--- Begin Message ---
Source: krb5-strength
Source-Version: 2.0-1

We believe that the bug you reported is fixed in the latest version of
krb5-strength, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 725753@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Russ Allbery <rra@debian.org> (supplier of updated krb5-strength package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 07 Oct 2013 18:56:49 -0700
Source: krb5-strength
Binary: krb5-strength
Architecture: source i386
Version: 2.0-1
Distribution: unstable
Urgency: low
Maintainer: Russ Allbery <rra@debian.org>
Changed-By: Russ Allbery <rra@debian.org>
Description: 
 krb5-strength - Password strength checking for Kerberos KDCs
Closes: 725753
Changes: 
 krb5-strength (2.0-1) unstable; urgency=low
 .
   * Initial upload to Debian.  (Closes: #725753)
   * New upstream release.
     - Add native support for the MIT Kerberos password quality plugin
       interface included in MIT Kerberos 1.9 and later.
     - Stop building the Heimdal plugin.  Heimdal prefers using an external
       check program anyway.
     - Add support for TinyCDB dictionaries with a simpler dictionary
       lookup algorithm.  This allows use of this package to check
       passwords against a large, fast dictionary with a minimum of
       permutations as an alternative or supplement to the extensive
       permutations tested by CrackLib.
     - Minimum password length can now be enforced directly through
       configuration of this module without relying on CrackLib.
     - New boolean settings require_ascii_printable and require_non_letter
       to reject passwords with non-ASCII or non-printable characters and
       to require passwords contain at least one non-letter (and
       non-space).
     - The plugin and external checking program will now run without a
       dictionary configured so that they can be used only to check length
       and the lighter character restrictions if so desired.
     - When checking for passwords based on the principal, also check each
       component of the principal to find passwords based on the realm.
   * Eliminate the heimdal-strength package.  krb5-strength now builds a
     single binary package of the same name including the MIT plugin and
     the Heimdal external password quality program.  The Heimdal plugin is
     not built by the Debian packaging because Heimdal prefers external
     programs.  The plugin can be added later as a separate package if
     there is demand.
   * Revise the package long description for the merger of krb5-strength
     and heimdal-strength and the new capabilities in 2.0.
   * Recommend cracklib-runtime and tinycdb since they are required to
     build dictionaries.  Downgrade krb5-admin-server to Enhances and add
     heimdal-kdc.
   * Update debhelper compatibility level to V9.
     - Enable hardening flags, including bindnow and PIE.
     - Enable parallel builds.
   * Use dh-autoreconf to rebuild the build system during package builds.
   * Use xz compression for the upstream and Debian tarballs.
   * Add branch information to the Vcs-Git metadata.
   * Update standards version to 3.9.4 (no changes required).
   * Rewrite debian/copyright in copyright-format 1.0.
   * Remove README.Debian.  All of that information is now available in the
     installed upstream README file.
   * Remove Bugs header now that this package is in Debian proper.
Checksums-Sha1: 
 3c2fea19b122d7bf06bc0cd67f26da9b787b3cb6 1783 krb5-strength_2.0-1.dsc
 a3bc55f68bb88b117f2d673d69f095d963b9453f 323780 krb5-strength_2.0.orig.tar.xz
 a91374bedbeea4bd8c4d131fbfd4b8f055de4e86 5964 krb5-strength_2.0-1.debian.tar.xz
 8f6aa736f8f87bd94f16568dd7250b513d26faf1 35574 krb5-strength_2.0-1_i386.deb
Checksums-Sha256: 
 39a394f4e6933119bd08e1e63b2bd2076d9ad61f066541ff1eb13d086c299bc2 1783 krb5-strength_2.0-1.dsc
 d6286352212841c10b632e73ba24d26a6b4528aed95b29773666536a1eedf7c2 323780 krb5-strength_2.0.orig.tar.xz
 1a2632bd74b7dce292a49ebfcf0e664bd2e7eb6080c401e8361dbf39b08c1403 5964 krb5-strength_2.0-1.debian.tar.xz
 4a5e1e33f46ba093d2171c233b801cccb16e23f3d9168866594c54f1a766280b 35574 krb5-strength_2.0-1_i386.deb
Files: 
 7707e9e6111b4767456a6bf70506fafd 1783 net extra krb5-strength_2.0-1.dsc
 52e48e2dc192ca4c303e37d28ec132f4 323780 net extra krb5-strength_2.0.orig.tar.xz
 cfe1bd8074d9cc2cf02aebcd93420f56 5964 net extra krb5-strength_2.0-1.debian.tar.xz
 1cceac7848ed12558dfc3da203e0712f 35574 net extra krb5-strength_2.0-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBCAAGBQJSU5Y1AAoJEH2AMVxXNt51uHcH/Ax0Ka/c+XSIpUBywXFj9Egh
6NILKKUdy2sM3/A+v1WRF91T/RghTyKTSopVIMFo7r1tHTK8rinKYNr79KlZLPUE
n3RQtPbly1iF1LeVnnOqfWqF6Xhfsn4nSB8GIfARUIjFkP+4bCEbfTwBJqLbhOLL
Sw93ZWQvnaeIsU9IIBegqDcIFHMj4XJHsESnlI6ej4PcvWcNkGWJan7FBZWIbP+k
nlDT4mE/JCp97UOEE2wIdx/aoPGAplw1TYYzQtz5s+WDCJwhzWv4dvfRHcxlZtCS
b79rWzkvrAYItcZdwjR95sJ7Q0sw69n3KqYMQwzEmgvrG+Pgf5rED9vOke2UFxI=
=/lf8
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: