[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#750966: marked as done (ITP: pcredz -- Extract authentication information from a pcap file or from a live interface)



Your message dated Fri, 11 Jul 2014 16:00:09 +0000
with message-id <E1X5dF3-0002X3-3z@franck.debian.org>
and subject line Bug#750966: fixed in pcredz 0.9-1
has caused the Debian Bug report #750966,
regarding ITP: pcredz -- Extract authentication information from a pcap file or from a live interface
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
750966: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750966
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Gunnar Wolf <gwolf@gwolf.org>

* Package name    : pcredz
  Version         : 20140606
  Upstream Author : Laurent Gaffie <laurent.gaffie@gmail.com>
* URL             : http://github.com/lgandx/PCredz
* License         : GPLv3+
  Programming Lang: Python
  Description     : Extract authentication information from a pcap file or from a live interface

This package listens to a live network interface or reads from a pcap
file, and extracts different authentication information, including
POP, SMTP, IMAP, SNMP community string, FTP, HTTP Basic, NTLM v1/v2,
Kerberos and credit card numbers. 

--- End Message ---
--- Begin Message ---
Source: pcredz
Source-Version: 0.9-1

We believe that the bug you reported is fixed in the latest version of
pcredz, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 750966@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gunnar Wolf <gwolf@debian.org> (supplier of updated pcredz package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 09 Jul 2014 16:27:33 -0300
Source: pcredz
Binary: pcredz
Architecture: source all
Version: 0.9-1
Distribution: unstable
Urgency: low
Maintainer: Gunnar Wolf <gwolf@debian.org>
Changed-By: Gunnar Wolf <gwolf@debian.org>
Description:
 pcredz     - Extracts authentication credentials from network captures
Closes: 750966
Changes:
 pcredz (0.9-1) unstable; urgency=low
 .
   * Initial upload (Closes: #750966)
Checksums-Sha1:
 0a88d00ea134ff5f0b1fe38e511f866c024286f0 1766 pcredz_0.9-1.dsc
 07295b7bc84c2048c273b0c55ea1b4e58e46df69 6340 pcredz_0.9.orig.tar.gz
 a602834c955db67272d9fdfc3c0cd87b3b9acdeb 1890 pcredz_0.9-1.diff.gz
 31753108978f5dfe5f31085becb52f9dad52c49d 7930 pcredz_0.9-1_all.deb
Checksums-Sha256:
 48db498e8b74340b00ac756e9db62d33698910cd9a323ee3efafdba8e2a3a3a8 1766 pcredz_0.9-1.dsc
 4405dd7be4ed3002a041ff3749631986e21051910957011ddbf8a937c9a25bd9 6340 pcredz_0.9.orig.tar.gz
 22489520cd56a905ac696a02a6019b5c9375d61eba109b550a7fd064db5b6ac6 1890 pcredz_0.9-1.diff.gz
 d1af7450ce7da7373752a1f6abc1e8373a1ac19b18943afe8eb4ee3c18d47d50 7930 pcredz_0.9-1_all.deb
Files:
 4e6c1b8c47eda926e569b8d6618136da 7930 net extra pcredz_0.9-1_all.deb
 9d05671fd69acfdd0ab47b1b0c83b97a 1766 net extra pcredz_0.9-1.dsc
 2a7dff50403ade29982ba43640974c90 6340 net extra pcredz_0.9.orig.tar.gz
 a7d7785e0f495df0767a617a1be026f7 1890 net extra pcredz_0.9-1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJTvbeRAAoJEGc6A+TB25IfwHQP/01rKvoLac/wJije9CfQszDb
8xU63bBdjTHkrpSOWeDcKAd6YtwsquB5+4jIHsU2+aKlRGEkWIgWaWcW8ddpLeSp
IfbSu+sWQS/WU5lZnsIApqS47i93KYLao9J1HhbocK9m79UJzY8vi79sil0gH1OT
9dKao8crC3+NtLNC7dvk69tu4msvgEaJtCq1FiBiluUTaJJVpw2SB4ZikMb8JC79
/QubdFIPKVCbuFMKdSEWt2ycp8qLakcZq8Gs277W5A4G7oI4bGAIVAM6MeWfzC/t
S4t1B43i0KR2FN1TZLZUvcmBT1RiX1XaGMjxW2qtZfUWrS5cTn59+tCHY6Pr4axO
DccLfNx0g8uGYs0Wcg4jUrdOD6kehtgiIYnnx1NsOtbe1uxNSyzY8YGzFi3+mek2
cUQwzdi/eOsmG7VzC83QcRVDhpx7ojro1FBUVpmGuZT9OTdrFZGbADRZf0JWbMin
LwFySocCQ7rvO187jtwp/0rOSCFfdnzwEpaHke0/Mra16rTgEPcth9JPMREYMV0Y
rjIe639IXuN4GMwriQwDTS0mTPhuVVkCFY+3lY77LmXP+E/WuhGA/l9Q/DuqWqvR
BVK6s0mYCCrn0Oqts2VG8r4cUhtdGVKN3ucAU+R0Ig9VmEzPQT6vLb7vDUnr5ifl
pRLziW9tSUrruc78EbJI
=OP6b
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: