[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#838848: marked as done (ITP: bruteforce-salted-openssl -- try to find the passphrase for files encrypted with OpenSSL)



Your message dated Mon, 26 Sep 2016 18:00:09 +0000
with message-id <E1boaCH-0000i6-N9@franck.debian.org>
and subject line Bug#838848: fixed in bruteforce-salted-openssl 1.3.2-1
has caused the Debian Bug report #838848,
regarding ITP: bruteforce-salted-openssl -- try to find the passphrase for files encrypted with OpenSSL
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
838848: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838848
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Joao Eriberto Mota Filho <eriberto@debian.org>

* Package name    : bruteforce-salted-openssl
  Version         : 1.3.1
  Upstream Author : Guillaume LE VAILLANT
* URL             : https://github.com/glv2/bruteforce-salted-openssl
* License         : GPL-3 with OpenSSL exception
  Programming Lang: C
  Description     : try to find the passphrase for files encrypted with OpenSSL

 bruteforce-salted-openssl try to find the passphrase or password of a file
 that was encrypted with the openssl command. It can be used in two ways:
 .
    - Try all possible passwords given a charset.
    - Try all passwords in a file (dictionary).
 .
 bruteforce-salted-openssl have the following features:
 .
    - You can specify the number of threads to use when cracking a file.
    - The program should be able to use all the digests and symmetric ciphers
      available with the OpenSSL libraries installed on your system.
    - Sending a USR1 signal to a running bruteforce-salted-openssl process
      makes it print progress and continue.
    - There are an exhaustive mode and a dictionary mode.
 .
 In the exhaustive mode the program tries to decrypt the file by trying all
 possible passwords. It is especially useful if you know something about the
 password (i.e. you forgot a part of your password but still remember most of
 it). Finding the password of the file without knowing anything about it would
 take way too much time (unless the password is really short and/or weak).
 There are some command line options to specify:
 .
    - The minimum password length to try.
    - The maximum password length to try.
    - The beginning of the password.
    - The end of the password.
    - The character set to use (among the characters of the current locale).
 .
 In dictionary mode the program tries to decrypt the file by trying all the
 passwords contained in a file. The file must have one password per line.
 .
 This package is useful for security tests and forensics investigations.

--- End Message ---
--- Begin Message ---
Source: bruteforce-salted-openssl
Source-Version: 1.3.2-1

We believe that the bug you reported is fixed in the latest version of
bruteforce-salted-openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 838848@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <eriberto@debian.org> (supplier of updated bruteforce-salted-openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 26 Sep 2016 10:10:02 -0300
Source: bruteforce-salted-openssl
Binary: bruteforce-salted-openssl
Architecture: source amd64
Version: 1.3.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Forensics <forensics-devel@lists.alioth.debian.org>
Changed-By: Joao Eriberto Mota Filho <eriberto@debian.org>
Description:
 bruteforce-salted-openssl - try to find the passphrase for files encrypted with OpenSSL
Closes: 838848
Changes:
 bruteforce-salted-openssl (1.3.2-1) unstable; urgency=medium
 .
   * Initial release (Closes: #838848)
Checksums-Sha1:
 b1519b152e6feb1202956b66328e6ee7c1e23b8f 2116 bruteforce-salted-openssl_1.3.2-1.dsc
 e9a0684dffda7bf6c7657f49683edbb974b7351f 30434 bruteforce-salted-openssl_1.3.2.orig.tar.gz
 96e9569ce078335a3ab437642c1f39c83b371b21 4544 bruteforce-salted-openssl_1.3.2-1.debian.tar.xz
 726c9beea8d1d185b4a337ede73475199ff260e8 18922 bruteforce-salted-openssl-dbgsym_1.3.2-1_amd64.deb
 806dbf2fd76fc2eb6ac656c375931b171072c121 17338 bruteforce-salted-openssl_1.3.2-1_amd64.deb
Checksums-Sha256:
 6408e1704a42b0ab9f122f8bcd1ce23affedeab0ad08891a3088ae110550d20b 2116 bruteforce-salted-openssl_1.3.2-1.dsc
 4c6c9fddce5382f6a86cd82e2e110551d6b7656a4984995a109cbf2ca0d24166 30434 bruteforce-salted-openssl_1.3.2.orig.tar.gz
 74ae057f29309886dc278280e68c65b4a13664ccde00dc1266de6aba70beb85b 4544 bruteforce-salted-openssl_1.3.2-1.debian.tar.xz
 bd99bec28114082f2f99e28e6bf01afc392e01c970f7cb654165ff3c07a83a78 18922 bruteforce-salted-openssl-dbgsym_1.3.2-1_amd64.deb
 099635ecc4648f43b90236de446c66ffba3a3c44cccba0233c4a168ec7cd92c1 17338 bruteforce-salted-openssl_1.3.2-1_amd64.deb
Files:
 44d48a1846fd88e8cf22e8de647e0b2b 2116 utils optional bruteforce-salted-openssl_1.3.2-1.dsc
 20d1697cd38fbd2bf368a088da677620 30434 utils optional bruteforce-salted-openssl_1.3.2.orig.tar.gz
 ccc8f165b55d5a5bfabec0a69f1c8c04 4544 utils optional bruteforce-salted-openssl_1.3.2-1.debian.tar.xz
 2dfe7cde8a3dd2d1c240d90640903024 18922 debug extra bruteforce-salted-openssl-dbgsym_1.3.2-1_amd64.deb
 2115238f398bfba01c2133bf97d47ecf 17338 utils optional bruteforce-salted-openssl_1.3.2-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=Yxxt
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: