[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#856425: marked as done (ITP: scap-security-guide -- security guides and conformity checks using SCAP standard​)



Your message dated Thu, 23 Mar 2017 08:00:12 +0000
with message-id <E1cqxfI-00040p-Vw@fasolo.debian.org>
and subject line Bug#856425: fixed in scap-security-guide 0.1.31-1
has caused the Debian Bug report #856425,
regarding ITP: scap-security-guide -- security guides and conformity checks using SCAP standard​
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
856425: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856425
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Philippe Thierry <phil@reseau-libre.net>

* Package name    : scap-security-guide
  Version         : 0.1.31-10
  Upstream Author : Watson Yuuma Sato <wsato@redhat.com>
* URL             : https://www.open-scap.org/security-policies/scap-security-
guide/
* License         : Unlicenced
  Programming Lang: Python, XML, XSLT
  Section         : admin
  Description     : security guides and conformity checks using SCAP
standard​

SCAP-security-guide works with the OpenSCAP tool, which is already
packaged in Debian.

It builds those binary packages:

 ssg-applications - SCAP Guides and benchmarks targeting applications such as
 ssg-base   - SCAP Security guide base content and documentation
 ssg-debfamilly - SCAP Guides and benchmarks targeting all deb-based
 ssg-debian - SCAP Guides and benchmarks targeting Debian 8
 ssg-otheros - SCAP Guides and benchmarks targeting other GNU/Linux

To access further information about this package, please visit the following
URL:

  https://mentors.debian.net/package/scap-security-guide

Alternatively, one can download the package with dget using this command:

  dget -x https://mentors.debian.net/debian/pool/main/s/scap-security-guide
/scap-security-guide_0.1.31-9.dsc

The goal of this package is to deploy SCAP XCCDF Benchmarks and Guides
for various targets not deployed by the OpenSCAP core package, but
supported by the SCAP-security-guide community in which I work as
contributor for Ubuntu, Debian and ANSSI best practices.

Using these guides/benchmarks, it is possible to validate conformity of
Debian-based deployment against standard security policies such as ANSSI
Best-practices, PCI-DSS, NIST SP-800... and to launch remediation
scripts when needed. Using the OpenSCAP ecosystem, it is possible to
manage the security policy of a complete infrastructure, when launching
OpenSCAP tool with the above benchmarks through ssh (for e.g.) or on VM
or docker templates.

--- End Message ---
--- Begin Message ---
Source: scap-security-guide
Source-Version: 0.1.31-1

We believe that the bug you reported is fixed in the latest version of
scap-security-guide, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 856425@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philippe Thierry <phil@reseau-libre.net> (supplier of updated scap-security-guide package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 01 Mar 2017 18:25:10 +0100
Source: scap-security-guide
Binary: ssg-base ssg-debian ssg-debderived ssg-applications ssg-nondebian
Architecture: source all
Version: 0.1.31-1
Distribution: unstable
Urgency: medium
Maintainer: Philippe Thierry <phil@reseau-libre.net>
Changed-By: Philippe Thierry <phil@reseau-libre.net>
Description:
 ssg-applications - SCAP Guides and benchmarks targeting userspace applications
 ssg-base   - SCAP Security guide base content and documentation
 ssg-debderived - SCAP Guides and benchmarks targeting Debian-based OS
 ssg-debian - SCAP Guides and benchmarks targeting Debian 8
 ssg-nondebian - SCAP Guides and benchmarks targeting other GNU/Linux OS
Closes: 856425
Changes:
 scap-security-guide (0.1.31-1) unstable; urgency=medium
 .
   * Initial Release (Closes: #856425).
   * Add support for upstream changelog
     integrated manually before build, from github ReleaseNote
     support for getting upstream version from debian changelog
   * Add dep5 conform quilt patches headers
   * Updated binary packages name to simplify the structure
   * Bin packages are family-based, debian-centric
   * Add SuSE 11 benchmarks and guides
   * Add proper copyright dep5 copyright file
   * Updated run-time dependencies
   * Set libopenscap8 as recommends, for security policy server cases
   * Cleaned all residual lintian warnings/infos
   * Updated man page to be compliant to lexgrog
   * Updated spelling mistakes and various syntax errors
   * Updated html files path (guide subdir added)
   * Declare guides as docs (for lintian conformity), add doc-base
   * Add RHEL guides and benchmarks
   * Add XCCDF benchmarks and guides for JRE and Webmin
   * Updated control file to use correct Standard-version
   * Add watch file for uscan
   * Upload sponsored by Petter Reinholdtsen.
Checksums-Sha1:
 c6d9843835646466b9734c12fc06a1b863eff4e1 2301 scap-security-guide_0.1.31-1.dsc
 94a9d3cdaa4e725056b967076d660f5049ad5894 5216276 scap-security-guide_0.1.31.orig.tar.gz
 5204bc0964cd617581bad0dc62a72a3a8383fca2 10972 scap-security-guide_0.1.31-1.debian.tar.xz
 16693e4f6f90f2bfb89662e7afa5d24429c62e0d 18624 ssg-base_0.1.31-1_all.deb
 f1793aeff78749f4aa238d18b857a3b556bfb30f 73826 ssg-debian_0.1.31-1_all.deb
 dc98434ac70776c4762323aec84751c8f6dfbf10 73544 ssg-debderived_0.1.31-1_all.deb
 e583735b22f79d7de35aac988bba50bdd695b9ee 64784 ssg-applications_0.1.31-1_all.deb
 59fca48062654ff50fd864d48e5f116cfa398788 2411926 ssg-nondebian_0.1.31-1_all.deb
Checksums-Sha256:
 eb339bba7326210cb8e01c223a042b08be25dc90a5805e275cfb7ff382ebb1c1 2301 scap-security-guide_0.1.31-1.dsc
 6cc501386c530e143a966f9bfef769ce0a518dea73e28e30e861a871262db285 5216276 scap-security-guide_0.1.31.orig.tar.gz
 8c2eb82c3b2da90054e4bd306c7663e481ae6cc9c3b1d9e9f62df348a5c92748 10972 scap-security-guide_0.1.31-1.debian.tar.xz
 08855396289426411f637e708bda10cf2f0753140b5fa575999ea617deaffc72 18624 ssg-base_0.1.31-1_all.deb
 be0ab81e387c69c4f31c4c223f504320f604852d3fe5e7d8ef95452567ced44c 73826 ssg-debian_0.1.31-1_all.deb
 8754502694a9fd59d9e1ab280769eb1656ded9d402a83857336e75076957a587 73544 ssg-debderived_0.1.31-1_all.deb
 273bcc7167e68f3abfa7465414f7a0980df1affbf9136c5c10e85374e3d3ca1c 64784 ssg-applications_0.1.31-1_all.deb
 7c49bf6b1b0d885eae6dc6ea3422cbb5f954fc520b46f9605c37419532cc32a4 2411926 ssg-nondebian_0.1.31-1_all.deb
Files:
 1bdead058df75e814fcc11e55777abcd 2301 admin optional scap-security-guide_0.1.31-1.dsc
 1ea5e17ba07abf82fabe5f91dc7abf14 5216276 admin optional scap-security-guide_0.1.31.orig.tar.gz
 1e1db3b913a916b5f2ec55f90d17ba4a 10972 admin optional scap-security-guide_0.1.31-1.debian.tar.xz
 c80ead7862f24dc6741c6d7b4999cddc 18624 admin optional ssg-base_0.1.31-1_all.deb
 063525998adefc4084fed9bc38db8e8a 73826 admin optional ssg-debian_0.1.31-1_all.deb
 cbf29a781beb259d75e28e3ab1674637 73544 admin optional ssg-debderived_0.1.31-1_all.deb
 eca98d8fceeebbc383efce3107b61213 64784 admin optional ssg-applications_0.1.31-1_all.deb
 e1b5f415c6356c85441cb99f55b2dd2a 2411926 admin optional ssg-nondebian_0.1.31-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJY0VayAAoJEIEoCqCHuvsOp2UP/1+q2xHKHr7h8mEVVaCRMbIr
8RW4oyBoOxflZAICp+HO2gKqSq67F/V/kNZpKSvnYImZ0f5vTaq7bZKutMoKyHzZ
cFrbXMHHsoOim3Z0zoNhHe9FnzLfvtCGod/H9Ofddtf9TtEB59GFgzbOsPDqLL4v
0iNP+4Su8ZIfhm4jb7PEYWl30OwsmVf++/gjtDPU9M1BoLegG7wUTYyGX9Sj+Fv7
9VOPUNQbGmezcivY1bZc25xG5Km3vAaJ+io2EPnuiLcu7zUFZaQq3axt+ek2gL4c
r//rpass3R65gRG8+YrVWaBadVq11BHtaMsldJ+RmbrXu461TUxe3Vw9yjorvQ3s
v8WNrgyRoxzIPcZtqTmIh21Wg5CnrGV5DYWBGylkI8pTerEONRTSKWW/DNVDkaSm
usHcuadNeyo8BKWL/ei+2sV+n43VNORuSaAfki/R9zXANmTTldJdAW0LJ6k+WPYl
16VFiKWsIL1xXM2wX0RaQQOI87pm1ozZVAc0yD8MO6DtDIYQAke45QS1G35olC9R
g8PpthNwQlqOMhQBkCbX9yRfFFExaPIeNCSF9KqLYwSP6jAoCBURP2zytNaYHzDq
j+2+UExxtoK/cZzxuUffdn6d6iZiC9O7cYH159IqKUf8BwElh/vC33gDn8EoiYYm
iLoVfEfhRVhmjiwEqCE5
=qOCl
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: