Your message dated Fri, 21 Dec 2007 11:47:05 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#456814: fixed in pam-shield 0.9.2-3 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: libpam-shield Version: 0.9.2-2 Severity: minor Tags: patch The description field reads It locks out default by null-route or iptable rule attackers trying to login by brue-force methods. As a native English speaker, I find this structure a bit difficult to follow -- it sounds like the package locks out "iptable rule attackers" using null-route. Why would anyone attack an iptable rule? Instead I propose It locks out brute-force password crackers using null-route or iptables rules. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core) Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---Source: pam-shield Source-Version: 0.9.2-3 We believe that the bug you reported is fixed in the latest version of pam-shield, which is due to be installed in the Debian FTP archive: libpam-shield_0.9.2-3_i386.deb to pool/main/p/pam-shield/libpam-shield_0.9.2-3_i386.deb pam-shield_0.9.2-3.diff.gz to pool/main/p/pam-shield/pam-shield_0.9.2-3.diff.gz pam-shield_0.9.2-3.dsc to pool/main/p/pam-shield/pam-shield_0.9.2-3.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mateusz Kaduk <[EMAIL PROTECTED]> (supplier of updated pam-shield package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 19 Dec 2007 16:28:24 +0100 Source: pam-shield Binary: libpam-shield Architecture: source i386 Version: 0.9.2-3 Distribution: unstable Urgency: low Maintainer: Mateusz Kaduk <[EMAIL PROTECTED]> Changed-By: Mateusz Kaduk <[EMAIL PROTECTED]> Description: libpam-shield - locks out remote attackers trying password guessing Closes: 456759 456814 457043 Changes: pam-shield (0.9.2-3) unstable; urgency=low . * Checked against new debian-policy and changed to 3.7.3 * Fixed differnce between documentation and installed files (Closes: #456759) * Fixed suboptimal description wording (Closes: #456814) * Fixed typo in the short description (Closes: #457043) Files: 0e60286581fca742688df3c76c454b2a 644 admin optional pam-shield_0.9.2-3.dsc 32b46f11d62879e0f0892b3debfa9259 5651 admin optional pam-shield_0.9.2-3.diff.gz 8171d3611bc58a7ba17bb68fd60cb8d2 21186 admin optional libpam-shield_0.9.2-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHa6TKhQui3hP+/EARAh3wAKCHl6faZrwgTzw+XlF2tva/MA4LaQCcCskR K8AUvhAo7cpVO0MiVO61yXk= =1pmM -----END PGP SIGNATURE-----
--- End Message ---

