Your message dated Wed, 15 Jun 2005 01:32:36 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#276976: fixed in pwgen 2.04-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 17 Oct 2004 20:23:18 +0000
>From [EMAIL PROTECTED] Sun Oct 17 13:23:18 2004
Return-path: <[EMAIL PROTECTED]>
Received: from trofast.sesse.net [129.241.93.32] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CJHYj-0005gf-00; Sun, 17 Oct 2004 13:23:18 -0700
Received: from sesse by trofast.sesse.net with local (Exim 3.36 #1 (Debian))
        id 1CJHYh-0002zj-00; Sun, 17 Oct 2004 22:23:15 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: "Steinar H. Gunderson" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: pwgen: documentation does not inform the user that the default 
passwords are
 insecure
X-Mailer: reportbug 2.99.5
Date: Sun, 17 Oct 2004 22:23:15 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: pwgen
Version: 2.03-1
Severity: important
Tags: security

pwgen's default ("pronouncable" eight-letter passwords, ie. without -s)
passwords only span a very limited range of the keyspace; furthermore,
enumerating them all in a program based on pwgen's source code is not
very hard. I did so a while ago, and ended up with only about 10^9
unique passwords (which is a _lot_ less than the 60^8 or whatever you
get with -s); this is probably too much for an on-line password
brute force attack, but it's definitely within reach for most offline
attacks (ie. feed it as a dictionary to John the Ripper for cracking
/etc/shadow).

The documentation should probably warn the users about this; I'm not
advocating -s by default (that would probably lead to people simply
writing down their passwords), but people should at least be made aware
that the generated passwords may be crackable.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.8.1
Locale: LANG=C, LC_CTYPE=en_US.ISO8859-1

Versions of packages pwgen depends on:
ii  libc6                       2.3.2.ds1-17 GNU C Library: Shared libraries an

-- no debconf information

---------------------------------------
Received: (at 276976-close) by bugs.debian.org; 15 Jun 2005 05:39:20 +0000
>From [EMAIL PROTECTED] Tue Jun 14 22:39:20 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DiQcS-0003kL-00; Tue, 14 Jun 2005 22:39:20 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DiQVw-0000U0-00; Wed, 15 Jun 2005 01:32:36 -0400
From: [EMAIL PROTECTED] (Theodore Y. Ts'o)
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#276976: fixed in pwgen 2.04-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 15 Jun 2005 01:32:36 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 4

Source: pwgen
Source-Version: 2.04-1

We believe that the bug you reported is fixed in the latest version of
pwgen, which is due to be installed in the Debian FTP archive:

pwgen_2.04-1.diff.gz
  to pool/main/p/pwgen/pwgen_2.04-1.diff.gz
pwgen_2.04-1.dsc
  to pool/main/p/pwgen/pwgen_2.04-1.dsc
pwgen_2.04-1_i386.deb
  to pool/main/p/pwgen/pwgen_2.04-1_i386.deb
pwgen_2.04.orig.tar.gz
  to pool/main/p/pwgen/pwgen_2.04.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Theodore Y. Ts'o <[EMAIL PROTECTED]> (supplier of updated pwgen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 15 Jun 2005 00:39:10 -0400
Source: pwgen
Binary: pwgen
Architecture: source i386
Version: 2.04-1
Distribution: unstable
Urgency: low
Maintainer: Theodore Y. Ts'o <[EMAIL PROTECTED]>
Changed-By: Theodore Y. Ts'o <[EMAIL PROTECTED]>
Description: 
 pwgen      - Automatic Password generation
Closes: 51307 154561 182595 276307 276976 282076 311461
Changes: 
 pwgen (2.04-1) unstable; urgency=low
 .
   * New upstream version.
   * Adopt maintainership of pwgen.  (Closes: #282076)
   * Fix minor bug in man page.  (Closes: #311461)
   * Convert from debmake to debhelper
   * Add the --sha1 option so that pwgen uses the SHA1 hash to generate
     (not so) random passwords.
   * Add --symbols option which adds special symbols to the password.
     (Closes: #154561)
   * Add short options for --no-capitalize and --no-numerals and make those
     options work when --secure is specified.
   * Add --ambiguous option which avoids characters that can be confused by
     the user.  (Closes: #51307)
   * Fix bug where --no-capitalized and --no-numerals were ignored for short
     passwords.  (Closes: #276307)
   * In the pwgen man page, explain that human-memorable passwords are
     subject to off-line brute force attacks.  (Closes: #276976)
   * Allow one or more capital letters and digits in human-friendly
     passwords (Closes: #182595)
Files: 
 f6a75e4e0f2169e187948e8f624a3877 544 admin optional pwgen_2.04-1.dsc
 c6116603f89a65d1b6ea4bdce00106fb 47276 admin optional pwgen_2.04.orig.tar.gz
 27337e7ac1433e6bbb7304cb292b333b 20 admin optional pwgen_2.04-1.diff.gz
 7807f22617f13270d79753ca8f01b136 16756 admin optional pwgen_2.04-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCr7e77To545NnTEARAuQ4AKCK+7LLMXQIoJg9Lj/muzjSGxTqhgCfVmyE
576eNyWmVWLIHI87CJ2hykk=
=RpcM
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to