Your message dated Wed, 15 Jun 2005 01:32:36 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#182595: fixed in pwgen 2.04-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 26 Feb 2003 19:45:33 +0000
>From [EMAIL PROTECTED] Wed Feb 26 13:45:32 2003
Return-path: <[EMAIL PROTECTED]>
Received: from host140.osu-btc.com (tara.aetion.com) [206.21.20.140] (mail)
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 18o7Ui-00036a-00; Wed, 26 Feb 2003 13:45:32 -0600
Received: from cicero.aetion.internal ([172.28.205.2] ident=mail)
by tara.aetion.com with esmtp (Exim 3.35 #1 (Debian))
id 18o7Uh-0004mF-00
for <[EMAIL PROTECTED]>; Wed, 26 Feb 2003 14:45:31 -0500
Received: from markc by cicero.aetion.internal with local (Exim 3.35 #1
(Debian))
id 18o7Uh-0000Rw-00; Wed, 26 Feb 2003 14:45:31 -0500
From: <[EMAIL PROTECTED]>
Subject: pwgen: Memorable multi-capital passwords would be nice
To: [EMAIL PROTECTED]
X-Mailer: bug 3.3.10.1
Message-Id: <[EMAIL PROTECTED]>
Date: Wed, 26 Feb 2003 14:45:31 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=1.1 required=4.0
tests=HAS_PACKAGE,NO_REAL_NAME,SPAM_PHRASE_00_01
version=2.44
X-Spam-Level: *
Package: pwgen
Version: 2.01-3
Severity: wishlist
pwgen seems able to produce unmemorable passwords with --secure,
passwords with no capitals with --no-capitalize, and passwords with
exactly one capital with --capitalize. It would be nice if some option
did what --capitalize says it does - includes *one or more* capital
letter instead of always exactly one. "numerals" has a similar
problem. I can certainly remember passwords with more than one capital
letter or numeral, but the --secure ones are still too much of a pain.
Debian Release: 3.0
Kernel Version: Linux cicero 2.4.17 #15 SMP Tue Dec 3 09:36:36 EST 2002 i686
unknown
Versions of the packages pwgen depends on:
ii libc6 2.3.1-10 GNU C Library: Shared libraries and Timezone
Thanks,
Mark
---------------------------------------
Received: (at 182595-close) by bugs.debian.org; 15 Jun 2005 05:39:19 +0000
>From [EMAIL PROTECTED] Tue Jun 14 22:39:18 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DiQcQ-0003jv-00; Tue, 14 Jun 2005 22:39:18 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DiQVw-0000Tw-00; Wed, 15 Jun 2005 01:32:36 -0400
From: [EMAIL PROTECTED] (Theodore Y. Ts'o)
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#182595: fixed in pwgen 2.04-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 15 Jun 2005 01:32:36 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
X-CrossAssassin-Score: 2
Source: pwgen
Source-Version: 2.04-1
We believe that the bug you reported is fixed in the latest version of
pwgen, which is due to be installed in the Debian FTP archive:
pwgen_2.04-1.diff.gz
to pool/main/p/pwgen/pwgen_2.04-1.diff.gz
pwgen_2.04-1.dsc
to pool/main/p/pwgen/pwgen_2.04-1.dsc
pwgen_2.04-1_i386.deb
to pool/main/p/pwgen/pwgen_2.04-1_i386.deb
pwgen_2.04.orig.tar.gz
to pool/main/p/pwgen/pwgen_2.04.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Theodore Y. Ts'o <[EMAIL PROTECTED]> (supplier of updated pwgen package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 15 Jun 2005 00:39:10 -0400
Source: pwgen
Binary: pwgen
Architecture: source i386
Version: 2.04-1
Distribution: unstable
Urgency: low
Maintainer: Theodore Y. Ts'o <[EMAIL PROTECTED]>
Changed-By: Theodore Y. Ts'o <[EMAIL PROTECTED]>
Description:
pwgen - Automatic Password generation
Closes: 51307 154561 182595 276307 276976 282076 311461
Changes:
pwgen (2.04-1) unstable; urgency=low
.
* New upstream version.
* Adopt maintainership of pwgen. (Closes: #282076)
* Fix minor bug in man page. (Closes: #311461)
* Convert from debmake to debhelper
* Add the --sha1 option so that pwgen uses the SHA1 hash to generate
(not so) random passwords.
* Add --symbols option which adds special symbols to the password.
(Closes: #154561)
* Add short options for --no-capitalize and --no-numerals and make those
options work when --secure is specified.
* Add --ambiguous option which avoids characters that can be confused by
the user. (Closes: #51307)
* Fix bug where --no-capitalized and --no-numerals were ignored for short
passwords. (Closes: #276307)
* In the pwgen man page, explain that human-memorable passwords are
subject to off-line brute force attacks. (Closes: #276976)
* Allow one or more capital letters and digits in human-friendly
passwords (Closes: #182595)
Files:
f6a75e4e0f2169e187948e8f624a3877 544 admin optional pwgen_2.04-1.dsc
c6116603f89a65d1b6ea4bdce00106fb 47276 admin optional pwgen_2.04.orig.tar.gz
27337e7ac1433e6bbb7304cb292b333b 20 admin optional pwgen_2.04-1.diff.gz
7807f22617f13270d79753ca8f01b136 16756 admin optional pwgen_2.04-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCr7e77To545NnTEARAuQ4AKCK+7LLMXQIoJg9Lj/muzjSGxTqhgCfVmyE
576eNyWmVWLIHI87CJ2hykk=
=RpcM
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]