Your message dated Wed, 15 Jun 2005 01:32:36 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#282076: fixed in pwgen 2.04-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 19 Nov 2004 14:52:29 +0000 >From [EMAIL PROTECTED] Fri Nov 19 06:52:29 2004 Return-path: <[EMAIL PROTECTED]> Received: from merkel.debian.org [192.25.206.16] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CVA7h-0001KC-00; Fri, 19 Nov 2004 06:52:29 -0800 Received: from djpig by merkel.debian.org with local (Exim 3.35 1 (Debian)) id 1CVA7f-0000Fj-00; Fri, 19 Nov 2004 07:52:27 -0700 To: Debian Bug Tracking System <[EMAIL PROTECTED]> X-Debbugs-CC: Vincent Renardias <[EMAIL PROTECTED]> Subject: O: pwgen -- Automatic Password generation Message-Id: <[EMAIL PROTECTED]> From: Frank Lichtenheld <[EMAIL PROTECTED]> Date: Fri, 19 Nov 2004 07:52:27 -0700 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: wnpp Severity: normal The current maintainer of pwgen, Vincent Renardias <[EMAIL PROTECTED]>, has orphaned this package. If you want to be the new maintainer, please take it -- see http://www.debian.org/devel/wnpp/index.html#howto-o for detailed instructions how to adopt a package properly. Some information about this package: Package: pwgen Binary: pwgen Version: 2.03-1 Priority: optional Section: admin Maintainer: Vincent Renardias <[EMAIL PROTECTED]> Build-Depends: debmake Architecture: any Standards-Version: 3.2.1 Format: 1.0 Directory: pool/main/p/pwgen Files: e8b0a866f5f6c8c02e55e2033d13a6f8 647 pwgen_2.03-1.dsc 1a73657a0a10f3c3d00933036369e702 23367 pwgen_2.03.orig.tar.gz 3fb15ad45294fca6c60c3f9a87b41bd8 4653 pwgen_2.03-1.diff.gz Package: pwgen Priority: optional Section: admin Installed-Size: 29 Maintainer: Vincent Renardias <[EMAIL PROTECTED]> Architecture: i386 Version: 2.03-1 Depends: libc6 (>= 2.3.1-1) Filename: pool/main/p/pwgen/pwgen_2.03-1_i386.deb Size: 9190 MD5sum: 25dea73d1f2649e01db7d9ec72bfcb29 Description: Automatic Password generation pwgen generates random, meaningless but pronounceable passwords. These passwords contain either only lowercase letters, or upper and lower case mixed, or digits thrown in. Uppercase letters and digits are placed in a way that eases remembering their position when memorizing only the word. --------------------------------------- Received: (at 282076-close) by bugs.debian.org; 15 Jun 2005 05:39:21 +0000 >From [EMAIL PROTECTED] Tue Jun 14 22:39:21 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DiQcT-0003ke-00; Tue, 14 Jun 2005 22:39:21 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DiQVw-0000U2-00; Wed, 15 Jun 2005 01:32:36 -0400 From: [EMAIL PROTECTED] (Theodore Y. Ts'o) To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#282076: fixed in pwgen 2.04-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Wed, 15 Jun 2005 01:32:36 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 5 Source: pwgen Source-Version: 2.04-1 We believe that the bug you reported is fixed in the latest version of pwgen, which is due to be installed in the Debian FTP archive: pwgen_2.04-1.diff.gz to pool/main/p/pwgen/pwgen_2.04-1.diff.gz pwgen_2.04-1.dsc to pool/main/p/pwgen/pwgen_2.04-1.dsc pwgen_2.04-1_i386.deb to pool/main/p/pwgen/pwgen_2.04-1_i386.deb pwgen_2.04.orig.tar.gz to pool/main/p/pwgen/pwgen_2.04.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Theodore Y. Ts'o <[EMAIL PROTECTED]> (supplier of updated pwgen package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 15 Jun 2005 00:39:10 -0400 Source: pwgen Binary: pwgen Architecture: source i386 Version: 2.04-1 Distribution: unstable Urgency: low Maintainer: Theodore Y. Ts'o <[EMAIL PROTECTED]> Changed-By: Theodore Y. Ts'o <[EMAIL PROTECTED]> Description: pwgen - Automatic Password generation Closes: 51307 154561 182595 276307 276976 282076 311461 Changes: pwgen (2.04-1) unstable; urgency=low . * New upstream version. * Adopt maintainership of pwgen. (Closes: #282076) * Fix minor bug in man page. (Closes: #311461) * Convert from debmake to debhelper * Add the --sha1 option so that pwgen uses the SHA1 hash to generate (not so) random passwords. * Add --symbols option which adds special symbols to the password. (Closes: #154561) * Add short options for --no-capitalize and --no-numerals and make those options work when --secure is specified. * Add --ambiguous option which avoids characters that can be confused by the user. (Closes: #51307) * Fix bug where --no-capitalized and --no-numerals were ignored for short passwords. (Closes: #276307) * In the pwgen man page, explain that human-memorable passwords are subject to off-line brute force attacks. (Closes: #276976) * Allow one or more capital letters and digits in human-friendly passwords (Closes: #182595) Files: f6a75e4e0f2169e187948e8f624a3877 544 admin optional pwgen_2.04-1.dsc c6116603f89a65d1b6ea4bdce00106fb 47276 admin optional pwgen_2.04.orig.tar.gz 27337e7ac1433e6bbb7304cb292b333b 20 admin optional pwgen_2.04-1.diff.gz 7807f22617f13270d79753ca8f01b136 16756 admin optional pwgen_2.04-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCr7e77To545NnTEARAuQ4AKCK+7LLMXQIoJg9Lj/muzjSGxTqhgCfVmyE 576eNyWmVWLIHI87CJ2hykk= =RpcM -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]