Your message dated Mon, 30 Sep 2002 14:18:52 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#162689: fixed in fragroute 1.2-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 28 Sep 2002 17:20:15 +0000
>From [EMAIL PROTECTED] Sat Sep 28 12:20:14 2002
Return-path: <[EMAIL PROTECTED]>
Received: from engmail.uwaterloo.ca [129.97.50.62] 
        by master.debian.org with esmtp (Exim 3.12 1 (Debian))
        id 17vLGI-0000Rr-00; Sat, 28 Sep 2002 12:20:14 -0500
Received: (from [EMAIL PROTECTED])
        by engmail.uwaterloo.ca (8.11.6/8.11.6) id g8SHKDU15402
        for [EMAIL PROTECTED]; Sat, 28 Sep 2002 13:20:13 -0400 (EDT)
Date: Sat, 28 Sep 2002 13:20:13 -0400
From: Simon Law <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: ITP: fragroute - Test a NIDS by attempting to evade using fragmented 
packets
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4i
X-No-CC: If you CC me on this list, I will feed you to Branden Robinson.
Delivered-To: [EMAIL PROTECTED]

Package: wnpp
Version: N/A; reported 2002-09-28
Severity: wishlist

* Package name    : fragroute
  Version         : 1.2
  Upstream Author : Dug Song <[EMAIL PROTECTED]>
* URL             : http://www.monkey.org/~dugsong/fragroute/
* License         : 3-clause BSD
  Description     : Test a NIDS by attempting to evade using fragmented packets
    fragroute intercepts, modifies, and rewrites egress traffic destined
    for a specified host, implementing most of the attacks described in the
    Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
    Network Intrusion Detection" paper of January 1998.
    .
    It features a simple ruleset language to delay, duplicate, drop,
    fragment, overlap, print, reorder, segment, source-route, or otherwise
    monkey with all outbound packets destined for a target host, with
    minimal support for randomized or probabilistic behaviour.
    .
    This tool was written in good faith to aid in the testing of network
    intrusion detection systems, firewalls, and basic TCP/IP stack
    behaviour. Please do not abuse this software.


---------------------------------------
Received: (at 162689-close) by bugs.debian.org; 30 Sep 2002 18:23:15 +0000
>From [EMAIL PROTECTED] Mon Sep 30 13:23:15 2002
Return-path: <[EMAIL PROTECTED]>
Received: from auric.debian.org [206.246.226.45] (mail)
        by master.debian.org with esmtp (Exim 3.12 1 (Debian))
        id 17w5CM-0003gr-00; Mon, 30 Sep 2002 13:23:14 -0500
Received: from rmurray by auric.debian.org with local (Exim 3.35 1 (Debian))
        id 17w588-00027t-00; Mon, 30 Sep 2002 14:18:52 -0400
From: Simon Law <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.17 $
Subject: Bug#162689: fixed in fragroute 1.2-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Ryan Murray <[EMAIL PROTECTED]>
Date: Mon, 30 Sep 2002 14:18:52 -0400
Delivered-To: [EMAIL PROTECTED]

We believe that the bug you reported is fixed in the latest version of
fragroute, which is due to be installed in the Debian FTP archive:

fragroute_1.2-1.diff.gz
  to pool/main/f/fragroute/fragroute_1.2-1.diff.gz
fragroute_1.2-1.dsc
  to pool/main/f/fragroute/fragroute_1.2-1.dsc
fragroute_1.2-1_i386.deb
  to pool/main/f/fragroute/fragroute_1.2-1_i386.deb
fragroute_1.2.orig.tar.gz
  to pool/main/f/fragroute/fragroute_1.2.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon Law <[EMAIL PROTECTED]> (supplier of updated fragroute package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 28 Sep 2002 13:27:13 -0400
Source: fragroute
Binary: fragroute
Architecture: source i386
Version: 1.2-1
Distribution: unstable
Urgency: low
Maintainer: Simon Law <[EMAIL PROTECTED]>
Changed-By: Simon Law <[EMAIL PROTECTED]>
Description: 
 fragroute  - Test a NIDS by attempting to evade using fragmented packets
Closes: 162689
Changes: 
 fragroute (1.2-1) unstable; urgency=low
 .
   * Initial Release. (Closes: Bug#162689)
   * Use libdumbnet instead of libdnet.
   * Make autoconf work better at detecting libraries.
Files: 
 4d1ce1c8a43ee1fa972a5ac5fc8c90b7 559 net optional fragroute_1.2-1.dsc
 7e4de763fae35a50e871bdcd1ac8e23a 85247 net optional fragroute_1.2.orig.tar.gz
 b7bfa74504f91403ed7df9374e328857 36656 net optional fragroute_1.2-1.diff.gz
 c776816ea50790e07930a1d7eb8a7d0f 35282 net optional fragroute_1.2-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE9lfsnLiz2e3eWpgsRAgjbAJ902ZFDOuoC4WxpEkQgGfJ9LktstgCgz/Z+
tvRC2a2L6r2Kteh7o/p92IY=
=OXY0
-----END PGP SIGNATURE-----

Reply via email to