Your message dated Mon, 24 Sep 2018 18:00:09 +0000
with message-id <e1g4v9v-000gfz...@fasolo.debian.org>
and subject line Bug#841472: fixed in cowpatty 4.8-1
has caused the Debian Bug report #841472,
regarding ITP: cowpatty -- Offline dictionary attack tool against
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
841472: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841472
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Marcio de Souza Oliveira <m.desouz...@gmail.com>

* Package name    : cowpatty
  Version         : 4.6
  Upstream Author : Joshua Wright <jwri...@hasborg.com>
* URL             : http://www.willhackforsushi.com/?page_id=50
* License         : GPL-2
  Programming Lang: C
  Description     : Offline dictionary attack tool against WPA/WPA2

Implementation of an offline dictionary attack against WPA/WPA2 networks
using PSK-based authentication (e.g. WPA-Personal). Cowpatty can implement
an accelerated attack if a precomputed PMK file is available for the SSID
that is being assessed.

--- End Message ---
--- Begin Message ---
Source: cowpatty
Source-Version: 4.8-1

We believe that the bug you reported is fixed in the latest version of
cowpatty, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 841...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Samuel Henrique <samuel...@debian.org> (supplier of updated cowpatty package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 05 Jul 2018 23:09:34 -0300
Source: cowpatty
Binary: cowpatty
Architecture: source amd64
Version: 4.8-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-secur...@tracker.debian.org>
Changed-By: Samuel Henrique <samuel...@debian.org>
Description:
 cowpatty   - Brute-force WPA dictionary attack
Closes: 841472
Changes:
 cowpatty (4.8-1) unstable; urgency=medium
 .
   * Initial Debian release (closes: #841472)
   * New upstream version 4.8
   * Bump DH level to 11
   * Bump Watch to v4
   * Bump Standards-Version to 4.1.5
   * d/control
     - from kali to debian under pkg-sec team
     - Priority: from extra to optional
   * d/copyright:
     - delete problematic blank line
     - remove double declaration of GPL-2+
     - reflect upstream change to BSD3 and update debian/*
   * d/cowpatty.manpages: use upstream manpages
   * d/patches:
     - makefile-flags.patch: new patch to fix hardening and CC flag
       (was using clang)
     - fix-makefile.patch: update patch
     - cowpatty-4.6-fixup16-patch:
       ~ refresh and update patch to 4.8
       ~ rename to kali-overflow.patch
       ~ update DEP-3 headers and add Forwarded field
   * d/rules: export hardening=+all
   * d/lintian-overrides: no gpl code linked with openssl
   * wrap-and-sort -a
Checksums-Sha1:
 f7879016c300b2fd973a096c2ed3baf8f5a8ff3e 1932 cowpatty_4.8-1.dsc
 ff7aa00e5c86bd69ad779704586a78b9acab668a 98694 cowpatty_4.8.orig.tar.gz
 c087b381acf566e81440c52f988e7b8e425d7b93 6908 cowpatty_4.8-1.debian.tar.xz
 52725f254329d9cf5d3295c2c85ca9117e983a0a 41532 cowpatty-dbgsym_4.8-1_amd64.deb
 2f3185da1aea05c1b7472722a5450f3f43aa3f16 5888 cowpatty_4.8-1_amd64.buildinfo
 3424527d2cb17c5add96349a10cd6033b4baed56 23548 cowpatty_4.8-1_amd64.deb
Checksums-Sha256:
 826cc0ab508924812e8d84ab380d19023c32f98edb72b4a68ab74b0397455ddb 1932 
cowpatty_4.8-1.dsc
 b9f8b724d06d3074c5bf804ed8e64b5dc846aaa6d81b31586b16558930511164 98694 
cowpatty_4.8.orig.tar.gz
 8abc1b33441f9b9928ad79d4d31f208152d013075f762c8a12deae86c294a467 6908 
cowpatty_4.8-1.debian.tar.xz
 d51c2faadeae193c5d7205a155cb0c8c2b1dedb8baec81687f6eed49dc4e1e7c 41532 
cowpatty-dbgsym_4.8-1_amd64.deb
 d53e00ae6bb42baaab305a852a8f5298ea35ac723cb98e66650249363c9bf9b1 5888 
cowpatty_4.8-1_amd64.buildinfo
 209591887e608ddc359086fa03c011e9c347ce6dbbd4cda7f39980a203d5e795 23548 
cowpatty_4.8-1_amd64.deb
Files:
 4f28aff40612cfaf433bbfbc016a8d7f 1932 net optional cowpatty_4.8-1.dsc
 8f1190a002d93950678c6f01070cf439 98694 net optional cowpatty_4.8.orig.tar.gz
 ae16177eaf3aca138ae57f4f5b88b475 6908 net optional cowpatty_4.8-1.debian.tar.xz
 c7fd05004df3bd2b87ed44ac0865afe3 41532 debug optional 
cowpatty-dbgsym_4.8-1_amd64.deb
 343c12d6f650bbed88abaf567c069e93 5888 net optional 
cowpatty_4.8-1_amd64.buildinfo
 180c0e246e58700cd7604a04d9856407 23548 net optional cowpatty_4.8-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=d1Oj
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to