Your message dated Tue, 11 Jun 2013 01:03:05 +0000
with message-id <[email protected]>
and subject line Bug#697346: fixed in aircrack-ng 1:1.1-6
has caused the Debian Bug report #697346,
regarding [PATCH]: Manpage Spelling
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
697346: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697346
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: aircrack-ng
Version: 1:1.1-5
Tags: patch
Hello Maintainer,
Please accept the following patch to fix spelling errors in the
manpages of this package:
=== modified file 'manpages/airbase-ng.8'
--- manpages/airbase-ng.8 2012-07-27 19:22:23 +0000
+++ manpages/airbase-ng.8 2013-01-04 08:53:49 +0000
@@ -64,7 +64,7 @@
In practice, it is best to set the value to the type of clients you
are dealing with.
.TP
.I -q
-This surpresses printing any statistics or status information.
+This suppresses printing any statistics or status information.
.TP
.I -v
This prints additional messages and details to assist in debugging.
@@ -105,7 +105,7 @@
.I -L, --caffe-latte
Airbase-ng also contains the new caffe-latte attack, which is also
implemented in aireplay-ng as attack "-6". It can be used with "-L" or
"caffe-latte". This attack specifically works against clients, as it
waits for a broadcast arp request, which happens to be a gratuitous
arp. See this for an explaination of what a gratuitous arp is. It then
flips a few bits in the sender MAC and IP, corrects the ICV (crc32)
value and sends it back to the client, where it came from. The point
why this attack works in practice is, that at least windows sends
gratuitous arps after a connection on layer 2 is established and a
static ip is set, or dhcp fails and windows assigned an IP out of
169.254.X.X.
-"-x <pps>" sets the number of packets per second to send when
performing the caffe-latte attack. At the moment, this attack doesn't
stop, it continuously sends arp requests. Airodump-ng is needed to
capture the replys.
+"-x <pps>" sets the number of packets per second to send when
performing the caffe-latte attack. At the moment, this attack doesn't
stop, it continuously sends arp requests. Airodump-ng is needed to
capture the replies.
.TP
.I -N, --cfrag
This attack listens for an ARP request or IP packet from the client.
Once one is received, a small amount of PRGA is extracted and then
used to create an ARP request packet targeted to the client. This ARP
request is actually made of up of multiple packet fragments such that
when received, the client will respond.
=== modified file 'manpages/aireplay-ng.8'
--- manpages/aireplay-ng.8 2012-07-27 19:22:23 +0000
+++ manpages/aireplay-ng.8 2013-01-04 08:54:18 +0000
@@ -149,7 +149,7 @@
This attack, when successful, can obtain 1500 bytes of PRGA (pseudo
random generation algorithm). This attack does not recover the WEP key
itself, but merely obtains the PRGA. The PRGA can then be used to
generate packets with packetforge-ng which are in turn used for
various injection attacks. It requires at least one data packet to be
received from the access point in order to initiate the attack.
.TP
.I -6, --caffe-latte
-In general, for an attack to work, the attacker has to be in the
range of an AP and a connected client (fake or real). Caffe Latte
attacks allows to gather enough packets to crack a WEP key without the
need of an AP, it just need a client to be in range.
+In general, for an attack to work, the attacker has to be in the
range of an AP and a connected client (fake or real). Caffe Latte
attacks allows one to gather enough packets to crack a WEP key without
the need of an AP, it just need a client to be in range.
.TP
.I -7, --cfrag
This attack turns IP or ARP packets from a client into ARP request
against the client. This attack works especially well against ad-hoc
networks. As well it can be used against softAP clients and normal AP
clients.
=== modified file 'manpages/airodump-ng.8'
--- manpages/airodump-ng.8 2012-07-27 19:22:23 +0000
+++ manpages/airodump-ng.8 2013-01-04 08:54:55 +0000
@@ -30,7 +30,7 @@
Delay <secs> seconds delay between display updates (default: 1
second). Useful for slow CPU.
.TP
.I --showack
-Prints ACK/CTS/RTS statistics. Helps in debugging and general
injection optimization. It is indication if you inject, inject too
fast, reach the AP, the frames are valid encrypted frames. Allows to
detect "hidden" stations, which are too far away to capture high
bitrate frames, as ACK frames are sent at 1Mbps.
+Prints ACK/CTS/RTS statistics. Helps in debugging and general
injection optimization. It is indication if you inject, inject too
fast, reach the AP, the frames are valid encrypted frames. Allows one
to detect "hidden" stations, which are too far away to capture high
bitrate frames, as ACK frames are sent at 1Mbps.
.TP
.I -h
Hides known stations for \-\-showack.
=== modified file 'manpages/buddy-ng.1'
--- manpages/buddy-ng.1 2012-07-27 19:22:23 +0000
+++ manpages/buddy-ng.1 2013-01-04 08:53:02 +0000
@@ -7,7 +7,7 @@
<options>
.SH DESCRIPTION
.BI buddy-ng
-server echoes back the decrypted packets to the system running
easside-ng in order to access the wireless network without knowing the
WEP key. It is done by having the AP itself decrypt the packets. When
runned, it automatically starts and listen to port 6969.
+server echoes back the decrypted packets to the system running
easside-ng in order to access the wireless network without knowing the
WEP key. It is done by having the AP itself decrypt the packets. When
ran, it automatically starts and listen to port 6969.
.SH OPTIONS
.PP
.TP
fix-aircrack-manpages.diff
Description: Binary data
--- End Message ---
--- Begin Message ---
Source: aircrack-ng
Source-Version: 1:1.1-6
We believe that the bug you reported is fixed in the latest version of
aircrack-ng, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Carlos Alberto Lopez Perez <[email protected]> (supplier of updated aircrack-ng
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 11 Jun 2013 08:45:17 WST
Source: aircrack-ng
Binary: aircrack-ng
Architecture: amd64 source
Version: 1:1.1-6
Distribution: unstable
Urgency: low
Maintainer: Carlos Alberto Lopez Perez <[email protected]>
Changed-By: Carlos Alberto Lopez Perez <[email protected]>
Description:
aircrack-ng - wireless WEP/WPA cracking utilities
Closes: 688158 697346
Changes:
aircrack-ng (1:1.1-6) unstable; urgency=low
.
* Remove unused Build-Depends on obsolete libnl-dev (Closes: #688158)
* Add 019-fix-spelling-manpages.diff (Closes: #697346)
* Add 020-ignore-negative-one.diff (Adds an option "ignore-negative-one"
to workaround broken channel handling)
* Add 021-fix-airodump-ng-oui-update.diff (Recently the oui file included
some leading spaces that makes it not recognizable by airodump-ng. Fix it)
* Update airodump-ng-oui.txt file
Checksums-Sha256:
eb0eb7a0cf2b20963716369615e2e34506c281ad948af62abe70d6c92b83c883 880824
aircrack-ng_1.1-6_amd64.deb
d38600e9765232aa0c991a0b1bd385e23d534d3fd4a8f02845fc7b82ec428b35 1849
aircrack-ng_1.1-6.dsc
e17c834693d2071d5243089f96986b61f55fef6a0ceaa174f4fe01563dccacee 265638
aircrack-ng_1.1-6.debian.tar.gz
Checksums-Sha1:
6ab57bf68a52845cac2d48c41f0de8e01f712526 880824 aircrack-ng_1.1-6_amd64.deb
5ef693f333494895afe310f9b4bd5f30cf7f84f3 1849 aircrack-ng_1.1-6.dsc
08208895016652bb399766536b243ea6ad223064 265638 aircrack-ng_1.1-6.debian.tar.gz
Files:
87e4fb703043e7d90a1280f63a3eeac1 880824 net optional
aircrack-ng_1.1-6_amd64.deb
8a71f15ab52b0775dfe7eda14fea2201 1849 net optional aircrack-ng_1.1-6.dsc
0d051a8007b44fec64f4409f52cfc7f1 265638 - - aircrack-ng_1.1-6.debian.tar.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=edNN
-----END PGP SIGNATURE-----
--- End Message ---