Your message dated Mon, 07 Aug 2017 05:36:49 +0000
with message-id <>
and subject line Bug#855495: fixed in pwgen 2.08-1
has caused the Debian Bug report #855495,
regarding pwgen: Please put link of upstream repo. as Homepage link when using 
aptitude show
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact

Debian Bug Tracking System
Contact with problems
--- Begin Message ---
Package: pwgen
Version: 2.07-1.1
Severity: normal

Dear Maintainer,
It would be nice if the upstream repo. to know where pwgen is being
worked upon in upstream.

Would be nice if was listed as homepage.

See -

─[$] aptitude show pwgen

Package: pwgen
Version: 2.07-1.1
State: installed
Automatically installed: no
Multi-Arch: foreign
Priority: optional
Section: admin
Maintainer: Theodore Y. Ts'o <>
Architecture: amd64
Uncompressed Size: 47.1 k
Depends: libc6 (>= 2.14)
Conflicts: pwgen:i386
Provides: pwgen:i386 (= 2.07-1.1)
Provided by: pwgen:i386 (2.07-1.1)
Description: Automatic Password generation
 pwgen generates random, meaningless but pronounceable passwords.
These passwords contain either only lowercase letters, or upper and
lower case mixed, or digits thrown in. Uppercase letters and digits
are placed in a way that eases remembering their position when
memorizing only the word.

Would make it much easier to track new releases of upstream package as
well know what the difference is when you make a new release.

-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (600, 'testing'), (500, 'unstable-debug'), (500,
'testing-debug'), (1, 'experimental-debug'), (1, 'experimental'), (1,
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages pwgen depends on:
ii  libc6  2.24-9

pwgen recommends no packages.

pwgen suggests no packages.

-- no debconf information

          Shirish Agarwal  शिरीष अग्रवाल
  My quotes in this email licensed under CC 3.0
EB80 462B 08E1 A0DE A73A  2C2F 9F3D C7A4 E1C4 D2D8

--- End Message ---
--- Begin Message ---
Source: pwgen
Source-Version: 2.08-1

We believe that the bug you reported is fixed in the latest version of
pwgen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Theodore Y. Ts'o <> (supplier of updated pwgen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing

Hash: SHA256

Format: 1.8
Date: Mon, 07 Aug 2017 00:51:45 -0400
Source: pwgen
Binary: pwgen pwgen-udeb
Architecture: source
Version: 2.08-1
Distribution: unstable
Urgency: medium
Maintainer: Theodore Y. Ts'o <>
Changed-By: Theodore Y. Ts'o <>
 pwgen      - Automatic Password generation
 pwgen-udeb - Automatic Password generation (udeb)
Closes: 454500 666725 695148 791908 794635 836334 846517 855495
 pwgen (2.08-1) unstable; urgency=medium
   * New upstream version
   * Suppress trailing space after the last password (Closes: #794635)
   * Make pwgen -s more "secure" for 1 and 2 character passwords
     (Closes: #666725)
   * Fix option parsing of "pwgen --no-capitalize --no-vowels" (Closes: #791908)
   * Add new option --remove-chars which removes chars from the set of
     characters used to generate passwords (Closes: #836334)
   * Add cross-compilation to debian/rules (Closes: #695148)
   * Update control and copyright files to point at pwgen at github for
     the home directory and primary git repository
     (Closes: #454500, #855495, #846517)
   * Update Debian policy compliance to 4.0.0
 3cba9e034d6380e23784290b5fb50b5850e14fd8 1708 pwgen_2.08-1.dsc
 6406deba61297784888c2ec0c14e3c735a85a2b6 54884 pwgen_2.08.orig.tar.gz
 024d8245b0745d5aaeac60bd098edd6419e402ac 488 pwgen_2.08.orig.tar.gz.asc
 468f887afe8aaa09fd4fa5c5232f319683404d08 5656 pwgen_2.08-1.debian.tar.xz
 eeb71a0f3520d36e60e0388df3e9020bf71ab05a 5633 pwgen_2.08-1_i386.buildinfo
 8ba952876ced56465dff1cdae42b61756b13a66656716a37bebd905857e4fee7 1708 
 dab03dd30ad5a58e578c5581241a6e87e184a18eb2c3b2e0fffa8a9cf105c97b 54884 
 b16dde245d7153f261ebc8de6d5226c4cd7bccd9f880e66697f17903fcad3b6c 488 
 3d2ebdf3b6692e9daabf30f334127bc1aea82228a5d8bcf2cce15bfd0cd76fdc 5656 
 ff47e66efe28deb4e82c6f896f4d998fa66235f6600020d70eecdc2e7199a89d 5633 
 8fd7df94642dfb98d5b2f622ed6f307a 1708 admin optional pwgen_2.08-1.dsc
 6cfba450ac6ff72d11e88a6b0b049165 54884 admin optional pwgen_2.08.orig.tar.gz
 5b3b27cc93f7b14c546a1f1abfece383 488 admin optional pwgen_2.08.orig.tar.gz.asc
 9ba3c88c4e447472ec889a90972f3ec5 5656 admin optional pwgen_2.08-1.debian.tar.xz
 0e1cec16f7ad6efb0ed6f14b95c7f0cd 5633 admin optional 



--- End Message ---

Reply via email to