Your message dated Sun, 02 Apr 2006 14:32:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#340453: fixed in crack 5.0a-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: crack-md5
Version: 5.0a-8
Severity: important

/usr/sbin/Crack is broken in several ways:

  - It "does the right thing" with shadow passwords *only* if you run
    *exactly* "Crack /etc/passwd", so for example the command line
    recommended on Crack's manpage, "Crack -nice 10 /etc/passwd" does
    nothing.

  - It cds into /usr/share/Crack before running the real Crack, so if
    you've generated your own merged passwd/shadow file "fixedpasswd"
    (say) because "Crack -nice 10 /etc/passwd" doesn't work, then "Crack
    fixedpasswd" won't work because Crack will cd away from the
    directory in which "fixedpasswd" exists and then (I think) load
    /etc/passwd as some kind of default so Crack-Reporter comments
    (disorientingly, since you've fixed them in fixedpasswd) that it's
    ignoring all your shadowed passwords.

At least a big note to the effect that ful pathnames are required for
the password files would be useful - in the SYNOPSIS of the manpage for
example.  Better would be to extend /usr/sbin/Crack so that it does the
right thing under more circumstances, including the cases documented in
the manpage, and so that it notices when it's been given a relative
pathname to the password file and either complains or fixes it up (for
example by temporarily copying it to /var/run/Crack)...

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages crack-md5 depends on:
ii  crack-common                  5.0a-8     Password guessing program
ii  libc6                         2.3.5-8    GNU C Library: Shared libraries an

crack-md5 recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: crack
Source-Version: 5.0a-9

We believe that the bug you reported is fixed in the latest version of
crack, which is due to be installed in the Debian FTP archive:

crack-common_5.0a-9_all.deb
  to pool/main/c/crack/crack-common_5.0a-9_all.deb
crack-md5_5.0a-9_i386.deb
  to pool/main/c/crack/crack-md5_5.0a-9_i386.deb
crack_5.0a-9.diff.gz
  to pool/main/c/crack/crack_5.0a-9.diff.gz
crack_5.0a-9.dsc
  to pool/main/c/crack/crack_5.0a-9.dsc
crack_5.0a-9_i386.deb
  to pool/main/c/crack/crack_5.0a-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pawel Wiecek <[EMAIL PROTECTED]> (supplier of updated crack package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun,  2 Apr 2006 22:49:00 +0200
Source: crack
Binary: crack-md5 crack crack-common
Architecture: source all i386
Version: 5.0a-9
Distribution: unstable
Urgency: low
Maintainer: Pawel Wiecek <[EMAIL PROTECTED]>
Changed-By: Pawel Wiecek <[EMAIL PROTECTED]>
Description: 
 crack      - Password guessing program
 crack-common - Password guessing program
 crack-md5  - Password guessing program
Closes: 337428 340453
Changes: 
 crack (5.0a-9) unstable; urgency=low
 .
   * Completely rewritten wrapper script to avoid misbehavior for certain
     parameter combinations (closes: #340453)
   * Applied patch from Petr Salinger <[EMAIL PROTECTED]> to enable
     builds on GNU/kFreeBSD (closes: #337428)
Files: 
 8b1aa60ef3d3fcb6a415d3c3872f1a0f 575 admin optional crack_5.0a-9.dsc
 8a25dca40e5abdee93a56e76f3751f15 22576 admin optional crack_5.0a-9.diff.gz
 debce51490073b6f0ee5db70c6a9b286 2862730 admin optional 
crack-common_5.0a-9_all.deb
 e5845dd84189bf8e1be3ccfb1c192a20 27662 admin optional crack_5.0a-9_i386.deb
 16be9e9f8271ec67188284a71df6bb92 27078 admin optional crack-md5_5.0a-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFEMD7HBOdjEO/Bh3ARAmLwAJ4xx1QsTQUBYFlYsqhJo1IgFPCjvgCeJEEf
Km4m27T4NYlzc07yv4LOW38=
=awNO
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to