Package: password-gorilla
Version: 1.6.0~git20180203.228bbbb-1
Severity: normal
Tags: upstream
X-Debbugs-Cc: bell...@snarkjaeger.ch

Dear Maintainer,

The duplicate uuids do not appear to affect the operation of
password-gorilla itself, but may affect the working of utilities
on other platforms that use the same password store file format
and provide the same functionality.

I encountered the problem after copying a password database generated by
password-gorilla to an android smartphone and used it with the PasswdSafe
app. Duplicate uids in the file resulted in the android app displaying
incorrect information for some entries and copying incorrect information
to the clipboard.

Problem is known and is fixed in a later version of password-gorilla.
Using later version of password-gorilla corrects uuid generation and
repairs password database files that are affected by the problem. I have
confirmed that using a repaired password database file for the android
PasswdSafe app produces the expected display and clipboard copy of the
information requested.

password-gorilla version 1.6.0~git20180203.228bbbb-1 aka 1.6.0 beta1
is now quite old, a more recent "1.6.0 beta-2" version is available.

Request that this newer version is packaged into the next Debian release.

Background

password-gorilla is an implementation of the functionality of the
Password Safe utility originally implemented on Windows; the functionality
has been implemented for other platforms including the PasswdSafe
app on Android. (The current version of the Windows utility (3.65.0)
recognises and repairs duplicated uuids.)

For android PasswdSafe discussion of the problem, see
        https://sourceforge.net/p/passwdsafe/discussion/1067588/
(PasswdSafe on SourceForge ... Discussion ... Help ... "problem with psafe3
file from password gorilla".)

For password-gorilla description of problem and correction see
        https://github.com/zdia/gorilla/issues/203

Problem is fixed in password gorilla 1.6.0 beta-2 which can be downloaded
as a system-independent "kit" file from
        https://gorilla.dp100.com/downloads/
It can be run using the appropriate tclkit executable from
        https://gorilla.dp100.com/downloads/tclkit/
and this is the method I used to confirm that the problem as I encountered
it is fixed in version 1.6.0 beta-2.
I imagine that the same procedure that was used to package the beta1 version
for Debian distribution will also work for beta-2. 

Regards
Peter Lee (bell...@snarkjaeger.ch)

-- System Information:
Debian Release: bookworm/sid
  APT prefers jammy-updates
  APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), 
(100, 'jammy-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-15-generic (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages password-gorilla depends on:
ii  itcl3   3.4.3-3.1
ii  tcl     8.6.11+1build2
ii  tcllib  1.20+dfsg-1
ii  tk      8.6.11+1build2
ii  tklib   0.7+20210111-1

password-gorilla recommends no packages.

password-gorilla suggests no packages.

-- no debconf information

Reply via email to