Hello community,

here is the log from the commit of package john for openSUSE:Factory checked in 
at 2013-10-30 15:37:36
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/john (Old)
 and      /work/SRC/openSUSE:Factory/.john.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "john"

Changes:
--------
--- /work/SRC/openSUSE:Factory/john/john.changes        2013-03-20 
09:52:49.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.john.new/john.changes   2013-10-30 
15:37:38.000000000 +0100
@@ -1,0 +2,31 @@
+Mon Oct 28 13:23:53 UTC 2013 - sch...@suse.de
+
+- Use the generic target for m68k
+
+-------------------------------------------------------------------
+Wed Oct  9 16:00:16 UTC 2013 - l...@linux-schulserver.de
+
+- update to 1.8.0:
+  + Revised the incremental mode to let the current character counts 
+    grow for each character position independently, with the aim to 
+    improve efficiency in terms of successful guesses per candidate 
+    passwords tested.
+  + Revised the pre-defined incremental modes, as well as external
+    mode filters that are used to generate .chr files.
+  + Added makechr, a script to (re-)generate .chr files.
+  + Enhanced the status reporting to include four distinct speed 
+    metrics (g/s, p/s, c/s, and C/s).
+  + Added the "--fork=N" and "--node=MIN[-MAX]/TOTAL" options for 
+    trivial parallel and distributed processing.
+  + In the external mode compiler, treat character literals as unsigned.
+  + Renamed many of the formats.
+  + Updated the documentation.
+  + Relaxed the license for many source files to cut-down BSD.
+  + Relaxed the license for John the Ripper as a whole from GPLv2 
+    (exact version) to GPLv2 or newer with optional OpenSSL and 
+    unRAR exceptions.
+  + Assorted other changes have been made.
+- add simple man pages for relbench and mailer scripts
+- disable jumbo patch for now until a version for 1.8.0 is out
+
+-------------------------------------------------------------------

Old:
----
  john-1.7.9-jumbo-7.tar.bz2
  john-1.7.9-jumbo-7.tar.bz2.sign
  john-1.7.9.tar.bz2
  john-1.7.9.tar.bz2.sign

New:
----
  john-1.8.0.tar.xz
  john-1.8.0.tar.xz.sign
  john.keyring
  mailer.8
  relbench.8

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ john.spec ++++++
--- /var/tmp/diff_new_pack.sOp4TL/_old  2013-10-30 15:37:41.000000000 +0100
+++ /var/tmp/diff_new_pack.sOp4TL/_new  2013-10-30 15:37:41.000000000 +0100
@@ -17,18 +17,21 @@
 
 
 Name:           john
-Version:        1.7.9
+Version:        1.8.0
 Release:        0
 Summary:        Detects Weak Passwords
 License:        GPL-2.0+
 Group:          Productivity/Security
 Url:            http://www.openwall.com/john/
-Source:         http://www.openwall.com/john/g/%{name}-%{version}.tar.bz2
-Source1:        http://www.openwall.com/john/g/%{name}-%{version}.tar.bz2.sign
+Source:         http://www.openwall.com/john/j/%{name}-%{version}.tar.xz
+Source1:        http://www.openwall.com/john/j/%{name}-%{version}.tar.xz.sign
 Source2:        %{name}.8.gz
 Source3:        %{name}-rpmlintrc
-Source4:        
http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2
-Source5:        
http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2.sign
+Source4:        %{name}.keyring
+# Source4:        
http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2
+# Source5:        
http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2.sign
+Source6:        mailer.8
+Source7:        relbench.8
 BuildRequires:  openssl-devel
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 %define         johndir /var/lib/john
@@ -44,8 +47,6 @@
 
 %prep
 %setup -q
-# apply the jumbo patch
-gzip -dc %{SOURCE4} | patch -p1
 # adapt the configs
 perl -pi -e "s#Wordlist = (.*)#Wordlist = %{johndir}/password.lst#g" 
$RPM_BUILD_DIR/%{name}-%{version}/run/john.conf
 perl -pi -e 's#^(\#define JOHN_SYSTEMWIDE_EXEC)\s.+$#$1\t\"%{johndir}\"#g' 
$RPM_BUILD_DIR/%{name}-%{version}/src/params.h
@@ -82,7 +83,7 @@
 %ifarch x86_64
                TARGET=linux-x86-64
 %endif
-%ifarch %arm aarch64
+%ifarch %arm aarch64 m68k
                TARGET=generic
 %endif
 %ifarch %ix86
@@ -108,11 +109,14 @@
 install -m 644 -p run/{password.lst,*.chr} %{buildroot}%johndir/
 install -m 644 -p run/john.conf %{buildroot}%{_sysconfdir}/
 install -m 755 -p run/mailer %{buildroot}%{_bindir}/
-install -m 644 -p %{SOURCE2} %{buildroot}%{_mandir}/man8/
 # handle documentation - makes rpmlint happy
 mkdir -p %{buildroot}%{_defaultdocdir}/%{name}
 cp doc/* %{buildroot}%{_defaultdocdir}/%{name}/
 rm %{buildroot}%{_defaultdocdir}/%{name}/INSTALL
+# install man pages
+install -m 644 -p %{SOURCE2} %{buildroot}%{_mandir}/man8/
+install -Dm644 %{SOURCE6} %{buildroot}%{_mandir}/man8/mailer.8
+install -Dm644 %{SOURCE7} %{buildroot}%{_mandir}/man8/relbench.8
 
 %clean
 rm -rf %{buildroot}
@@ -120,7 +124,9 @@
 %files
 %defattr(-,root,root)
 %doc %{_defaultdocdir}/%{name}/
-%doc %{_mandir}/man8/john.8.gz
+%doc %{_mandir}/man8/john.8*
+%doc %{_mandir}/man8/mailer.8*
+%doc %{_mandir}/man8/relbench.8*
 %{_bindir}/un*
 %{_bindir}/relbench
 %dir %{johndir}


++++++ mailer.8 ++++++
.TH mailer "8" "October 2013" "Lars Vogdt" "John"
.SH NAME
Mailer \- notify users about crackable passwords

.SH SYNOPSIS
.B mailer <password-file>
.br

.SH DESCRIPTION
.B mailer
is a script to send mail to all users whose passwords got cracked.
This is not always a good idea, though, since lots of people do not
check their e-mail or ignore such messages, and the messages can be a
hint for crackers.

You should probably deploy proactive password strength checking, such as
with passwdqc, before you ask users to change their passwords - whether
using this script or otherwise.  And you should edit the message inside
the script before possibly using it.

 Copyright (c) 1996-98 by Solar Designer
# Redistribution and use in source and binary forms, with or without
# modification, are permitted.
# There's ABSOLUTELY NO WARRANTY, express or implied.
# (This is a heavily cut-down "BSD license".)
#

.SH OPTIONS
.TP
\fBpassword-file\fR
The file containing all the passwords (for example /etc/shadow on modern 
Linux systems.
.SH FILES
.TP
.IP /usr/sbin/mailer
.SH AUTHOR
John the Ripper password cracker is free and Open Source software. 
Copyright (c) 1996-98 by Solar Designer.

This manual page was written by Lars Vogdt for the openSUSE operating system 
(but it may be freely used, modified, and redistributed by others).
++++++ relbench.8 ++++++
.TH relbench "8" "October 2013" "Lars Vogdt" "John"
.SH NAME
relbench \- John the Ripper benchmark output comparison tool

.SH SYNOPSIS
.B relbench <BENCHMARK-FILE-1> <BENCHMARK-FILE-2>
.br

.SH DESCRIPTION
.B relbench
is a Perl script to compare two "john --test" benchmark runs, such as for
different machines, "make" targets, C compilers, optimization options, or/and
versions of John the Ripper.

To use it, redirect the output of each "john --test" run to a file, then run the
script on the two files.  

Most values output by the script indicate relative performance seen on the
second benchmark run as compared to the first one, with the value of 1.0
indicating no change, values higher than 1.0 indicating speedup, and values
lower than 1.0 indicating slowdown.  Specifically, the script outputs the
minimum, maximum, median, and geometric mean for the speedup (or slowdown) seen
across the many individual benchmarks that "john --test" performs.  

It also outputs the median absolute deviation (relative to the median) and
geometric standard deviation (relative to the geometric mean).  Of these two, a
median absolute deviation of 0.0 would indicate that no deviation from the
median is prevalent, whereas a geometric standard deviation of 1.0 would
indicate that all benchmarks were sped up or slowed down by the exact same
ratio or their speed remained unchanged.  

In practice, these values will tend to deviate from 0.0 and 1.0, respectively.
.SH OPTIONS
.TP
\fBBENCHMARK-FILE-1\fR
File containing benchmark results from the first test run via \fBjohn 
\-\-test\fR.
.TP
\fBBENCHMARK-FILE-2\fR
File containing benchmark results from the second test run via \fBjohn 
\-\-test\fR.

.SH FILES
.TP
.IP /usr/sbin/relbench
.SH AUTHOR
John the Ripper password cracker is free and Open Source software. 
Copyright (c) 2011 by Solar Designer.

This manual page was written by Lars Vogdt for the openSUSE operating system 
(but it may be freely used, modified, and redistributed by others).
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to