Hello community, here is the log from the commit of package john for openSUSE:Factory checked in at 2013-10-30 15:37:36 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/john (Old) and /work/SRC/openSUSE:Factory/.john.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "john" Changes: -------- --- /work/SRC/openSUSE:Factory/john/john.changes 2013-03-20 09:52:49.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.john.new/john.changes 2013-10-30 15:37:38.000000000 +0100 @@ -1,0 +2,31 @@ +Mon Oct 28 13:23:53 UTC 2013 - sch...@suse.de + +- Use the generic target for m68k + +------------------------------------------------------------------- +Wed Oct 9 16:00:16 UTC 2013 - l...@linux-schulserver.de + +- update to 1.8.0: + + Revised the incremental mode to let the current character counts + grow for each character position independently, with the aim to + improve efficiency in terms of successful guesses per candidate + passwords tested. + + Revised the pre-defined incremental modes, as well as external + mode filters that are used to generate .chr files. + + Added makechr, a script to (re-)generate .chr files. + + Enhanced the status reporting to include four distinct speed + metrics (g/s, p/s, c/s, and C/s). + + Added the "--fork=N" and "--node=MIN[-MAX]/TOTAL" options for + trivial parallel and distributed processing. + + In the external mode compiler, treat character literals as unsigned. + + Renamed many of the formats. + + Updated the documentation. + + Relaxed the license for many source files to cut-down BSD. + + Relaxed the license for John the Ripper as a whole from GPLv2 + (exact version) to GPLv2 or newer with optional OpenSSL and + unRAR exceptions. + + Assorted other changes have been made. +- add simple man pages for relbench and mailer scripts +- disable jumbo patch for now until a version for 1.8.0 is out + +------------------------------------------------------------------- Old: ---- john-1.7.9-jumbo-7.tar.bz2 john-1.7.9-jumbo-7.tar.bz2.sign john-1.7.9.tar.bz2 john-1.7.9.tar.bz2.sign New: ---- john-1.8.0.tar.xz john-1.8.0.tar.xz.sign john.keyring mailer.8 relbench.8 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ john.spec ++++++ --- /var/tmp/diff_new_pack.sOp4TL/_old 2013-10-30 15:37:41.000000000 +0100 +++ /var/tmp/diff_new_pack.sOp4TL/_new 2013-10-30 15:37:41.000000000 +0100 @@ -17,18 +17,21 @@ Name: john -Version: 1.7.9 +Version: 1.8.0 Release: 0 Summary: Detects Weak Passwords License: GPL-2.0+ Group: Productivity/Security Url: http://www.openwall.com/john/ -Source: http://www.openwall.com/john/g/%{name}-%{version}.tar.bz2 -Source1: http://www.openwall.com/john/g/%{name}-%{version}.tar.bz2.sign +Source: http://www.openwall.com/john/j/%{name}-%{version}.tar.xz +Source1: http://www.openwall.com/john/j/%{name}-%{version}.tar.xz.sign Source2: %{name}.8.gz Source3: %{name}-rpmlintrc -Source4: http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2 -Source5: http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2.sign +Source4: %{name}.keyring +# Source4: http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2 +# Source5: http://www.openwall.com/john/g/%{name}-%{version}-jumbo-7.tar.bz2.sign +Source6: mailer.8 +Source7: relbench.8 BuildRequires: openssl-devel BuildRoot: %{_tmppath}/%{name}-%{version}-build %define johndir /var/lib/john @@ -44,8 +47,6 @@ %prep %setup -q -# apply the jumbo patch -gzip -dc %{SOURCE4} | patch -p1 # adapt the configs perl -pi -e "s#Wordlist = (.*)#Wordlist = %{johndir}/password.lst#g" $RPM_BUILD_DIR/%{name}-%{version}/run/john.conf perl -pi -e 's#^(\#define JOHN_SYSTEMWIDE_EXEC)\s.+$#$1\t\"%{johndir}\"#g' $RPM_BUILD_DIR/%{name}-%{version}/src/params.h @@ -82,7 +83,7 @@ %ifarch x86_64 TARGET=linux-x86-64 %endif -%ifarch %arm aarch64 +%ifarch %arm aarch64 m68k TARGET=generic %endif %ifarch %ix86 @@ -108,11 +109,14 @@ install -m 644 -p run/{password.lst,*.chr} %{buildroot}%johndir/ install -m 644 -p run/john.conf %{buildroot}%{_sysconfdir}/ install -m 755 -p run/mailer %{buildroot}%{_bindir}/ -install -m 644 -p %{SOURCE2} %{buildroot}%{_mandir}/man8/ # handle documentation - makes rpmlint happy mkdir -p %{buildroot}%{_defaultdocdir}/%{name} cp doc/* %{buildroot}%{_defaultdocdir}/%{name}/ rm %{buildroot}%{_defaultdocdir}/%{name}/INSTALL +# install man pages +install -m 644 -p %{SOURCE2} %{buildroot}%{_mandir}/man8/ +install -Dm644 %{SOURCE6} %{buildroot}%{_mandir}/man8/mailer.8 +install -Dm644 %{SOURCE7} %{buildroot}%{_mandir}/man8/relbench.8 %clean rm -rf %{buildroot} @@ -120,7 +124,9 @@ %files %defattr(-,root,root) %doc %{_defaultdocdir}/%{name}/ -%doc %{_mandir}/man8/john.8.gz +%doc %{_mandir}/man8/john.8* +%doc %{_mandir}/man8/mailer.8* +%doc %{_mandir}/man8/relbench.8* %{_bindir}/un* %{_bindir}/relbench %dir %{johndir} ++++++ mailer.8 ++++++ .TH mailer "8" "October 2013" "Lars Vogdt" "John" .SH NAME Mailer \- notify users about crackable passwords .SH SYNOPSIS .B mailer <password-file> .br .SH DESCRIPTION .B mailer is a script to send mail to all users whose passwords got cracked. This is not always a good idea, though, since lots of people do not check their e-mail or ignore such messages, and the messages can be a hint for crackers. You should probably deploy proactive password strength checking, such as with passwdqc, before you ask users to change their passwords - whether using this script or otherwise. And you should edit the message inside the script before possibly using it. Copyright (c) 1996-98 by Solar Designer # Redistribution and use in source and binary forms, with or without # modification, are permitted. # There's ABSOLUTELY NO WARRANTY, express or implied. # (This is a heavily cut-down "BSD license".) # .SH OPTIONS .TP \fBpassword-file\fR The file containing all the passwords (for example /etc/shadow on modern Linux systems. .SH FILES .TP .IP /usr/sbin/mailer .SH AUTHOR John the Ripper password cracker is free and Open Source software. Copyright (c) 1996-98 by Solar Designer. This manual page was written by Lars Vogdt for the openSUSE operating system (but it may be freely used, modified, and redistributed by others). ++++++ relbench.8 ++++++ .TH relbench "8" "October 2013" "Lars Vogdt" "John" .SH NAME relbench \- John the Ripper benchmark output comparison tool .SH SYNOPSIS .B relbench <BENCHMARK-FILE-1> <BENCHMARK-FILE-2> .br .SH DESCRIPTION .B relbench is a Perl script to compare two "john --test" benchmark runs, such as for different machines, "make" targets, C compilers, optimization options, or/and versions of John the Ripper. To use it, redirect the output of each "john --test" run to a file, then run the script on the two files. Most values output by the script indicate relative performance seen on the second benchmark run as compared to the first one, with the value of 1.0 indicating no change, values higher than 1.0 indicating speedup, and values lower than 1.0 indicating slowdown. Specifically, the script outputs the minimum, maximum, median, and geometric mean for the speedup (or slowdown) seen across the many individual benchmarks that "john --test" performs. It also outputs the median absolute deviation (relative to the median) and geometric standard deviation (relative to the geometric mean). Of these two, a median absolute deviation of 0.0 would indicate that no deviation from the median is prevalent, whereas a geometric standard deviation of 1.0 would indicate that all benchmarks were sped up or slowed down by the exact same ratio or their speed remained unchanged. In practice, these values will tend to deviate from 0.0 and 1.0, respectively. .SH OPTIONS .TP \fBBENCHMARK-FILE-1\fR File containing benchmark results from the first test run via \fBjohn \-\-test\fR. .TP \fBBENCHMARK-FILE-2\fR File containing benchmark results from the second test run via \fBjohn \-\-test\fR. .SH FILES .TP .IP /usr/sbin/relbench .SH AUTHOR John the Ripper password cracker is free and Open Source software. Copyright (c) 2011 by Solar Designer. This manual page was written by Lars Vogdt for the openSUSE operating system (but it may be freely used, modified, and redistributed by others). -- To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org For additional commands, e-mail: opensuse-commit+h...@opensuse.org