-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 25 Sep 2015 19:19:53 +0200
Source: suricata
Binary: suricata
Architecture: source amd64
Version: 2.0.9-1
Distribution: unstable
Urgency: medium
Maintainer: Pierre Chifflier <pol...@debian.org>
Changed-By: Pierre Chifflier <pol...@debian.org>
Description:
 suricata   - Next Generation Intrusion Detection and Prevention Tool
Changes:
 suricata (2.0.9-1) unstable; urgency=medium
 .
   * Imported Upstream version 2.0.9
   * Update watch file
Checksums-Sha1:
 071ca46646d9dd52c48f899ce4e78df3fa170ced 1743 suricata_2.0.9-1.dsc
 825e8019533b95e5d2a0bd78c31f412446d225eb 3089593 suricata_2.0.9.orig.tar.gz
 6047e9c89310594c55225dadea656e3df9287a1d 8568 suricata_2.0.9-1.debian.tar.xz
 c4515c887622ce93a70e3fd0927dafe93a7d10c5 768482 suricata_2.0.9-1_amd64.deb
Checksums-Sha256:
 44a952b0f299b6137bae90f51b504325434cab67528e83a0f6cef5718baca8a1 1743 
suricata_2.0.9-1.dsc
 4a19214d7673f9c0eba2e4e5ac78152309464186d16df48944b8f5644faa802d 3089593 
suricata_2.0.9.orig.tar.gz
 0231cbfa637259920fcb6338011159f9bedbe0a852591146eca115441416c267 8568 
suricata_2.0.9-1.debian.tar.xz
 b0c79afd2f80a02979c2547f5ace5967475f8dec400e60f7f585cf55092b545e 768482 
suricata_2.0.9-1_amd64.deb
Files:
 ae20fc7454e1af39159ad82de55138fe 1743 net optional suricata_2.0.9-1.dsc
 cc0c32071c6b6733b13380ef276c5af5 3089593 net optional 
suricata_2.0.9.orig.tar.gz
 bd83485c7270c81d511a54bb078c64ac 8568 net optional 
suricata_2.0.9-1.debian.tar.xz
 26a98bb32a4142d8f65cbf341e400151 768482 net optional suricata_2.0.9-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJWBYMoAAoJEFqCeQfe0MQYOOgIALMpsTBL712QceZQeaqdW4U3
Lrwj0d2/kLI6f2rreTmFl36essJiZ98/TV/TWuOX4Xi8Yf6OvP/py6HhKz3fEtBv
B5232IYWxCkA0VVs0foJr/S42Ka0Bpfi0xRekA3AA8f0cNsUJGd63hZBov+rG/bv
ItFXpyn5YBlvFZETMIyA73R3YQ4EqXP3MYgERpyKa6yc0le5U0THCmhhzhk6DQyG
u1uXM+WBgrbi/q/OKOGhtWpy84moLCCxdbEqZvR6MDosFHkR/JX/plojRoJTiqPY
Y6L4LGEPcjmoRQAgJfegUnG7TC9TUwuHMz5ai6H3o+lq1HLMANV4hkVMQWTwBZE=
=Xyd3
-----END PGP SIGNATURE-----

Reply via email to