Your message dated Tue, 01 May 2007 06:17:03 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#390918: fixed in lynx 2.8.6-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: lynx Version: 2.8.5-2sarge2 Trying to use -traversal to discover broken links, lynx gets stuck on an invalid link, returns "Can't access" and tries again ad infinitum. I have the following test html installed on a home page: <html> <head> <META HTTP-EQUIV=REFRESH CONTENT="15"> <META HTTP-EQUIV="Expires" CONTENT="Tue, 01 Jan 1980 1:00:00 GMT"> <META HTTP-EQUIV="Pragma" CONTENT="no-cache"> <META NAME="KEYWORDS" CONTENT="Sixerjman Web Cam"> <META NAME="DESCRIPTION" CONTENT="Sixerjman Web Cam"> <title>Sixerjman TV TV Cam Yo!</title> </head> <body bgcolor="white"> <center> <font face="Arial,Helvetica,Verdana" size=-1> <h1>Sixerjman TV Yo!</h1> <h2>Sixerjman TV (SJTV) Network</h2><p><br> <img src="webcam.jpg" border=1 width=320 height=240 alt="My WebCam Image"><br> <font size=-2>This image will autoreload every 15 seconds.<br> Please DO NOT hit RELOAD on your browser.</font> <p><br><br><br> <h3> Sixerjman Logitech Webcam Express </h3> <p><br><br><br> <hr width=225> <font size=-2>Base Template courtesy of <b><i><a href="http://webcamworld.com/" target="_top">WebCam World</a></i></b>. <a href="http://pages.cthome.net/brazziel/bogus.html">Bogus Link</a> </font><p><br> </font> </center> </body> </html> To recreate, enter: lynx -traversal http://pages.cthome.net/brazziel This command never ends, has to be terminated with Control-C.
--- End Message ---
--- Begin Message ---Source: lynx Source-Version: 2.8.6-1 We believe that the bug you reported is fixed in the latest version of lynx, which is due to be installed in the Debian FTP archive: lynx_2.8.6-1.diff.gz to pool/main/l/lynx/lynx_2.8.6-1.diff.gz lynx_2.8.6-1.dsc to pool/main/l/lynx/lynx_2.8.6-1.dsc lynx_2.8.6-1_amd64.deb to pool/main/l/lynx/lynx_2.8.6-1_amd64.deb lynx_2.8.6.orig.tar.gz to pool/main/l/lynx/lynx_2.8.6.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Zephaniah E. Hull <[EMAIL PROTECTED]> (supplier of updated lynx package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 01 May 2007 01:43:17 -0400 Source: lynx Binary: lynx Architecture: source amd64 Version: 2.8.6-1 Distribution: unstable Urgency: low Maintainer: Zephaniah E. Hull <[EMAIL PROTECTED]> Changed-By: Zephaniah E. Hull <[EMAIL PROTECTED]> Description: lynx - Text-mode WWW Browser Closes: 40435 67184 99400 120451 121520 132674 137480 141158 147287 152810 157088 171312 184482 188415 193205 204994 240237 244871 248092 252915 254515 265031 268264 271048 304989 313789 315853 318034 325478 343049 344275 374388 390918 Changes: lynx (2.8.6-1) unstable; urgency=low . * Hijack the package. I might not be great at it, but I do use it daily. * New upstream release. Closes: #254515, #137480, #67184, #99400, #132674, #141158, #40435, #120451, #157088, #204994, #244871, #248092, #268264, #271048, #318034, #343049, #390918, #240237, #313789, #171312, #193205, #252915, #265031, #121520, #152810, #188415, #344275, #374388, #184482, #315853 * Uses the new upstream defaults. Closes: #325478, #147287. * Update 01_default-config.dpatch. (Offset changes only.) * Update 02_default-key-bindings.dpatch. (Upstream formatting changes.) * Kill 03_newer_gnutls.dpatch entirely. This was fixed upstream. But this is also a GPL violation as we only ship the patch to configure, and not to configure.in, the source file. * Kill 04_CVE-2004-1617.dpatch. (Merged into upstream.) * Disable 05_FTBFS_on_GNUHurd_and_GNUkBSD (Upstream changes, file new bug if we FTBFS again.) * Removed configure arguments: --enable-8bit-toupper - Removed, no longer exists. --enable-persistent-cookies - Enabled by default. --enable-prettysrc - Enabled by default. --enable-source-cache - Enabled by default. --enable-read-eta - Enabled by default. * Added configure arguments: --enable-nsl-fork - fork NSL requests, allowing them to be aborted --enable-justify-elts - use element-justification logic * Update the contents and location of lynx.desktop. Closes: 304989. * Other things will be handled by later uploads, patches welcome. Files: 5f2a3005f67b144c6093ae875957d5fe 605 web optional lynx_2.8.6-1.dsc 2158041a3fdb5d094831da2c82cfcaba 3195728 web optional lynx_2.8.6.orig.tar.gz 24699d4e88618f94d9dd2b3e88ca41ef 15521 web optional lynx_2.8.6-1.diff.gz e44c39690127312aa16149da5356ce4b 2010044 web optional lynx_2.8.6-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGNtYKRFMAi+ZaeAERAn6nAJ0SiaGd5zI4mt+sknbcH7M2/GWA1gCg2otr gDdwPYjAsyQXG/udwapEPGA= =6Lmp -----END PGP SIGNATURE-----
--- End Message ---

