Your message dated Tue, 17 Aug 2004 08:32:42 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#260184: fixed in netkit-telnet-ssl 0.17.24+0.1-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 19 Jul 2004 08:43:15 +0000
>From [EMAIL PROTECTED] Mon Jul 19 01:43:15 2004
Return-path: <[EMAIL PROTECTED]>
Received: from mailgate1.verwaltung.uni-mainz.de 
(patty.verwaltung.uni-mainz.de) [134.93.144.165] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BmTju-0008Im-00; Mon, 19 Jul 2004 01:43:14 -0700
Received: from harriet.verwaltung.uni-mainz.de ([EMAIL PROTECTED] 
[134.93.226.19])
        by patty.verwaltung.uni-mainz.de (8.12.11/8.12.11/Debian-5) with ESMTP 
id i6J8grlV008630
        (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NOT)
        for <[EMAIL PROTECTED]>; Mon, 19 Jul 2004 10:42:53 +0200
Received: from woodstock.verwaltung.uni-mainz.de 
(woodstock.verwaltung.uni-mainz.de [134.93.226.8])
        by harriet.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) with 
ESMTP id i6J8guXb007534
        (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL);
        Mon, 19 Jul 2004 10:42:57 +0200
Received: from woodstock.verwaltung.uni-mainz.de (localhost [127.0.0.1])
        by woodstock.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) with 
ESMTP id i6J8gukl013830
        (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL);
        Mon, 19 Jul 2004 10:42:56 +0200
Received: (from [EMAIL PROTECTED])
        by woodstock.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) id 
i6J8gulZ013828;
        Mon, 19 Jul 2004 10:42:56 +0200
Message-Id: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Christoph Martin  <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: RFA: netkit-telnet-ssl -- The telnet client with SSL encryption 
support.
X-Mailer: reportbug 2.63
Date: Mon, 19 Jul 2004 10:42:56 +0200
X-Virus-Scanned-From: mailgate1.verwaltung.uni-mainz.de
X-Spam-Scanned-From: mailgate1.verwaltung.uni-mainz.de
X-Scanned-By: MIMEDefang 2.41
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: wnpp
Severity: normal


I request an adopter for the netkit-telnet-ssl package.
I don't have the time to maintain this package properly.

The package description is:
 The telnet command is used for interactive communication with another host
 using the TELNET protocol.
 .
 SSL telnet(d) replaces normal telnet(d) using SSL authentication and
 encryption. It interoperates with normal telnet(d) in both directions.
 It checks if the other side is also talking SSL, if not it falls back
 to normal telnet protocol.
 .
 Advantages over normal telnet(d): Your passwords and the data you send
 will not go in cleartext over the line. Nobody can get it with
 tcpdump or similar tools. With SSLtelnet you can also connect to
 https-server like https://www.netscape.com. Just do
 'telnet www.netscape.com 443'

-- System Information:
Debian Release: 3.0
  APT prefers testing
  APT policy: (99, 'testing'), (50, 'unstable'), (20, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.26
Locale: LANG=de_DE, LC_CTYPE=de_DE

---------------------------------------
Received: (at 260184-close) by bugs.debian.org; 17 Aug 2004 12:35:29 +0000
>From [EMAIL PROTECTED] Tue Aug 17 05:35:29 2004
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Bx3BZ-0008U0-00; Tue, 17 Aug 2004 05:35:29 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1Bx38s-0008OL-00; Tue, 17 Aug 2004 08:32:42 -0400
From: Ian Beckwith <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.51 $
Subject: Bug#260184: fixed in netkit-telnet-ssl 0.17.24+0.1-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 17 Aug 2004 08:32:42 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Source: netkit-telnet-ssl
Source-Version: 0.17.24+0.1-3

We believe that the bug you reported is fixed in the latest version of
netkit-telnet-ssl, which is due to be installed in the Debian FTP archive:

netkit-telnet-ssl_0.17.24+0.1-3.diff.gz
  to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-3.diff.gz
netkit-telnet-ssl_0.17.24+0.1-3.dsc
  to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-3.dsc
telnet-ssl_0.17.24+0.1-3_i386.deb
  to pool/main/n/netkit-telnet-ssl/telnet-ssl_0.17.24+0.1-3_i386.deb
telnetd-ssl_0.17.24+0.1-3_i386.deb
  to pool/main/n/netkit-telnet-ssl/telnetd-ssl_0.17.24+0.1-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ian Beckwith <[EMAIL PROTECTED]> (supplier of updated netkit-telnet-ssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 15 Aug 2004 16:48:32 +0100
Source: netkit-telnet-ssl
Binary: telnet-ssl telnetd-ssl
Architecture: source i386
Version: 0.17.24+0.1-3
Distribution: unstable
Urgency: low
Maintainer: Ian Beckwith <[EMAIL PROTECTED]>
Changed-By: Ian Beckwith <[EMAIL PROTECTED]>
Description: 
 telnet-ssl - The telnet client with SSL encryption support
 telnetd-ssl - The telnet server with SSL encryption support
Closes: 260184
Changes: 
 netkit-telnet-ssl (0.17.24+0.1-3) unstable; urgency=low
 .
   * New Maintainer (Closes: #260184)
   * telnet/commands.cc: Apply Josh Martin's patch to fix
     buffer overflow when $HOME is too big.
   * telnetd/issue.net.5: escaped hyphen.
Files: 
 971729cf0b94dc3ffea16b3364d4988f 645 net standard 
netkit-telnet-ssl_0.17.24+0.1-3.dsc
 fdc59de2ecd01c920186b7625cc9ac79 9675 net standard 
netkit-telnet-ssl_0.17.24+0.1-3.diff.gz
 78e4dc928978821232a8eb73691c23f1 79258 net standard 
telnet-ssl_0.17.24+0.1-3_i386.deb
 3f39a666ce7c0158e3865ae40d85ad4d 49648 net optional 
telnetd-ssl_0.17.24+0.1-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBIfk9geVih7XOVJcRAiT2AJ9EIM2EseCxbJdSH5L+FLOMy0tFmQCfXFR5
9ZWpDErPuVDRKrYXpEFzTp8=
=Znyv
-----END PGP SIGNATURE-----

Reply via email to