Your message dated Fri, 05 Aug 2005 14:58:48 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#245825: fixed in newpki-server 2.0.0+beta4-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 25 Apr 2004 16:11:25 +0000 >From [EMAIL PROTECTED] Sun Apr 25 09:11:25 2004 Return-path: <[EMAIL PROTECTED]> Received: from l01v-48-183.d1.club-internet.fr (moz-laptop) [212.194.91.183] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BHmE0-0004Mq-00; Sun, 25 Apr 2004 09:11:25 -0700 Received: from moz by moz-laptop with local (Exim 3.36 #1 (Debian)) id 1BHm4S-0007hf-00; Sun, 25 Apr 2004 18:01:32 +0200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Thomas <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: ITP: newpki-server -- PKI based on the OpenSSL low-level API (server package) X-Mailer: reportbug 2.58 Date: Sun, 25 Apr 2004 18:01:31 +0200 X-Debbugs-Cc: debian-devel@lists.debian.org Message-Id: <[EMAIL PROTECTED]> Sender: Thomas <[EMAIL PROTECTED]> X-BadReturnPath: [EMAIL PROTECTED] rewritten as [EMAIL PROTECTED] using "From" header Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-10.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 1 Package: wnpp Severity: wishlist * Package name : newpki-server Version : 2.0.0-beta3 Upstream Author : Frederic Giudicelli * URL : http://www.newpki.org/ * License : GPL Description : PKI based on the OpenSSL low-level API (server package) Public Key Infrastructure (PKI) are designed to manage certificates on a long term. All the data are handled through a MySQL database, which provides a much more flexible PKI than with OpenSSL, such as seeking a certificate with a search engine. . The actual version is able to handle multiple Certificate Authorities in one server, to publish a certificate request from a Certificate Signing Request, to certify a request, to revoke a certificate and to manage one or more Certificate Revocation Lists. It also able to search for the waiting requests or certificates, to respond to OCSP requests and to seek in and publish to LDAP Directory. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.4.24 Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 --------------------------------------- Received: (at 245825-close) by bugs.debian.org; 5 Aug 2005 22:00:34 +0000 >From [EMAIL PROTECTED] Fri Aug 05 15:00:33 2005 Return-path: <[EMAIL PROTECTED]> Received: from joerg by spohr.debian.org with local (Exim 3.36 1 (Debian)) id 1E1ADI-0003n6-00; Fri, 05 Aug 2005 14:58:48 -0700 From: Pierre Chifflier <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.30 $ Subject: Bug#245825: fixed in newpki-server 2.0.0+beta4-1 Message-Id: <[EMAIL PROTECTED]> Sender: Joerg Jaspert <[EMAIL PROTECTED]> Date: Fri, 05 Aug 2005 14:58:48 -0700 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: newpki-server Source-Version: 2.0.0+beta4-1 We believe that the bug you reported is fixed in the latest version of newpki-server, which is due to be installed in the Debian FTP archive: newpki-server_2.0.0+beta4-1.diff.gz to pool/main/n/newpki-server/newpki-server_2.0.0+beta4-1.diff.gz newpki-server_2.0.0+beta4-1.dsc to pool/main/n/newpki-server/newpki-server_2.0.0+beta4-1.dsc newpki-server_2.0.0+beta4-1_i386.deb to pool/main/n/newpki-server/newpki-server_2.0.0+beta4-1_i386.deb newpki-server_2.0.0+beta4.orig.tar.gz to pool/main/n/newpki-server/newpki-server_2.0.0+beta4.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Pierre Chifflier <[EMAIL PROTECTED]> (supplier of updated newpki-server package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 9 Jun 2005 11:23:43 +0200 Source: newpki-server Binary: newpki-server Architecture: source i386 Version: 2.0.0+beta4-1 Distribution: unstable Urgency: low Maintainer: Pierre Chifflier <[EMAIL PROTECTED]> Changed-By: Pierre Chifflier <[EMAIL PROTECTED]> Description: newpki-server - PKI based on the OpenSSL low-level API (server package) Closes: 245825 Changes: newpki-server (2.0.0+beta4-1) unstable; urgency=low . * Initial Release (Closes: #245825) Files: d820a6f21abd8fb42090631e9dc1c72d 669 net optional newpki-server_2.0.0+beta4-1.dsc dd4d1f3602261bc86ba72b78648ec647 686378 net optional newpki-server_2.0.0+beta4.orig.tar.gz 5a1d8bd19995d815d4534e7b3146b5dd 14250 net optional newpki-server_2.0.0+beta4-1.diff.gz f1ba20192f52dbcb34ccdb618c99a61e 346022 net optional newpki-server_2.0.0+beta4-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD4DBQFC7Wl3w3ao2vG823MRAsGMAJixo7ueDARAa/Fhh+iAWCRXBMZHAJ9Goq1n AnNXgeR/ZvjeN9ODwVtryA== =MlfU -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]