Your message dated Wed, 23 Mar 2005 15:51:21 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#281222: fixed in xrsh 5.92-3 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 14 Nov 2004 16:01:31 +0000 >From [EMAIL PROTECTED] Sun Nov 14 08:01:30 2004 Return-path: <[EMAIL PROTECTED]> Received: from mailout01.sul.t-online.com [194.25.134.80] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CTMok-0005yy-00; Sun, 14 Nov 2004 08:01:30 -0800 Received: from sfwd01.aul.t-online.de by mailout01.sul.t-online.com with smtp id 1CTMoi-0004hO-00; Sun, 14 Nov 2004 17:01:28 +0100 Received: from [192.168.1.10] ([EMAIL PROTECTED]) by sfwd01.sul.t-online.de with esmtp id 1CTMof-0WYMym0; Sun, 14 Nov 2004 17:01:25 +0100 Message-ID: <[EMAIL PROTECTED]> Date: Sun, 14 Nov 2004 17:01:23 +0100 From: "Harald Dunkel" <[EMAIL PROTECTED]> User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.3) Gecko/20041007 Debian/1.7.3-5 X-Accept-Language: en MIME-Version: 1.0 To: [EMAIL PROTECTED] CC: Jeff Bailey <[EMAIL PROTECTED]> Subject: ITP: xrsh -- remote execution of XWindow programs X-Enigmail-Version: 0.86.1.0 X-Enigmail-Supports: pgp-inline, pgp-mime Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-ID: SgHOOqZ-gePDyHsZ49Kuqazj9MAuVNTsyrQKslMf9LAyyBnwQ5N3UV X-TOI-MSGID: 50fe5d6c-a323-4e85-ad76-f1d0ce893a69 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Package: wnpp Severity: ITP Xrsh is designed to allow you to start an X client on a remote machine with the window displayed on the current server's $DISPLAY. It has many options that give you the ability to propagate environment variables (including DISPLAY) to the remote system and works with various types of X server access control including xauth and xhost. Xrlogin opens a local xterm window and runs rlogin or telnet to connect to a remote machine. See http://bugs.debian.org/100737 I had opened about 3 years ago. Surely xrsh is unchanged for several years. It is pretty stable. Regards Harri -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) Comment: Using GnuPG with Debian - http://enigmail.mozdev.org iD8DBQFBl4FTUTlbRTxpHjcRAmGnAJ96jONzD+A/xfcZtDBfxweYNszAPQCfQabD SMiFDGFJp04iVuwhEMK9WFc= =Xcae -----END PGP SIGNATURE----- --------------------------------------- Received: (at 281222-close) by bugs.debian.org; 23 Mar 2005 21:03:41 +0000 >From [EMAIL PROTECTED] Wed Mar 23 13:03:41 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DED0u-00082E-00; Wed, 23 Mar 2005 13:03:40 -0800 Received: from joerg by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DECoz-0003uZ-00; Wed, 23 Mar 2005 15:51:21 -0500 From: Harald Dunkel <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.30 $ Subject: Bug#281222: fixed in xrsh 5.92-3 Message-Id: <[EMAIL PROTECTED]> Sender: Joerg Jaspert <[EMAIL PROTECTED]> Date: Wed, 23 Mar 2005 15:51:21 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: xrsh Source-Version: 5.92-3 We believe that the bug you reported is fixed in the latest version of xrsh, which is due to be installed in the Debian FTP archive: xrsh_5.92-3.diff.gz to pool/main/x/xrsh/xrsh_5.92-3.diff.gz xrsh_5.92-3.dsc to pool/main/x/xrsh/xrsh_5.92-3.dsc xrsh_5.92-3_all.deb to pool/main/x/xrsh/xrsh_5.92-3_all.deb xrsh_5.92.orig.tar.gz to pool/main/x/xrsh/xrsh_5.92.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Harald Dunkel <[EMAIL PROTECTED]> (supplier of updated xrsh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sat, 27 Nov 2004 14:04:37 +0100 Source: xrsh Binary: xrsh Architecture: source all Version: 5.92-3 Distribution: unstable Urgency: low Maintainer: Harald Dunkel <[EMAIL PROTECTED]> Changed-By: Harald Dunkel <[EMAIL PROTECTED]> Description: xrsh - remote execution of XWindow programs Closes: 281222 Changes: xrsh (5.92-3) unstable; urgency=low . * Fix dependency in control * Close ITP (Closes: #281222) Files: 22a1e7ded72dcefda69d9d64e19fad87 553 x11 optional xrsh_5.92-3.dsc ab63d8c5a7cc05a28ac0a0fdfa93186f 13614 x11 optional xrsh_5.92.orig.tar.gz d72c8fda0c897147cda6654757c7ffb6 1962 x11 optional xrsh_5.92-3.diff.gz 3ebfeba6a4c80de3eb94aa90d4b48c6d 18458 x11 optional xrsh_5.92-3_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFB41oB5M5hmdCYCpkRAn9jAJsH9P92iFcXG/ShnWkhffwk308RLQCgv2Ux eC01BbI4omMv7k0NhZ8hpIU= =HYE6 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]