Your message dated Tue, 17 May 2005 00:02:04 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#225280: fixed in stone 2.2e-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 28 Dec 2003 11:11:41 +0000 >From [EMAIL PROTECTED] Sun Dec 28 05:11:40 2003 Return-path: <[EMAIL PROTECTED]> Received: from 204.57.138.210.xn.2iij.net (mebius) [210.138.57.204] by master.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1AaXYC-0006i1-00; Sun, 28 Dec 2003 03:49:32 -0600 Received: by mebius (Postfix, from userid 1000) id 944DC4489; Sun, 28 Dec 2003 18:49:15 +0900 (JST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Hideki Yamane <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: stone 2.2 fails to connect X-Mailer: reportbug 2.37 Date: Sun, 28 Dec 2003 18:49:15 +0900 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-master.debian.org_2003_11_25-bugs.debian.org_2003_12_15 (1.212-2003-09-23-exp) on master.debian.org X-Spam-Status: No, hits=-5.0 required=4.0 tests=HAS_PACKAGE autolearn=no version=2.60-master.debian.org_2003_11_25-bugs.debian.org_2003_12_15 X-Spam-Level: Package: stone Version: 2.2-1 Severity: normal Tags: sid Dear stone maintainer, thanks for close privious BTS. but there is some probles... ssh connection via stone would fail. for example, $ stone 192.168.0.1:22 192.168.0.1:10000 & $ ssh -vv -p 10000 192.168.0.1 and stone 2.2 fails to connect via ssh. (stone 2.1 in stable and privious version in sid is OK) ---------------------------------------------------------------------------------- OpenSSH_3.6.1p2 Debian 1:3.6.1p2-10, SSH protocols 1.5/2.0, OpenSSL 0x0090703f debug1: Reading configuration data /etc/ssh/ssh_config debug1: Rhosts Authentication disabled, originating port will not be trusted. <snip> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY Read from socket failed: Connection reset by peer debug1: Calling cleanup 0x80623c0(0x0) ---------------------------------------------------------------------------------- -- System Information: Debian Release: testing/unstable Architecture: i386 Kernel: Linux mebius.ma-aya.to 2.4.22 #1 Tue Oct 14 04:04:50 JST 2003 i686 Locale: LANG=C, LC_CTYPE=C Versions of packages stone depends on: ii libc6 2.3.2.ds1-10 GNU C Library: Shared libraries an ii libssl0.9.7 0.9.7c-5 SSL shared libraries ii openssl 0.9.7c-5 Secure Socket Layer (SSL) binary a -- no debconf information --------------------------------------- Received: (at 225280-close) by bugs.debian.org; 17 May 2005 04:11:43 +0000 >From [EMAIL PROTECTED] Mon May 16 21:11:43 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DXtQl-0004mE-00; Mon, 16 May 2005 21:11:43 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DXtHQ-0007n6-00; Tue, 17 May 2005 00:02:04 -0400 From: Takuo KITAME <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#225280: fixed in stone 2.2e-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 17 May 2005 00:02:04 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: stone Source-Version: 2.2e-1 We believe that the bug you reported is fixed in the latest version of stone, which is due to be installed in the Debian FTP archive: stone_2.2e-1.diff.gz to pool/main/s/stone/stone_2.2e-1.diff.gz stone_2.2e-1.dsc to pool/main/s/stone/stone_2.2e-1.dsc stone_2.2e-1_i386.deb to pool/main/s/stone/stone_2.2e-1_i386.deb stone_2.2e.orig.tar.gz to pool/main/s/stone/stone_2.2e.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Takuo KITAME <[EMAIL PROTECTED]> (supplier of updated stone package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 17 May 2005 12:47:47 +0900 Source: stone Binary: stone Architecture: source i386 Version: 2.2e-1 Distribution: unstable Urgency: low Maintainer: Takuo KITAME <[EMAIL PROTECTED]> Changed-By: Takuo KITAME <[EMAIL PROTECTED]> Description: stone - TCP/IP packet repeater in the application layer. Closes: 225280 Changes: stone (2.2e-1) unstable; urgency=low . * New upstream release (closes: #225280) Files: 9d288aa83e1b1c8e9cc529e06f36fa0f 560 net optional stone_2.2e-1.dsc d99d56b105c45df928582df7220fed91 71977 net optional stone_2.2e.orig.tar.gz 5f7a91171e966259fe709676f3112eb6 2730 net optional stone_2.2e-1.diff.gz 8db346333655e26f40be5b742748b2b7 55984 net optional stone_2.2e-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCiWmiU+WZW1FVMwoRAhQXAJoCiX5DWqbklVT9TkosT8SZaUeOGwCdHwxH 0EDGHrH3d02pBZwIAthEewA= =ugJ8 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]