Your message dated Tue, 17 Aug 2004 08:32:42 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#260184: fixed in netkit-telnet-ssl 0.17.24+0.1-3 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 19 Jul 2004 08:43:55 +0000 >From [EMAIL PROTECTED] Mon Jul 19 01:43:55 2004 Return-path: <[EMAIL PROTECTED]> Received: from mailgate1.verwaltung.uni-mainz.de (patty.verwaltung.uni-mainz.de) [134.93.144.165] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BmTkZ-0008SA-00; Mon, 19 Jul 2004 01:43:55 -0700 Received: from harriet.verwaltung.uni-mainz.de ([EMAIL PROTECTED] [134.93.226.19]) by patty.verwaltung.uni-mainz.de (8.12.11/8.12.11/Debian-5) with ESMTP id i6J8hPcO008696 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NOT) for <[EMAIL PROTECTED]>; Mon, 19 Jul 2004 10:43:25 +0200 Received: from woodstock.verwaltung.uni-mainz.de (woodstock.verwaltung.uni-mainz.de [134.93.226.8]) by harriet.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) with ESMTP id i6J8hSXb007603 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL); Mon, 19 Jul 2004 10:43:28 +0200 Received: from woodstock.verwaltung.uni-mainz.de (localhost [127.0.0.1]) by woodstock.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) with ESMTP id i6J8hSkl013850 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL); Mon, 19 Jul 2004 10:43:28 +0200 Received: (from [EMAIL PROTECTED]) by woodstock.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) id i6J8hSxq013848; Mon, 19 Jul 2004 10:43:28 +0200 Message-Id: <[EMAIL PROTECTED]> Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Christoph Martin <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: RFA: netkit-telnet-ssl -- The telnet server with SSL encryption support. X-Mailer: reportbug 2.63 Date: Mon, 19 Jul 2004 10:43:28 +0200 X-Virus-Scanned-From: mailgate1.verwaltung.uni-mainz.de X-Spam-Scanned-From: mailgate1.verwaltung.uni-mainz.de X-Scanned-By: MIMEDefang 2.41 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: wnpp Severity: normal I request an adopter for the netkit-telnet-ssl package. I don't have the time to maintain this package properly. The package description is: The in.telnetd program is a server which supports the DARPA telnet interactive communication protocol. . SSL telnet(d) replaces normal telnet(d) using SSL authentication and encryption. It interoperates with normal telnet(d) in both directions. It checks if the other side is also talking SSL, if not it falls back to normal telnet protocol. . Advantages over normal telnet(d): Your passwords and the data you send will not go in cleartext over the line. Nobody can get it with tcpdump or similar tools. With SSLtelnet you can also connect to https-server like https://www.netscape.com. Just do 'telnet www.netscape.com 443' -- System Information: Debian Release: 3.0 APT prefers testing APT policy: (99, 'testing'), (50, 'unstable'), (20, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.4.26 Locale: LANG=de_DE, LC_CTYPE=de_DE --------------------------------------- Received: (at 260184-close) by bugs.debian.org; 17 Aug 2004 12:35:29 +0000 >From [EMAIL PROTECTED] Tue Aug 17 05:35:29 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Bx3BZ-0008U0-00; Tue, 17 Aug 2004 05:35:29 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1Bx38s-0008OL-00; Tue, 17 Aug 2004 08:32:42 -0400 From: Ian Beckwith <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.51 $ Subject: Bug#260184: fixed in netkit-telnet-ssl 0.17.24+0.1-3 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 17 Aug 2004 08:32:42 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Source: netkit-telnet-ssl Source-Version: 0.17.24+0.1-3 We believe that the bug you reported is fixed in the latest version of netkit-telnet-ssl, which is due to be installed in the Debian FTP archive: netkit-telnet-ssl_0.17.24+0.1-3.diff.gz to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-3.diff.gz netkit-telnet-ssl_0.17.24+0.1-3.dsc to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-3.dsc telnet-ssl_0.17.24+0.1-3_i386.deb to pool/main/n/netkit-telnet-ssl/telnet-ssl_0.17.24+0.1-3_i386.deb telnetd-ssl_0.17.24+0.1-3_i386.deb to pool/main/n/netkit-telnet-ssl/telnetd-ssl_0.17.24+0.1-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ian Beckwith <[EMAIL PROTECTED]> (supplier of updated netkit-telnet-ssl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 15 Aug 2004 16:48:32 +0100 Source: netkit-telnet-ssl Binary: telnet-ssl telnetd-ssl Architecture: source i386 Version: 0.17.24+0.1-3 Distribution: unstable Urgency: low Maintainer: Ian Beckwith <[EMAIL PROTECTED]> Changed-By: Ian Beckwith <[EMAIL PROTECTED]> Description: telnet-ssl - The telnet client with SSL encryption support telnetd-ssl - The telnet server with SSL encryption support Closes: 260184 Changes: netkit-telnet-ssl (0.17.24+0.1-3) unstable; urgency=low . * New Maintainer (Closes: #260184) * telnet/commands.cc: Apply Josh Martin's patch to fix buffer overflow when $HOME is too big. * telnetd/issue.net.5: escaped hyphen. Files: 971729cf0b94dc3ffea16b3364d4988f 645 net standard netkit-telnet-ssl_0.17.24+0.1-3.dsc fdc59de2ecd01c920186b7625cc9ac79 9675 net standard netkit-telnet-ssl_0.17.24+0.1-3.diff.gz 78e4dc928978821232a8eb73691c23f1 79258 net standard telnet-ssl_0.17.24+0.1-3_i386.deb 3f39a666ce7c0158e3865ae40d85ad4d 49648 net optional telnetd-ssl_0.17.24+0.1-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBIfk9geVih7XOVJcRAiT2AJ9EIM2EseCxbJdSH5L+FLOMy0tFmQCfXFR5 9ZWpDErPuVDRKrYXpEFzTp8= =Znyv -----END PGP SIGNATURE-----