Your message dated Wed, 14 Sep 2005 21:55:01 -0500 (CDT) with message-id <[EMAIL PROTECTED]> and subject line WNPP bug closed has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 20 Feb 2001 20:38:12 +0000 >From [EMAIL PROTECTED] Tue Feb 20 14:38:11 2001 Return-path: <[EMAIL PROTECTED]> Received: from static204-83-206-163.reverse.accesscomm.ca (trick.fig.org) [::ffff:204.83.206.163] by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 14VJY2-0004Q6-00; Tue, 20 Feb 2001 14:38:11 -0600 Received: from ip216-174-147-19.evenfaster.accesscomm.ca (faust.FIG) [216.174.147.19] by trick.fig.org with esmtp (Exim 2.05 #1 (Debian)) id 14VJXv-00084G-00; Tue, 20 Feb 2001 14:38:04 -0600 Received: from gord by faust.FIG with local (Exim 3.12 #1 (Debian)) id 14VJWp-0007VA-00; Tue, 20 Feb 2001 14:36:55 -0600 To: [EMAIL PROTECTED] Subject: ITP: srp X-Attribution: Gord From: Gordon Matzigkeit <[EMAIL PROTECTED]> Date: 20 Feb 2001 14:36:52 -0600 Message-ID: <[EMAIL PROTECTED]> Lines: 64 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Delivered-To: [EMAIL PROTECTED] Package: wnpp Severity: wishlist Version: n/a SRP stands for the Secure Remote Password protocol, which is a secure password-based authentication and key-exchange mechanism that can be used to establish session security and mutual authentication over untrusted networks without requiring an external public-key infrastructure or trusted third parties. The SRP distribution consists of a fully- featured, portable library that implements SRP-based secure password authentication as well as implementations of popular applications and services like Telnet and FTP with support for transport security and SRP. These password-based applications leverage the strength of the SRP authentication mechanism to offer fairly good protection against both passive and active network attacks, which is an improvement over most existing password-only techniques. It's license is X11ish with an advertising clause: /* * Copyright (c) 1997-2001 The Stanford SRP Authentication Project * All Rights Reserved. * * Permission is hereby granted, free of charge, to any person obtaining * a copy of this software and associated documentation files (the * "Software"), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so, subject to * the following conditions: * * The above copyright notice and this permission notice shall be * included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. * * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL, * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. * * In addition, the following conditions apply: * * 1. Any software that incorporates the SRP authentication technology * must display the following acknowlegment: * "This product uses the 'Secure Remote Password' cryptographic * authentication system developed by Tom Wu ([EMAIL PROTECTED])." * * 2. Any software that incorporates all or part of the SRP distribution * itself must also display the following acknowledgment: * "This product includes software developed by Tom Wu and Eugene * Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)." * * 3. Redistributions in source or binary form must retain an intact copy * of this copyright notice and list of conditions. */ -- Gordon Matzigkeit <[EMAIL PROTECTED]> //\ I'm a FIG (http://fig.org/) Committed to diversity and freedom \// Try Emacs (http://fig.org/gnu/emacs/) --------------------------------------- Received: (at 86779-done) by bugs.debian.org; 15 Sep 2005 02:55:08 +0000 >From [EMAIL PROTECTED] Wed Sep 14 19:55:07 2005 Return-path: <[EMAIL PROTECTED]> Received: from dsl-201-129-37-187.prod-infinitum.com.mx (cerdita.damog.net) [201.129.37.187] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EFjtz-0000P3-00; Wed, 14 Sep 2005 19:55:07 -0700 Received: by cerdita.damog.net (Postfix, from userid 1000) id E59AA107859; Wed, 14 Sep 2005 21:55:01 -0500 (CDT) To: [EMAIL PROTECTED] Subject: WNPP bug closed Message-Id: <[EMAIL PROTECTED]> Date: Wed, 14 Sep 2005 21:55:01 -0500 (CDT) From: [EMAIL PROTECTED] (David Moreno Garza) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 355 Hello, This is an automatic mail sent to close the RFP you have reported or are involved with. Your RFP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 600 days. - It haven't had any activity recently. - The amount of ITPs on the Debian BTS is huge and we need to clean up a bit the place. As this an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the RFP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 123456 thanks bts Replacing '123456' for the number of your RFP bug. The subject of the mail is ignored. Or if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <[EMAIL PROTECTED]>. This is the first mass wnpp closing that will be done. The next close will be done on inactive RFPs older than 450 days and finally, the ones older than 365 days (an automatic script will close *inactive* RFPs when they reach one year old). A similar process is being applied to the ITP wnpp bugs in these days. Thanks for your cooperation, -- David Moreno Garza <[EMAIL PROTECTED]> Wed, 14 Sep 2005 21:54:42 -0500 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]