Your message dated Wed, 14 Sep 2005 21:55:19 -0500 (CDT) with message-id <[EMAIL PROTECTED]> and subject line WNPP bug closed has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 25 Nov 2003 10:50:32 +0000 >From [EMAIL PROTECTED] Tue Nov 25 04:48:15 2003 Return-path: <[EMAIL PROTECTED]> Received: from merkel.debian.org [192.25.206.16] by master.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1AOaju-0004VB-00; Tue, 25 Nov 2003 04:48:15 -0600 Received: from newsamosa.debian.org [208.185.25.35] (mail) by merkel.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1AO0J0-0004O3-00; Sun, 23 Nov 2003 12:54:02 -0700 Received: from merkel.debian.org [192.25.206.16] (mail) by newsamosa.debian.org with esmtp (Exim 3.35 #1 (Debian)) id 1ANJGs-0001pK-00; Fri, 21 Nov 2003 16:56:58 -0500 Received: from mail.compucation.de [213.185.64.44] by merkel.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1ANJGr-0004Rh-00; Fri, 21 Nov 2003 14:56:57 -0700 Received: from asg.ftpproxy.org (asg.pce.de [213.185.64.46]) (authenticated user ftpproxy@ftpproxy.org) by compucation.de (mail.compucation.de [213.185.64.44]) (Cipher TLSv1:RC4-MD5:128) (MDaemon.PRO.v6.8.5.R) with ESMTP id 4-md50000000018.tmp for <[EMAIL PROTECTED]>; Fri, 21 Nov 2003 18:48:53 +0100 Message-Id: <[EMAIL PROTECTED]> X-Sender: ftpproxy@ftpproxy.org@mail.compucation.de X-Mailer: QUALCOMM Windows Eudora Version 6.0.0.22 Date: Fri, 21 Nov 2003 18:47:18 +0100 To: [EMAIL PROTECTED] From: Andreas Schoenberg <[EMAIL PROTECTED]> Subject: ITP: ftpproxy -- FTP Proxy Server Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Authenticated-Sender: ftpproxy@ftpproxy.org X-Spam-Processed: mail.compucation.de, Fri, 21 Nov 2003 18:48:53 +0100 (not processed: message from valid local sender) X-Lookup-Warning: HELO/EHLO lookup on asg.ftpproxy.org does not match 213.185.64.46 X-MDRemoteIP: 213.185.64.46 X-Return-Path: [EMAIL PROTECTED] X-MDaemon-Deliver-To: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-master.debian.org_2003_11_25-bugs.debian.org_2003_11_20 (1.212-2003-09-23-exp) on master.debian.org X-Spam-Status: No, hits=-4.0 required=4.0 tests=BAYES_90,HAS_PACKAGE autolearn=no version=2.60-master.debian.org_2003_11_25-bugs.debian.org_2003_11_20 X-Spam-Level: Package: wnpp Severity: ITP ftp.proxy is an application level gateway for FTP. It sits between a client and a server forwarding command and data streams supporting a subset of the file transfer protocol as described in RFC 959. Beside this basic function which makes the program useful on firewall or masqueraders it offers fixing the FTP server (e.g. for connections into a protected LAN) and proxy authentication. Home: http://www.ftpproxy.org/ Src: http://www.ftpproxy.org/download/ Deb: http://www.ftpproxy.org/download/packages/ --------------------------------------- Received: (at 222042-done) by bugs.debian.org; 15 Sep 2005 02:56:08 +0000 >From [EMAIL PROTECTED] Wed Sep 14 19:56:08 2005 Return-path: <[EMAIL PROTECTED]> Received: from dsl-201-129-37-187.prod-infinitum.com.mx (cerdita.damog.net) [201.129.37.187] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EFjux-0001Py-00; Wed, 14 Sep 2005 19:56:08 -0700 Received: by cerdita.damog.net (Postfix, from userid 1000) id 134DC107BDE; Wed, 14 Sep 2005 21:55:19 -0500 (CDT) To: [EMAIL PROTECTED] Subject: WNPP bug closed Message-Id: <[EMAIL PROTECTED]> Date: Wed, 14 Sep 2005 21:55:19 -0500 (CDT) From: [EMAIL PROTECTED] (David Moreno Garza) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 522 Hello, This is an automatic mail sent to close the RFP you have reported or are involved with. Your RFP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 600 days. - It haven't had any activity recently. - The amount of ITPs on the Debian BTS is huge and we need to clean up a bit the place. As this an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the RFP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 123456 thanks bts Replacing '123456' for the number of your RFP bug. The subject of the mail is ignored. Or if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <[EMAIL PROTECTED]>. This is the first mass wnpp closing that will be done. The next close will be done on inactive RFPs older than 450 days and finally, the ones older than 365 days (an automatic script will close *inactive* RFPs when they reach one year old). A similar process is being applied to the ITP wnpp bugs in these days. Thanks for your cooperation, -- David Moreno Garza <[EMAIL PROTECTED]> Wed, 14 Sep 2005 21:54:42 -0500 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]