Your message dated Wed, 21 Sep 2005 16:00:47 -0600
with message-id <[EMAIL PROTECTED]>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Feb 2004 12:05:22 +0000
>From [EMAIL PROTECTED] Mon Feb 02 04:05:22 2004
Return-path: <[EMAIL PROTECTED]>
Received: from m229.net195-132-237.noos.fr (hephaistos.nibelungen.rez) 
[195.132.237.229] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1AncpN-0001IQ-00; Mon, 02 Feb 2004 04:05:21 -0800
Received: from [192.168.1.7] (helo=dionysos.nibelungen.rez)
        by hephaistos.nibelungen.rez with esmtp (Exim 4.30)
        id 1Ancom-0001LH-Dc
        for [EMAIL PROTECTED]; Mon, 02 Feb 2004 13:04:44 +0100
Received: from moa by dionysos.nibelungen.rez with local (Exim 3.36 #1 (Debian))
        id 1Ancop-0000vB-00
        for <[EMAIL PROTECTED]>; Mon, 02 Feb 2004 13:04:47 +0100
From: Mathieu Roy <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]> 
Subject: RFP: integcheck -- a system integrity checker
X-Debbugs-CC: Mathieu Roy <[EMAIL PROTECTED]>, debian-devel@lists.debian.org
X-GPG-Keyserver: http://pgp.mit.edu
X-GPG-Keynumber: 2DA199B9 2002-04-09
Date: Mon, 02 Feb 2004 13:04:46 +0100
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: Mathieu Roy <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_02_01 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=HAS_PACKAGE,X_DEBBUGS_CC 
        autolearn=no version=2.60-bugs.debian.org_2004_02_01
X-Spam-Level: 

Package: wnpp
Severity: wishlist

* Package name    : integcheck
  Version         : 1.0.0
  Upstream Author : Mathieu Roy <[EMAIL PROTECTED]>
* URL or Web page : https://gna.org/projects/integcheck/
* License         : GNU GPL
  Description     : a system integrity checker
  
  Item check is written in Perl.

  The idea is to check integrity of exposed systems by getting a list
  of md5 of any important file via ssh, to keep this list on a pretty
  safe system (a system that do not run any server publicly
  available), and, finally, to compare everyday this list and with the
  previous one.
 
  As long as the system considered as safe is not compromised, it
  should inform administrators of any changes on the others systems. 
 
  As others integrity checker, if its own components are corrupted, it
  can be fooled. In others words, you cannot have a security policy
  entirely relying on an integrity checker, and you should always do
  manual checks regularly to be sure that the integrity checker is not
  corrupted itself. 
 
  So what's the point of this tool, if you are still forced to do
  manual checks? In fact, it is way faster to check integrity of
  integcheck than integrity of the whole system. 

  On every system you want to monitor, you have to install the
  integcheck-victim package, and on one computer, at least, you must
  have to install the integheck-bobby package.  
   
  The integcheck-victim package provide a specific shell. The
  integcheck-bobby provide cronjob and scripts to get and compare md5
  list. 
  
  Integcheck is already packaged, using debconf, however the package
  is not the cleanest possible and some documentation would probably
  be a nice addition. If someone was willing to package integcheck for
  Debian, we would gladly collaborate with him, by giving him write
  access to the repository directly.






-- 
Mathieu Roy

  +---------------------------------------------------------------------+
  | General Homepage:           http://yeupou.coleumes.org/             |
  | Computing Homepage:         http://alberich.coleumes.org/           |
  | Not a native english speaker:                                       |
  |     http://stock.coleumes.org/doc.php?i=/misc-files/flawed-english  |
  +---------------------------------------------------------------------+

---------------------------------------
Received: (at 230769-done) by bugs.debian.org; 21 Sep 2005 22:00:47 +0000
>From [EMAIL PROTECTED] Wed Sep 21 15:00:47 2005
Return-path: <[EMAIL PROTECTED]>
Received: from merkel.debian.org [192.25.206.16] (mail)
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EICdz-00056J-00; Wed, 21 Sep 2005 15:00:47 -0700
Received: from damog by merkel.debian.org with local (Exim 3.36 1 (Debian))
        id 1EICdz-0004Pc-00; Wed, 21 Sep 2005 16:00:47 -0600
To: [EMAIL PROTECTED]
Subject: WNPP bug closing
Message-Id: <[EMAIL PROTECTED]>
From: David Moreno Garza <[EMAIL PROTECTED]>
Date: Wed, 21 Sep 2005 16:00:47 -0600
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Hello,

This is an automatic mail sent to close the RFP you have reported or 
are involved with.

Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 450 days.
- It hasn't had any activity recently.

As this an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

reopen 230769
thanks bts

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <[EMAIL PROTECTED]>.

This is the second massive wnpp closing that is being done. The next close
will be done on inactive RFPs older than 365 days and finally, an automatic
script will close, by default, *inactive* RFPs when they reach one year of
inactivity.

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza <[EMAIL PROTECTED]>  Wed, 20 Sep 2005 17:06:42 -0500


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to