[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#118532: marked as done (RFP: openscep -- Open Source implementation of the SCEP protocol for VPN certificate enrollment)



Your message dated Wed, 30 Jul 2003 13:57:47 +0200
with message-id <20030730115747.GA2220@bahner.com>
and subject line closing itp/rfp
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 6 Nov 2001 19:57:52 +0000
>From lars@bahner.com Tue Nov 06 13:57:52 2001
Return-path: <lars@bahner.com>
Received: from c15acdb3.du.kpnqwest.no (oikos.bahner.com) [193.90.205.179] 
	by master.debian.org with esmtp (Exim 3.12 1 (Debian))
	id 161CM3-00005i-00; Tue, 06 Nov 2001 13:57:52 -0600
Received: from bahner.com (isidor.network.digitale.net [10.0.0.202])
	by oikos.bahner.com (Postfix) with ESMTP id 3BCBB2815
	for <submit@bugs.debian.org>; Tue,  6 Nov 2001 20:55:51 +0100 (CET)
Message-ID: <3BE840C3.4040902@bahner.com>
Date: Tue, 06 Nov 2001 20:57:55 +0100
From: Lars Bahner <lars@bahner.com>
Reply-To: lars@digitale.net
Organization: Network Digitale AS
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.5) Gecko/20011012
X-Accept-Language: en-us, nb
MIME-Version: 1.0
To: submit@bugs.debian.org
Subject: ITP: openscep - open source implementation of the SCEP protocol for VPN certificate enrollment
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Delivered-To: submit@bugs.debian.org

Package: wnpp
Severity: wishlist

Openscep is a CA that can interact with SCEP enrollment enabled clients 
to generate VPNs in a scaleable fashion. Clients generate keypairs and 
converses with the server to get an X.509 certificate for client 
authentication. OpenSCEP relies on OpenLDAP, OpenSSL and Apache.

The protocol itself is in draft stage, but is being developed by Cisco. 
It is likely to become a standard for automatically distributing this 
type of certificates.

License: GPL Version 2

URL: http://openscep.othello.ch/


---------------------------------------
Received: (at 118532-done) by bugs.debian.org; 30 Jul 2003 11:57:51 +0000
>From bahner@bahner.com Wed Jul 30 06:57:49 2003
Return-path: <bahner@bahner.com>
Received: from gw.fyresdal.com (solsikke) [81.0.149.77] 
	by master.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 19hpaX-0004sL-00; Wed, 30 Jul 2003 06:57:49 -0500
Received: by solsikke (Postfix, from userid 1001)
	id EAC0EF34DF; Wed, 30 Jul 2003 13:57:47 +0200 (CEST)
Date: Wed, 30 Jul 2003 13:57:47 +0200
From: Lars Bahner <bahner@debian.org>
To: 118532-done@bugs.debian.org
Subject: closing itp/rfp
Message-ID: <20030730115747.GA2220@bahner.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.4i
Delivered-To: 118532-done@bugs.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0
	tests=BAYES_20,USER_AGENT_MUTT
	version=2.53-bugs.debian.org_2003_07_20
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_07_20 (1.174.2.15-2003-03-30-exp)

OpenScep doesn't seem to be maintained upstream anymore.

OpenScep doesn't compile on Debian, as fas as I can tell -
there is an incompatibility with the ber-library.

I think closing this is just as well.



Reply to: