Bug#260184: marked as done (ITA: netkit-telnet-ssl -- The telnet server with SSL encryption support.)
Your message dated Tue, 17 Aug 2004 08:32:42 -0400
with message-id <E1Bx38s-0008OL-00@newraff.debian.org>
and subject line Bug#260184: fixed in netkit-telnet-ssl 0.17.24+0.1-3
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 19 Jul 2004 08:43:55 +0000
>From martin@verwaltung.uni-mainz.de Mon Jul 19 01:43:55 2004
Return-path: <martin@verwaltung.uni-mainz.de>
Received: from mailgate1.verwaltung.uni-mainz.de (patty.verwaltung.uni-mainz.de) [134.93.144.165]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BmTkZ-0008SA-00; Mon, 19 Jul 2004 01:43:55 -0700
Received: from harriet.verwaltung.uni-mainz.de (root@harriet.verwaltung.uni-mainz.de [134.93.226.19])
by patty.verwaltung.uni-mainz.de (8.12.11/8.12.11/Debian-5) with ESMTP id i6J8hPcO008696
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NOT)
for <submit@bugs.debian.org>; Mon, 19 Jul 2004 10:43:25 +0200
Received: from woodstock.verwaltung.uni-mainz.de (woodstock.verwaltung.uni-mainz.de [134.93.226.8])
by harriet.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) with ESMTP id i6J8hSXb007603
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL);
Mon, 19 Jul 2004 10:43:28 +0200
Received: from woodstock.verwaltung.uni-mainz.de (localhost [127.0.0.1])
by woodstock.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) with ESMTP id i6J8hSkl013850
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL);
Mon, 19 Jul 2004 10:43:28 +0200
Received: (from martin@localhost)
by woodstock.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-6.6) id i6J8hSxq013848;
Mon, 19 Jul 2004 10:43:28 +0200
Message-Id: <200407190843.i6J8hSxq013848@woodstock.verwaltung.uni-mainz.de>
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Christoph Martin <martin@verwaltung.uni-mainz.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: RFA: netkit-telnet-ssl -- The telnet server with SSL encryption support.
X-Mailer: reportbug 2.63
Date: Mon, 19 Jul 2004 10:43:28 +0200
X-Virus-Scanned-From: mailgate1.verwaltung.uni-mainz.de
X-Spam-Scanned-From: mailgate1.verwaltung.uni-mainz.de
X-Scanned-By: MIMEDefang 2.41
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
Package: wnpp
Severity: normal
I request an adopter for the netkit-telnet-ssl package.
I don't have the time to maintain this package properly.
The package description is:
The in.telnetd program is a server which supports the DARPA telnet interactive
communication protocol.
.
SSL telnet(d) replaces normal telnet(d) using SSL authentication and
encryption. It interoperates with normal telnet(d) in both directions.
It checks if the other side is also talking SSL, if not it falls back
to normal telnet protocol.
.
Advantages over normal telnet(d): Your passwords and the data you send
will not go in cleartext over the line. Nobody can get it with
tcpdump or similar tools. With SSLtelnet you can also connect to
https-server like https://www.netscape.com. Just do
'telnet www.netscape.com 443'
-- System Information:
Debian Release: 3.0
APT prefers testing
APT policy: (99, 'testing'), (50, 'unstable'), (20, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.26
Locale: LANG=de_DE, LC_CTYPE=de_DE
---------------------------------------
Received: (at 260184-close) by bugs.debian.org; 17 Aug 2004 12:35:29 +0000
>From katie@ftp-master.debian.org Tue Aug 17 05:35:29 2004
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Bx3BZ-0008U0-00; Tue, 17 Aug 2004 05:35:29 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1Bx38s-0008OL-00; Tue, 17 Aug 2004 08:32:42 -0400
From: Ian Beckwith <ianb@nessie.mcc.ac.uk>
To: 260184-close@bugs.debian.org
X-Katie: $Revision: 1.51 $
Subject: Bug#260184: fixed in netkit-telnet-ssl 0.17.24+0.1-3
Message-Id: <E1Bx38s-0008OL-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Tue, 17 Aug 2004 08:32:42 -0400
Delivered-To: 260184-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
Source: netkit-telnet-ssl
Source-Version: 0.17.24+0.1-3
We believe that the bug you reported is fixed in the latest version of
netkit-telnet-ssl, which is due to be installed in the Debian FTP archive:
netkit-telnet-ssl_0.17.24+0.1-3.diff.gz
to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-3.diff.gz
netkit-telnet-ssl_0.17.24+0.1-3.dsc
to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-3.dsc
telnet-ssl_0.17.24+0.1-3_i386.deb
to pool/main/n/netkit-telnet-ssl/telnet-ssl_0.17.24+0.1-3_i386.deb
telnetd-ssl_0.17.24+0.1-3_i386.deb
to pool/main/n/netkit-telnet-ssl/telnetd-ssl_0.17.24+0.1-3_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 260184@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Ian Beckwith <ianb@nessie.mcc.ac.uk> (supplier of updated netkit-telnet-ssl package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 15 Aug 2004 16:48:32 +0100
Source: netkit-telnet-ssl
Binary: telnet-ssl telnetd-ssl
Architecture: source i386
Version: 0.17.24+0.1-3
Distribution: unstable
Urgency: low
Maintainer: Ian Beckwith <ianb@nessie.mcc.ac.uk>
Changed-By: Ian Beckwith <ianb@nessie.mcc.ac.uk>
Description:
telnet-ssl - The telnet client with SSL encryption support
telnetd-ssl - The telnet server with SSL encryption support
Closes: 260184
Changes:
netkit-telnet-ssl (0.17.24+0.1-3) unstable; urgency=low
.
* New Maintainer (Closes: #260184)
* telnet/commands.cc: Apply Josh Martin's patch to fix
buffer overflow when $HOME is too big.
* telnetd/issue.net.5: escaped hyphen.
Files:
971729cf0b94dc3ffea16b3364d4988f 645 net standard netkit-telnet-ssl_0.17.24+0.1-3.dsc
fdc59de2ecd01c920186b7625cc9ac79 9675 net standard netkit-telnet-ssl_0.17.24+0.1-3.diff.gz
78e4dc928978821232a8eb73691c23f1 79258 net standard telnet-ssl_0.17.24+0.1-3_i386.deb
3f39a666ce7c0158e3865ae40d85ad4d 49648 net optional telnetd-ssl_0.17.24+0.1-3_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFBIfk9geVih7XOVJcRAiT2AJ9EIM2EseCxbJdSH5L+FLOMy0tFmQCfXFR5
9ZWpDErPuVDRKrYXpEFzTp8=
=Znyv
-----END PGP SIGNATURE-----
Reply to: