Bug#169507: marked as done (RFP: kernel-patch-bridge-nf -- bridging+netfilter patch)
Your message dated Wed, 14 Sep 2005 21:55:08 -0500 (CDT)
with message-id <20050915025508.F1F1310786E@cerdita.damog.net>
and subject line WNPP bug closed
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 17 Nov 2002 19:00:44 +0000
>From m.auty@softhome.net Sun Nov 17 13:00:43 2002
Return-path: <m.auty@softhome.net>
Received: from oxmail2.ox.ac.uk (oxmail.ox.ac.uk) [163.1.2.2]
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 18DUev-0000yJ-00; Sun, 17 Nov 2002 13:00:41 -0600
Received: from smtp1.herald.ox.ac.uk ([163.1.0.247])
by oxmail.ox.ac.uk with esmtp (Exim 4.10)
id 18DUen-0003Sg-02
for submit@bugs.debian.org; Sun, 17 Nov 2002 19:00:33 +0000
Received: from a62.worc.ox.ac.uk ([163.1.234.62] helo=softhome.net)
by smtp1.herald.ox.ac.uk with esmtp (Exim 3.35 #1)
id 18DUen-0003WK-00
for submit@bugs.debian.org; Sun, 17 Nov 2002 19:00:33 +0000
Message-ID: <3DD7E72A.40407@softhome.net>
Date: Sun, 17 Nov 2002 18:59:54 +0000
From: Mike Auty <m.auty@softhome.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.1) Gecko/20020826
X-Accept-Language: en, en-us
MIME-Version: 1.0
To: submit@bugs.debian.org
Subject: wishlist package: kernel-patch-bridge-nf
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Delivered-To: submit@bugs.debian.org
X-Spam-Status: No, hits=0.3 required=5.0
tests=SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MOZILLA_UA,
X_ACCEPT_LANG
version=2.41
X-Spam-Level:
Package: wnpp
Severity: Wishlist
The bridge-nf kernel patch (available at http://bridge.sourceforge.net/)
is an additional kernel patch to the already present bridging patch, for
use with the bridge-utils package. It enables interoperability between
the bridging elements of the kernel and the netfilters firewall
elements, allowing the creation of a transparent firewall. Currently
all packets forwarded by the bridge bypass the netfilters firewall, this
patch corrects the problem. As far as I'm aware the patch applies to
the 2.4.19 woody kernel soure without problem.
Mike Auty
---------------------------------------
Received: (at 169507-done) by bugs.debian.org; 15 Sep 2005 02:55:32 +0000
>From damog@cerdita.damog.net Wed Sep 14 19:55:32 2005
Return-path: <damog@cerdita.damog.net>
Received: from dsl-201-129-37-187.prod-infinitum.com.mx (cerdita.damog.net) [201.129.37.187]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1EFjuN-0000xT-00; Wed, 14 Sep 2005 19:55:32 -0700
Received: by cerdita.damog.net (Postfix, from userid 1000)
id F1F1310786E; Wed, 14 Sep 2005 21:55:08 -0500 (CDT)
To: 169507-done@bugs.debian.org
Subject: WNPP bug closed
Message-Id: <20050915025508.F1F1310786E@cerdita.damog.net>
Date: Wed, 14 Sep 2005 21:55:08 -0500 (CDT)
From: damog@cerdita.damog.net (David Moreno Garza)
Delivered-To: 169507-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 184
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 600 days.
- It haven't had any activity recently.
- The amount of ITPs on the Debian BTS is huge and we need to
clean up a bit the place.
As this an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 123456
thanks bts
Replacing '123456' for the number of your RFP bug. The subject of the
mail is ignored. Or if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
This is the first mass wnpp closing that will be done. The next close
will be done on inactive RFPs older than 450 days and finally, the
ones older than 365 days (an automatic script will close *inactive*
RFPs when they reach one year old).
A similar process is being applied to the ITP wnpp bugs in these
days.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org> Wed, 14 Sep 2005 21:54:42 -0500
Reply to: