[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#198028: marked as done (ITP: stealth -- A stealthy file integrity checker)



Your message dated Wed, 14 Sep 2005 13:02:24 -0500 (CDT)
with message-id <20050914180224.9C1B11078D6@cerdita.damog.net>
and subject line WNPP bug closed
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at maintonly) by bugs.debian.org; 19 Jun 2003 07:30:13 +0000
>From frank@suffix.rc.rug.nl Thu Jun 19 02:30:12 2003
Return-path: <frank@suffix.rc.rug.nl>
Received: from suffix.rc.rug.nl [129.125.3.162] 
	by master.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 19Sts4-0007rS-00; Thu, 19 Jun 2003 02:30:12 -0500
Received: from suffix.rc.rug.nl (remote.client [127.0.0.1])
	by suffix.rc.rug.nl (8.12.9/8.12.9/Debian-3) with ESMTP id h5J7U95u016488
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
	Thu, 19 Jun 2003 09:30:09 +0200
Received: (from frank@localhost)
	by suffix.rc.rug.nl (8.12.9/8.12.9/Debian-3) id h5J7U9C7016487;
	Thu, 19 Jun 2003 09:30:09 +0200
Message-Id: <200306190730.h5J7U9C7016487@suffix.rc.rug.nl>
From: "Frank B. Brokken" <f.b.brokken@rc.rug.nl>
To: Debian Bug Tracking System <maintonly@bugs.debian.org>
Subject: ITP: stealth - A stealthy file integrity checker
X-Mailer: reportbug 1.50
Date: Thu, 19 Jun 2003 09:30:09 +0200
Delivered-To: maintonly@bugs.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0
	tests=BAYES_10,HAS_PACKAGE
	version=2.53-bugs.debian.org_2003_06_18
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_06_18 (1.174.2.15-2003-03-30-exp)

Package: stealth
Version: 1.20-1
Severity: wishlist



-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux suffix 2.4.20 #1 Fri Apr 4 13:57:56 CEST 2003 i686
Locale: LANG=C, LC_CTYPE=C

Versions of packages stealth depends on:
ii  libc6                         2.3.1-14   GNU C Library: Shared libraries an
ii  libgcc1                       1:3.3-2    GCC support library
ii  libstdc++5                    1:3.3-2    The GNU Standard C++ Library v3


 The STEALTH program performs File Integrity Checks on (remote) clients. It
 uses standard available software to perform file integrity checks (like
 find(1) and md5sum(1)). Using individualized policy files, it is highly
 adaptable to the specific requirements of its clients.

 In production environments STEALTH should be run from an isolated  computer.
 I.e., a computer which does not accept incoming connections.

 STEALTH itself uses SSH connections to set up secure communication with its
 remote clients, and may send e-mail to remote clients' systems maintainers.

 The onset of STEALTH runs may be randomized, thus further increasing its
 stealthy characteristics.

 STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired
 through a Locally Trusted Host'


Copyright: (c) 2002-2003 by Frank B. Brokken, University of Groningen.

You are free to distribute this software under the terms of the GNU General
Public License.


The package, as well as its binary distribution (.deb packaged), 
can be downloaded from:

    ftp://ftp.rug.nl/contrib/frank/software/linux/stealth

A user manual (in various formats) and a manual page is part of the
distribution. 


---------------------------------------
Received: (at 198028-done) by bugs.debian.org; 14 Sep 2005 18:02:43 +0000
>From damog@cerdita.damog.net Wed Sep 14 11:02:41 2005
Return-path: <damog@cerdita.damog.net>
Received: from dsl-201-129-37-187.prod-infinitum.com.mx (cerdita.damog.net) [201.129.37.187] 
	by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
	id 1EFbai-0001IW-00; Wed, 14 Sep 2005 11:02:40 -0700
Received: by cerdita.damog.net (Postfix, from userid 1000)
	id 9C1B11078D6; Wed, 14 Sep 2005 13:02:24 -0500 (CDT)
To: 198028-done@bugs.debian.org
Subject: WNPP bug closed
Cc: 198028-submitter@bugs.debian.org
Message-Id: <20050914180224.9C1B11078D6@cerdita.damog.net>
Date: Wed, 14 Sep 2005 13:02:24 -0500 (CDT)
From: damog@cerdita.damog.net (David Moreno Garza)
Delivered-To: 198028-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 235

Hello,

This an automatic message sent to owners of inactive ITPs on the Debian
Bug Tracking System.

I'm closing your bug because of the following reasons:

- It is older than 600 days old.
- It haven't had any activity recently.
- The amount of ITPs on the Debian BTS is huge and we need to
  clean up a bit the place.

If your bug shouldn't be closed, you are more than free to re-open it,
for example, if you still have intentions to package the software in
question or the like. To re-open it, you simply have to mail
control@bugs.debian.org with a body text like this:

reopen 123456
thanks bts

Replacing '123456' for the number of your ITP bug. The subject of the
mail is ignored. Or if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.

This is the first mass wnpp closing that will be done. The next close
will be done on inactive ITPs older than 450 days and finally, the
ones older than 365 days (an automatic script will close *inactive*
ITPs when they reach one year old).

A similar process will be applied to the RFP wnpp bugs in the next
days.

Thanks for your cooperation,
David Moreno Garza <damog@debian.org>.



Reply to: