[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#241039: marked as done (RFP: afserver -- Active port forwarder client and server)



Your message dated Sun, 01 Oct 2006 12:00:00 -0600
with message-id <E1GU5bc-0006Yq-AN@merkel.debian.org>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist


  Package name    : afserver
  Version         : x.y.z
  Upstream Author : Name <somebody@example.org>
  URL             : http://www.gray-world.net/pr_af.shtml
  License         : GPL
  Description     : afserver: Active port forwarder client and server

Active port forwarder uses SSL for secure packet tunneling. It is designed
for people without an external IP who want to make some services available
on the Internet.afserver is placed on the machine with a publicly accessible
address, and afclient is placed on the machine behind a firewall or
masquerade. This makes the second machine visible to the Internet. Running
afserver does not require root priviledges, nor does it use threads or other
processes.

There are other WNPP candidates at
http://www.gray-world.net/ where it reads:

"At present, we've developed some projects that allow to establish Covert
Channels inside TCP (HTTP, HTTPS, MSN) and UDP protocols : Active Port
Forwarder - SSL secure packet tunneling; CCTT - arbitrary TCP and UDP data
transfers through TCP,UDP and HTTP POST messages; Firepass - arbitrary TCP
and UDP data transfers through HTTP POST messages; MsnShell - remote Linux
shell through the MSN protocol; Wsh - remote Unix/Win shell through HTTP and
HTTPS protocols."

Jari

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.23
Locale: LANG=C, LC_CTYPE=C (ignored: LC_ALL set to en_US.iso88591)


--- End Message ---
--- Begin Message ---
Hello,

This is an automatic mail sent to close the RFP you have reported or 
are involved with.

Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:

reopen 241039
thanks bts

Further comments on the work done in the bug sent to
241039@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza <damog@debian.org>.
 

--- End Message ---

Reply to: