--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: linblock -- Automatically download antip2p blacklist and install into Linux's IPTables interface
- From: Andre Meister <ilf@gmx.net>
- Date: Fri, 30 Sep 2005 14:32:15 +0200
- Message-id: <E1ELK4F-0000zS-00@master.debian.org>
Package: wnpp
Severity: wishlist
* Package name : linblock
Version : 1.0
Upstream Author : Brian Dessent <brian AT dessent DOT net>
* URL : http://dessent.net/linblock/
* License : GPL
Description : Automatically download antip2p blacklist and install into Linux's IPTables interface
linblock.pl is a Perl script that automatically downloads a list of IP
address ranges that are to be blocked and installs them into the Linux
kernel using the iptables interface. The script is intended to give
Linux users the easy and automatic blocking that Windows users enjoy
with programs such as PeerGuardain or Protowall. The intended audience
for this script are BitTorrent tracker administrators who wish to use
the 'antip2p' blocklist to deny access to undesired parties. However, it
can also be used by any Linux user who wishes to have such blocking
enabled on his machine.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
--- End Message ---
--- Begin Message ---
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.
As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 330914
thanks bts
Further comments on the work done in the bug sent to
330914@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org>.
--- End Message ---