[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#396618: marked as done (ITP: dns-flood-detector -- detect abusive usage levels on high traffic nameservers)



Your message dated Sat, 18 Nov 2006 10:28:04 -0800
with message-id <E1GlUv6-0004FV-Vp@spohr.debian.org>
and subject line Bug#396618: fixed in dns-flood-detector 1.10-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Jan Wagner <waja@cyconet.org>

* Package name    : dns-flood-detector
  Version         : 1.12
  Upstream Author : Dennis Opacki <dopacki@adotout.com>
* URL             : http://www.adotout.com/
* License         : GPL 2
  Programming Lang: C
  Description     : DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting the use of one's nameserver to facilitate spam.

DNS Flood Detector uses libpcap (in non-promiscuous mode) to monitor incoming dns queries to a nameserver. The tool may be run in one 
of two modes, either daemon mode or "bindsnap" mode. In daemon mode, the tool will alarm via syslog. In bindsnap mode, the user is 
able to get near-real-time stats on usage to aid in more detailed troubleshooting.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


--- End Message ---
--- Begin Message ---
Source: dns-flood-detector
Source-Version: 1.10-1

We believe that the bug you reported is fixed in the latest version of
dns-flood-detector, which is due to be installed in the Debian FTP archive:

dns-flood-detector_1.10-1.diff.gz
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.10-1.diff.gz
dns-flood-detector_1.10-1.dsc
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.10-1.dsc
dns-flood-detector_1.10-1_i386.deb
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.10-1_i386.deb
dns-flood-detector_1.10.orig.tar.gz
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.10.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 396618@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jan Wagner <waja@cyconet.org> (supplier of updated dns-flood-detector package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri,  3 Nov 2006 12:39:42 +0100
Source: dns-flood-detector
Binary: dns-flood-detector
Architecture: source i386
Version: 1.10-1
Distribution: unstable
Urgency: low
Maintainer: Jan Wagner <waja@cyconet.org>
Changed-By: Jan Wagner <waja@cyconet.org>
Description: 
 dns-flood-detector - detect abusive usage levels on high traffic nameservers
Closes: 396618
Changes: 
 dns-flood-detector (1.10-1) unstable; urgency=low
 .
   * Initial release (Closes: #396618).
Files: 
 04e506e7c994c06dc5c2ac9b1fa9e831 609 net optional dns-flood-detector_1.10-1.dsc
 7f62d0b2526125c89fd1e9edbc6462db 14574 net optional dns-flood-detector_1.10.orig.tar.gz
 fe92a60ac25204aab17c23719edabb37 3134 net optional dns-flood-detector_1.10-1.diff.gz
 c34a33fd70fca3f1de157fe7665da5ea 12110 net optional dns-flood-detector_1.10-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFTPqt+C5cwEsrK54RAmhuAKDNRuZ07jWKatcVcjqGJv+Tji1U/QCggcpU
PjzPd1lpUq+tfXKrmbNKuyY=
=gNeS
-----END PGP SIGNATURE-----


--- End Message ---

Reply to: