Your message dated Sat, 24 Mar 2007 11:59:41 -0600 with message-id <E1HVAWj-00008P-Dr@merkel.debian.org> and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: libpam-abl -- blacklist hosts and users after failed authentication attempts
- From: David Schmitt <david@schmitt.edv-bus.at>
- Date: Mon, 13 Mar 2006 21:03:13 +0100
- Message-id: <20060313200313.10169.62196.reportbug@zion.black.co.at>
Package: wnpp Severity: wishlist * Package name : libpam-abl Version : 0.2.3 Upstream Author : Andy Armstrong <andy@hexten.net> * URL : http://www.hexten.net/pam_abl/ * License : GPL Description : blacklist hosts and users after failed authentication attempts A PAM module that provides auto blacklisting of hosts and users responsible for repeated failed authentication attempts. Generally configured so that blacklisted users still see normal login prompts but are guaranteed to fail to authenticate. This was posted in the thread[1] about ssh brute force mitigation and seems really useful to have. Thanks in advance, David Schmitt [1] http://lists.debian.org/debian-security/2006/03/msg00113.html -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-6+suspend2.2-pm-1 Locale: LANG=C, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8)
--- End Message ---
--- Begin Message ---
- To: 356733-done@bugs.debian.org
- Subject: WNPP bug closing
- From: David Moreno Garza <damog@merkel.debian.org>
- Date: Sat, 24 Mar 2007 11:59:41 -0600
- Message-id: <E1HVAWj-00008P-Dr@merkel.debian.org>
Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail control@bugs.debian.org with a body text like this: reopen 356733 stop Further comments on the work done in the bug sent to 356733@bugs.debian.org would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <damog@debian.org>. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza <damog@debian.org>.
--- End Message ---