[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#454477: marked as done (ITP: nulog -- Graphical firewall log analysis interface)

Your message dated Fri, 28 Dec 2007 12:23:51 +0000
with message-id <E1J8EFj-0007CY-37@ries.debian.org>
and subject line Bug#454477: fixed in nulog 2.0~rc1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Pierre Chifflier <pollux@debian.org>

* Package name    : nulog
  Version         : 2.0
  Upstream Author : INL
* URL             : http://software.inl.fr/trac/trac.cgi/wiki/EdenWall/NuLog2
* License         : GPL
  Programming Lang: Python
  Description     : Graphical firewall log analysis interface

 NuLog is a web interface to netfilter logs, when stored in a database
 using ulog.
 The features currently include:
 o Index page with a summary of firewall activity:
     * Packet dropped per host
     * Packets dropped per UDP port
     * Packets dropped per TCP port
     * Packets dropped per user (NuFW only) 
 o Fully browsable tables
 o Search engine
 o Graphing capabilities (display clickable array, histogram or pie for a dataset)
 o SOAP request system for integration with other systems
 o IPv6 support.
 o Customizable pages (index page, etc)
 o AJAX features.
 o Special pages for user, ip and ports.
 o CSV export. 
  Homepage: http://software.inl.fr/trac/trac.cgi/wiki/EdenWall/NuLog2

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-3-amd64 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

--- End Message ---
--- Begin Message ---
Source: nulog
Source-Version: 2.0~rc1-1

We believe that the bug you reported is fixed in the latest version of
nulog, which is due to be installed in the Debian FTP archive:

  to pool/main/n/nulog/nulog_2.0~rc1-1.diff.gz
  to pool/main/n/nulog/nulog_2.0~rc1-1.dsc
  to pool/main/n/nulog/nulog_2.0~rc1-1_all.deb
  to pool/main/n/nulog/nulog_2.0~rc1.orig.tar.gz

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 454477@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Pierre Chifflier <pollux@debian.org> (supplier of updated nulog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)

Hash: SHA1

Format: 1.7
Date: Fri, 14 Dec 2007 09:22:02 +0100
Source: nulog
Binary: nulog
Architecture: source all
Version: 2.0~rc1-1
Distribution: unstable
Urgency: low
Maintainer: Pierre Chifflier <pollux@debian.org>
Changed-By: Pierre Chifflier <pollux@debian.org>
 nulog      - Graphical firewall log analysis interface
Closes: 454477
 nulog (2.0~rc1-1) unstable; urgency=low
   * Initial release (Closes: #454477)
 c22c0a4facb3723bca44732de6da56de 682 net extra nulog_2.0~rc1-1.dsc
 63a012e65b75cd692471c4f62c845dff 524886 net extra nulog_2.0~rc1.orig.tar.gz
 cde544a332b9ee2cd73580e516698e36 523 net extra nulog_2.0~rc1-1.diff.gz
 d43fe1d5a982ed3f246c335cf0cab32e 511154 net extra nulog_2.0~rc1-1_all.deb

Version: GnuPG v1.4.6 (GNU/Linux)


--- End Message ---

Reply to: