Your message dated Sun, 16 Mar 2008 11:59:47 -0600 with message-id <E1Jax99-0000ml-P1@merkel.debian.org> and subject line WNPP bug closing has caused the Debian Bug report #373213, regarding RFP: libmail-domainkeys-perl -- Perl DomainKeys implementation to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 373213: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373213 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: RFP: libmail-domainkeys-perl -- Perl DomainKeys implementation
- From: Magnus Holmgren <holmgren@lysator.liu.se>
- Date: Tue, 13 Jun 2006 17:19:49 +0200
- Message-id: <200606131719.50624@proffe.kibibyte.se>
Package: wnpp Severity: wishlist See http://antispam.yahoo.com/domainkeys for a description of DomainKeys. SpamAssassin could use this package, for example. Source available from http://killa.net/infosec/Mail-DomainKeys/ (also distributed through CPAN). Depends on libcrypt-openssl-*-perl, which are in the process of being packaged. See also bug #352653. I'm interested in packaging this myself, if anyone is willing to sponsor me. -- Magnus Holmgren holmgren@lysator.liu.se (No Cc of list mail needed, thanks)Attachment: pgpPv2lUCw_6F.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 373213-done@bugs.debian.org
- Subject: WNPP bug closing
- From: David Moreno Garza <damog@merkel.debian.org>
- Date: Sun, 16 Mar 2008 11:59:47 -0600
- Message-id: <E1Jax99-0000ml-P1@merkel.debian.org>
Hello, This is an automatic mail sent to close the RFP you have reported or are involved with. Your RFP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the RFP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail control@bugs.debian.org with a body text like this: reopen 373213 stop Further comments on the work done in the bug sent to 373213@bugs.debian.org would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <damog@debian.org>. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza <damog@debian.org>.
--- End Message ---