[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#800055: marked as done (ITP: testssl.sh -- Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws)



Your message dated Wed, 14 Oct 2015 10:00:50 +0000
with message-id <E1ZmIra-0003Fg-Jd@franck.debian.org>
and subject line Bug#800055: fixed in testssl.sh 2.6+dfsg1-1
has caused the Debian Bug report #800055,
regarding ITP: testssl.sh -- Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
800055: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800055
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: "ChangZhuo Chen (陳昌倬)" <czchen@debian.org>

* Package name    : testssl.sh
  Version         : 2.6
  Upstream Author : Dirk Wetter <dirk aet testssl dot sh>
* URL             : https://testssl.sh/
* License         : GPL-2
  Programming Lang: bash
  Description     : Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws

(Include the long description here.)

 testssl.sh is a free command line tool which checks a server's service
 on any port for the support of TLS/SSL ciphers, protocols as well as
 recent cryptographic flaws and more. 
 .
 Key features
 .
 * Clear output: you can tell easily whether anything is good or bad
 .
 * Ease of installation: It works for Linux, Darwin, FreeBSD and
   MSYS2/Cygwin out of the box: no need to install or configure
   something, no gems, CPAN, pip or the like.
 .
 * Flexibility: You can test any SSL/TLS enabled and STARTTLS service,
   not only webservers at port 443
 .
 * Toolbox: Several command line options help you to run YOUR test and
   configure YOUR output
 .
 * Reliability: features are tested thoroughly
 .
 * Verbosity: If a particular check cannot be performed because of a
   missing capability on your client side, you'll get a warning
 .
 * Privacy: It's only you who sees the result, not a third party
 .
 * Freedom: It's 100% open source. You can look at the code, see what's
   going on and you can change it. Heck, even the development is open
   (github)

-- 
ChangZhuo Chen (陳昌倬) <czchen@debian.org>
Debian Developer
Key fingerprint = EC9F 905D 866D BE46 A896  C827 BE0C 9242 03F4 552D

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: testssl.sh
Source-Version: 2.6+dfsg1-1

We believe that the bug you reported is fixed in the latest version of
testssl.sh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 800055@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
ChangZhuo Chen (陳昌倬) <czchen@debian.org> (supplier of updated testssl.sh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 27 Sep 2015 22:38:29 +0800
Source: testssl.sh
Binary: testssl.sh
Architecture: source all
Version: 2.6+dfsg1-1
Distribution: unstable
Urgency: low
Maintainer: ChangZhuo Chen (陳昌倬) <czchen@debian.org>
Changed-By: ChangZhuo Chen (陳昌倬) <czchen@debian.org>
Description:
 testssl.sh - Command line tool to check TLS/SSL ciphers, protocols and cryptog
Closes: 800055
Changes:
 testssl.sh (2.6+dfsg1-1) unstable; urgency=low
 .
   * Initial release. Closes: #800055
Checksums-Sha1:
 46cc9d134405f541482bd68c49141693421d306b 1870 testssl.sh_2.6+dfsg1-1.dsc
 de398d24200f83c5245cdfb53025974dfe8d9933 94454 testssl.sh_2.6+dfsg1.orig.tar.gz
 367261be3fbbf43a986ecaff34a53a787a618e2d 4204 testssl.sh_2.6+dfsg1-1.debian.tar.xz
 857f13a701bfd6f3a858152d06868a0b6848eec6 50434 testssl.sh_2.6+dfsg1-1_all.deb
Checksums-Sha256:
 685c046018eb12717143feffcf4d4dc8a34ad7b2c212ff2ba499be7bdd123104 1870 testssl.sh_2.6+dfsg1-1.dsc
 44915538568353d572b537efebfa3ae2edc53407eca52e7794c79402b7520ca0 94454 testssl.sh_2.6+dfsg1.orig.tar.gz
 51e0ed4ad30fe45810d3c2195f6dd238304a5b186662fc322cdc572407d949b7 4204 testssl.sh_2.6+dfsg1-1.debian.tar.xz
 ae8b814738ac179b2d3872d44afe15d42031027452c6e4428f6bd317be366974 50434 testssl.sh_2.6+dfsg1-1_all.deb
Files:
 a1f973fa019754bc7f9b3df4c543de49 1870 utils extra testssl.sh_2.6+dfsg1-1.dsc
 4c180808c587c836137132695ee694a8 94454 utils extra testssl.sh_2.6+dfsg1.orig.tar.gz
 58e1f1c5b2d52056f7a71917d8c7dcb7 4204 utils extra testssl.sh_2.6+dfsg1-1.debian.tar.xz
 1e3cdcbbea5498187eda13bfec6d2f14 50434 utils extra testssl.sh_2.6+dfsg1-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ANXr
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: