Bug#570203: marked as done (RFP: sslhazard -- workaround for ff3.0 ssl behaviour)
Your message dated Thu, 26 Jul 2018 16:19:59 +0000
with message-id <E1fiizf-0007EB-8u@quantz.debian.org>
and subject line closing RFP: sslhazard -- workaround for ff3.0 ssl behaviour
has caused the Debian Bug report #570203,
regarding RFP: sslhazard -- workaround for ff3.0 ssl behaviour
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
570203: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570203
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: ITP: useragentswitcher -- browser extension to manage user agent string
- From: Daniel Baumann <daniel@debian.org>
- Date: Wed, 17 Feb 2010 10:32:58 +0100
- Message-id: <4B7BB7CA.1010808@debian.org>
- Reply-to: daniel@debian.org
Package: wnpp
Severity: wishlist
Tags: pending
Package: sslhazard
Homepage: http://kuix.de/sslhazard/sslhazard.php
Description: Extension to easily work around the 'bad ssl certificate'
page.
i've prepared package, the only thing left is to write debian/copyright
and a good package description. anyhow, sources are available at:
http://git.debian-maintainers.org/?p=unofficial/sslhazard.git
--
Address: Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email: daniel.baumann@panthera-systems.net
Internet: http://people.panthera-systems.net/~daniel-baumann/
--- End Message ---
--- Begin Message ---
RFP 570203 has no visible progress for a long time, so closing.
--- End Message ---
Reply to: