Your message dated Sat, 24 Nov 2007 11:59:48 -0700
with message-id <[EMAIL PROTECTED]>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: wnpp
Severity: wishlist
* Package name : mosref
Version : 2.0 beta 3
Upstream Author : Ephemeral Security <[EMAIL PROTECTED]>
* URL : http://www.ephemeralsecurity.com/
* License : LGPL
Programming Lang: C/Lisp
Description : secure remote execution framework
Taken from http://www.ephemeralsecurity.com/mosref/ :
Mosquito is a secure remote execution framework available for download
via the LGPL that combines high-grade cryptography and a small
efficient virtual machine on both ends to ensure that intellectual
property is protected. It also presents a dynamic environment on a
target host that can be reprogrammed on the fly over a secure
communications channel to fit the current situation.
The virtual machine was written from scratch for this purpose, with a
built in cryptography library, and was optimized for size with an eye
towards being able to inject it. The virtual machine's native
programming environment is a Scheme-derived Lisp-family language, with
an optimizing bytecode compiler. It is also cross-platform using ANSI
C and GCC, currently running on OpenBSD, Darwin, Linux, and Win32.
Compiled bytecode is portable between these platforms.
The native language of the virtual machine is Mosquito Lisp, a Lisp1
language with strong influences from Scheme. It was built from scratch
for this environment and is optimized for highly concurrent tasks and
network applications.
-- System Information:
Debian Release: 4.0
APT prefers testing
APT policy: (990, 'testing'), (501, 'stable'), (500, 'unstable'), (500,
'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
--
[EMAIL PROTECTED]
OpenPGP 0xD9D50D8A
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.
As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:
reopen 399655
stop
Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <[EMAIL PROTECTED]>.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <[EMAIL PROTECTED]>.
--- End Message ---