Your message dated Thu, 22 Sep 2005 17:18:26 -0600
with message-id <[EMAIL PROTECTED]>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Jul 2004 11:44:10 +0000
>From [EMAIL PROTECTED] Sun Jul 18 04:44:10 2004
Return-path: <[EMAIL PROTECTED]>
Received: from a81-197-3-110.elisa-laajakaista.fi (ns.cante.net) [81.197.3.110] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BmA5R-0007lH-00; Sun, 18 Jul 2004 04:44:10 -0700
Received: from jaalto by ns.cante.net with local (Exim 4.34)
        id 1BmA5P-0004qF-6j; Sun, 18 Jul 2004 14:44:07 +0300
MIME-Version: 1.0
From: Jari Aalto <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
X-Mailer: reportbug 2.63
Date: Sun, 18 Jul 2004 14:44:07 +0300
Message-Id: <[EMAIL PROTECTED]>
Sender: Jari Aalto <[EMAIL PROTECTED]>
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Rcpt-To: [EMAIL PROTECTED], [EMAIL PROTECTED]
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Subject: RFP: yaph -- YAPH - Yet Another Proxy Hunter
X-SA-Exim-Version: 4.0 (built Sat, 24 Apr 2004 12:31:30 +0200)
X-SA-Exim-Scanned: Yes (on ns.cante.net)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: wnpp
Severity: wishlist

* Package name    : yaph
  Version         : 0.91
  Upstream Author : [EMAIL PROTECTED]
* URL             : http://sourceforge.net/projects/yaph
* License         : GPL
  Description     : YAPH - Yet Another Proxy Hunter


YAPH is a proxy hunter for the Unix platform. It allows to find public
access proxy servers on the Internet and to validate proxy lists. YAPH
reveals SOCK4, SOCKS5, and HTTP (CONNECT method) proxies. HTTP proxies
are tested for CONNECT method only, since only this method provides
ability to tunnel TCP through HTTP proxy. YAPH utilizes the power of
Nmap, a network mapper written by Fyodor. Nmap provides to YAPH the
capability to find new undiscovered public proxy servers on the
Internet.

-- System Information:
Debian Release: testing/unstable
Architecture: i386 (i686)
Kernel: Linux 2.4.26.20040601
Locale: LANG=C, LC_CTYPE=C (ignored: LC_ALL set to en_US)

---------------------------------------
Received: (at 260084-done) by bugs.debian.org; 22 Sep 2005 23:18:30 +0000
>From [EMAIL PROTECTED] Thu Sep 22 16:18:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from merkel.debian.org [192.25.206.16] (mail)
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EIaKh-0001o5-00; Thu, 22 Sep 2005 16:18:27 -0700
Received: from damog by merkel.debian.org with local (Exim 3.36 1 (Debian))
        id 1EIaKg-0006wN-00; Thu, 22 Sep 2005 17:18:26 -0600
To: [EMAIL PROTECTED]
Subject: WNPP bug closing
Message-Id: <[EMAIL PROTECTED]>
From: David Moreno Garza <[EMAIL PROTECTED]>
Date: Thu, 22 Sep 2005 17:18:26 -0600
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Hello,

This is an automatic mail sent to close the RFP you have reported or 
are involved with.

Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

reopen 260084
thanks bts

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <[EMAIL PROTECTED]>.

This is the second massive wnpp closing that is being done. The next close
will be done on inactive RFPs older than 365 days and finally, an automatic
script will close, by default, *inactive* RFPs when they reach one year of
inactivity.

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza <[EMAIL PROTECTED]>  Thu, 22 Sep 2005 17:06:42 -0500


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to