Your message dated Fri, 24 Jan 2014 07:48:19 +0000
with message-id <[email protected]>
and subject line Bug#726529: fixed in libapache2-mod-rpaf 0.6-12
has caused the Debian Bug report #726529,
regarding libapache2-mod-rpaf: fails on ipv6 addresses
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
726529: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726529
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libapache2-mod-rpaf
Severity: important

Hi,

ip based allow/deny rules are broken with libapache2-mod-rpaf and ipv6.
https://github.com/ttkzw/mod_rpaf-0.6/commit/3848870bc419e46b9c49bf4d3403993bab9d1bf6
fixes this issue.

Thanks,

Bernd

-- 
Mit freundlichen Grüßen


Bernd Zeimetz
Systems Engineer
Debian Developer

conova communications GmbH
Web    | http://www.conova.com/
E-Mail | [email protected]

Zentrale Salzburg
Karolingerstraße 36A
5020 Salzburg

Tel | +43 (0) 662 22 00 - 313
Fax | +43 (0) 662 22 00 - 209

Es gelten die Allgemeinen Geschäftsbedingungen der
conova communications GmbH, http://www.conova.com/de/agb/

Attachment: smime.p7s
Description: S/MIME cryptographic signature


--- End Message ---
--- Begin Message ---
Source: libapache2-mod-rpaf
Source-Version: 0.6-12

We believe that the bug you reported is fixed in the latest version of
libapache2-mod-rpaf, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sergey B Kirpichev <[email protected]> (supplier of updated 
libapache2-mod-rpaf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 24 Jan 2014 10:24:27 +0400
Source: libapache2-mod-rpaf
Binary: libapache2-mod-rpaf
Architecture: source amd64
Version: 0.6-12
Distribution: unstable
Urgency: low
Maintainer: Sergey B Kirpichev <[email protected]>
Changed-By: Sergey B Kirpichev <[email protected]>
Description: 
 libapache2-mod-rpaf - module for Apache2 which takes the last IP from the 
'X-Forwarded-
Closes: 726529
Changes: 
 libapache2-mod-rpaf (0.6-12) unstable; urgency=low
 .
   * Add transition notes
   * Fix lintian error: vcs-field-not-canonical
   * Bump up Standards-Version (to 3.9.5)
   * Add --no-silent to LTFLAGS
   * Restore 030_ipv6.patch, removed by QA upload in 0.6-1 (Closes: #726529)
   * Refresh patches
Checksums-Sha1: 
 01c3ccea1948981faf79398a0130857ca710bfb8 1995 libapache2-mod-rpaf_0.6-12.dsc
 60f2966fd45f846c10479766cac454cb0b485e08 6740 
libapache2-mod-rpaf_0.6-12.debian.tar.xz
 cd69229c2d6ead4abe0f2241c22c7ba020b1178d 10726 
libapache2-mod-rpaf_0.6-12_amd64.deb
Checksums-Sha256: 
 2dcdb268a8c9116646415759902df700b940583e3aa6c896f09f2b144527c4ef 1995 
libapache2-mod-rpaf_0.6-12.dsc
 953da336e54bd275cd1fa7139989b53ae2662a1c6f1200ed868f483de686a982 6740 
libapache2-mod-rpaf_0.6-12.debian.tar.xz
 baf11d15ca48c54b4d2a2c50bd7e8d44f7abb64c2cef5930cbee964f9d168276 10726 
libapache2-mod-rpaf_0.6-12_amd64.deb
Files: 
 ae8dd6d1c1d52e30131fe4e0b183b474 1995 httpd extra 
libapache2-mod-rpaf_0.6-12.dsc
 de0f31ab1764c7d9ed044c5b6e650126 6740 httpd extra 
libapache2-mod-rpaf_0.6-12.debian.tar.xz
 3068bb52d916faf4791a43fd7b63feaa 10726 httpd extra 
libapache2-mod-rpaf_0.6-12_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJS4gz+AAoJEDnJoLZAJirwU2EP/RSXHh8w5bf7geMvDH4zR0Sf
H/gNBbJzpBo+RRODfJ2FOMdnweF3+/T0TTqf2Ztlp+ohMoiGCeobb8Nz9dI2HU/z
SoQo79L7XHUxlHyoaqs3aeU1ClxYQDqEY2Ez7kDS+Wr+zscmb8rRdi5ImrpY9ADP
IoZqwR3qTDs8MTU++V7ypLjFIog5IZN5qi9h3b7eC7f33POIn0ujpZeeKzdqlcit
iMG8OoF5lYU3057345zKkuQzARan7t5vLlU5gEUBuFfXd/hZb9YZHdQyb/ldMVnN
Ii9U1FUfzLZDg5NwG6M2ZZuuwvVSGsYBGZN0HcEALSpcnFfb5I1O3H20PYuxPX/H
5Aj9WTEcORSIdCjADfdADa+ixnruTDTFdlk1IFN3sOhPa/GwMD7lqQoWkEcyUpvS
R9bv7xD+avkKcaTITnGXzI6pOCJkxcQgmkqS1gflzR+5iZMhJVXFSDqfipLY+JpQ
Oe4oy6tHLsazhVZQLWP9Qz7LEK+NsEV3VJrBAO1bYplVyS4PiCDbbdu/Pl/PeDLe
M2COgvsydPBhG/L2r6rhkxu5sWj6r1NMd8he2sw+/dyt4lezwknEnzrbQbGsZD7B
QbJcaA8/ARwM0XVLzl+FZzXav5OpTUbEaO9dMech9NslybLxvGyiBipQZmGEw/1Q
KKk/JN71ludiB8XtvNQ/
=Tg/d
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to