Your message dated Tue, 20 Dec 2016 21:33:59 +0000
with message-id <[email protected]>
and subject line Bug#832034: fixed in wpa 2.6-2
has caused the Debian Bug report #832034,
regarding hostapd: Update to v2.5 (at least on unstable?)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
832034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832034
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: hostapd
Severity: wishlist

Hi,

Looks like v2.3 is nearly two years old. Would be great if hostapd could
be updated to v2.5 (10 months old).

I am especially looking forward to an update because I want to play with
a new hostapd.conf option ("openssl_ciphers="), which was introduced in
v2.4. Hopefully that option might fix some issues I am having.

Regards, Linus


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: armhf (armv7l)

Kernel: Linux 4.2.3-00234-g11acd64 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2.6-2

We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrew Shadura <[email protected]> (supplier of updated wpa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 20 Dec 2016 21:50:26 +0100
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.6-2
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers 
<[email protected]>
Changed-By: Andrew Shadura <[email protected]>
Description:
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 828601 832034
Launchpad-Bugs-Fixed: 1422143
Changes:
 wpa (2.6-2) unstable; urgency=medium
 .
   * Upload to unstable.
   * Restore the patch descriptions.
   * Don't install debian/system-sleep/wpasupplicant (originally introduced
     to fix LP: #1422143), it doesn't improve the state of the things,
     introduces regressions in some cases, and at all isn't supposed to
     work with how wpa-supplicant is started these days.
 .
 wpa (2.6-1) experimental; urgency=medium
 .
   [ Andrew Shadura ]
   * New upstream version (Closes: #828601,  #832034).
   * Add gbp.conf.
 .
   [ Julian Wollrath ]
   * Refresh patches.
Checksums-Sha1:
 51230fb11518ecfdeea0eaec237aa988440a5da9 2166 wpa_2.6-2.dsc
 6630ad56e0b8b55441a4e779e457356efd83d01b 73668 wpa_2.6-2.debian.tar.xz
Checksums-Sha256:
 115b3252e93ba429cd5639025e31aa2c2979d37a46268ad7b0c276a142008c3c 2166 
wpa_2.6-2.dsc
 a15447ac62f2e71054bbc48753742bd2e5390be6e2e70df12617f9ff814c9b82 73668 
wpa_2.6-2.debian.tar.xz
Files:
 d828073dbec9223f9ab1dda0d3e4124e 2166 net optional wpa_2.6-2.dsc
 90a19dd4a4f79d887d641815dd1a3590 73668 net optional wpa_2.6-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJYWZ5zAAoJEJ1bI/kYT6UU3OoH/0LpsSzpe53WI/p5Z+vSSap2
tLYnPg+kiIN3WnN3jNtmWD4tVpM7dF2MVFNGFPRB6iiBBa2N1ZmI+R4WMgqW78cv
qnEgbvdaRJS9D4XZdNNg3zN001TNWqSgSmwMThU2II065kpHnmvWPmQWYinHkZhI
cuxAhD3oM75Sg3weMJgO6YwguS+9wKyI5dnroEU11mo5T1e+CYBfG+sJTOyv472f
hMO75neF4keZFr/q4JOtUuETayf4doOCw9rqbqCf5csaEDVMZ0pNURrPkn1S2npI
NkvOIWixhkEE5kw9EZNifW7SEoYjbkLqAUgF7urzjCvITBr6v99jNOnNG9B8aD4=
=FPmh
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to