Your message dated Tue, 20 Dec 2016 21:33:59 +0000 with message-id <[email protected]> and subject line Bug#832034: fixed in wpa 2.6-2 has caused the Debian Bug report #832034, regarding hostapd: Update to v2.5 (at least on unstable?) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 832034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832034 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: hostapd Severity: wishlist Hi, Looks like v2.3 is nearly two years old. Would be great if hostapd could be updated to v2.5 (10 months old). I am especially looking forward to an update because I want to play with a new hostapd.conf option ("openssl_ciphers="), which was introduced in v2.4. Hopefully that option might fix some issues I am having. Regards, Linus -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: armhf (armv7l) Kernel: Linux 4.2.3-00234-g11acd64 (SMP w/4 CPU cores; PREEMPT) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---Source: wpa Source-Version: 2.6-2 We believe that the bug you reported is fixed in the latest version of wpa, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andrew Shadura <[email protected]> (supplier of updated wpa package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 20 Dec 2016 21:50:26 +0100 Source: wpa Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb Architecture: source Version: 2.6-2 Distribution: unstable Urgency: medium Maintainer: Debian wpasupplicant Maintainers <[email protected]> Changed-By: Andrew Shadura <[email protected]> Description: hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator wpagui - graphical user interface for wpa_supplicant wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i) wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb) Closes: 828601 832034 Launchpad-Bugs-Fixed: 1422143 Changes: wpa (2.6-2) unstable; urgency=medium . * Upload to unstable. * Restore the patch descriptions. * Don't install debian/system-sleep/wpasupplicant (originally introduced to fix LP: #1422143), it doesn't improve the state of the things, introduces regressions in some cases, and at all isn't supposed to work with how wpa-supplicant is started these days. . wpa (2.6-1) experimental; urgency=medium . [ Andrew Shadura ] * New upstream version (Closes: #828601, #832034). * Add gbp.conf. . [ Julian Wollrath ] * Refresh patches. Checksums-Sha1: 51230fb11518ecfdeea0eaec237aa988440a5da9 2166 wpa_2.6-2.dsc 6630ad56e0b8b55441a4e779e457356efd83d01b 73668 wpa_2.6-2.debian.tar.xz Checksums-Sha256: 115b3252e93ba429cd5639025e31aa2c2979d37a46268ad7b0c276a142008c3c 2166 wpa_2.6-2.dsc a15447ac62f2e71054bbc48753742bd2e5390be6e2e70df12617f9ff814c9b82 73668 wpa_2.6-2.debian.tar.xz Files: d828073dbec9223f9ab1dda0d3e4124e 2166 net optional wpa_2.6-2.dsc 90a19dd4a4f79d887d641815dd1a3590 73668 net optional wpa_2.6-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQEcBAEBCAAGBQJYWZ5zAAoJEJ1bI/kYT6UU3OoH/0LpsSzpe53WI/p5Z+vSSap2 tLYnPg+kiIN3WnN3jNtmWD4tVpM7dF2MVFNGFPRB6iiBBa2N1ZmI+R4WMgqW78cv qnEgbvdaRJS9D4XZdNNg3zN001TNWqSgSmwMThU2II065kpHnmvWPmQWYinHkZhI cuxAhD3oM75Sg3weMJgO6YwguS+9wKyI5dnroEU11mo5T1e+CYBfG+sJTOyv472f hMO75neF4keZFr/q4JOtUuETayf4doOCw9rqbqCf5csaEDVMZ0pNURrPkn1S2npI NkvOIWixhkEE5kw9EZNifW7SEoYjbkLqAUgF7urzjCvITBr6v99jNOnNG9B8aD4= =FPmh -----END PGP SIGNATURE-----
--- End Message ---

