Your message dated Tue, 08 Aug 2017 21:09:44 +0000
with message-id <e1dfbl2-000780...@fasolo.debian.org>
and subject line Bug#851988: fixed in nrpe-ng 0.2.0-1
has caused the Debian Bug report #851988,
regarding nrpe-ng: Please implement the ssl_verify_server=0 option in 
check_nrpe_ng
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
851988: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851988
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nrpe-ng
Version: 0.1.2-1
Severity: wishlist

Dear Maintainer,

nrpe_ng is particularly useful for people migrating from jessie to
stretch, as it is available in jessie-backports, however if they have
a large number of internal hosts to monitor, and not all of those
hosts use puppet (or similar) then the ability to move from
nagios-nrpe-server (which is stretch does not provide SSL) to
nrpe-ng would be made simpler by a functioning ssl_verify_server=0
option.


-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: armel (armv5tel)

Kernel: Linux 4.8.0-2-marvell
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages nrpe-ng depends on:
ii  adduser                3.115
ii  init-system-helpers    1.46
ii  lsb-base               9.20161125
ii  python3-pkg-resources  32.3.1-1
pn  python3:any            <none>
ii  ssl-cert               1.0.38

nrpe-ng recommends no packages.

nrpe-ng suggests no packages.

-- Configuration Files:
/etc/nagios/check_nrpe_ng.cfg changed:
ssl_ca_file=/etc/nagios/nrpe-ng-certs.pem


-- no debconf information

--- End Message ---
--- Begin Message ---
Source: nrpe-ng
Source-Version: 0.2.0-1

We believe that the bug you reported is fixed in the latest version of
nrpe-ng, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 851...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Boot <c...@tiger-computing.co.uk> (supplier of updated nrpe-ng package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2017 15:59:46 -0400
Source: nrpe-ng
Binary: nrpe-ng
Architecture: source
Version: 0.2.0-1
Distribution: unstable
Urgency: medium
Maintainer: Chris Boot <c...@tiger-computing.co.uk>
Changed-By: Chris Boot <c...@tiger-computing.co.uk>
Description:
 nrpe-ng    - Next-generation Nagios remote plugin agent
Closes: 851985 851988 851990
Changes:
 nrpe-ng (0.2.0-1) unstable; urgency=medium
 .
   * New upstream release.
     - check_nrpe_ng uses /etc/nagios/check_nrpe_ng.cfg by default.
       (Closes: #851985)
     - check_nrpe_ng implements the ssl_verify_server=0 option.
       (Closes: #851988)
     - Implements a no-op command to return the server version for testing
       connectivity between client and server. (Closes: #851990)
   * Update Build-Depends:
     - Bump dh-python to >= 2.20160609~ in order to get the correct version of
       dependencies for backports.
     - Depend on python3-daemon (>= 2.0~), python3-requests, python3-tornado
       (>= 4.4~): new upstream dependencies.
   * Bump Standards-Version to 4.0.1:
     - Update URL in debian/copyright to https.
   * debian/copyright: remove section for files removed from upstream source.
Checksums-Sha1:
 ff21f419e3962c5140b7a03fba3ca4e77acc89a9 2193 nrpe-ng_0.2.0-1.dsc
 3432224d1eacae45db8eaa0c40033ea0531b1fe7 25729 nrpe-ng_0.2.0.orig.tar.gz
 cd641ce550a18f779203a9448544fb1a99a99625 4064 nrpe-ng_0.2.0-1.debian.tar.xz
 a2a930187c94ab1577a61c3ccdae6240b41c907a 6556 nrpe-ng_0.2.0-1_amd64.buildinfo
Checksums-Sha256:
 c36c8bec8e786b760db931832865d41c5b8b30e83aa00ac625f5dce44ec870e2 2193 
nrpe-ng_0.2.0-1.dsc
 2940fde4dd13457476aa9e581c350c95bad41cd2635a33f402b00608636cc6e4 25729 
nrpe-ng_0.2.0.orig.tar.gz
 f9b5dfa6f38779ff3407c1ee455a42afaa16e732df88b674693d051ba0294d31 4064 
nrpe-ng_0.2.0-1.debian.tar.xz
 e9eb996ecd05f77beed847e180a775138ad9f42e0a062228ecc5eee36924c892 6556 
nrpe-ng_0.2.0-1_amd64.buildinfo
Files:
 be5a9da4d64a5d900ed9b65b611bcf0b 2193 net optional nrpe-ng_0.2.0-1.dsc
 d3e43e1ca08e702f0386ffdafb80ef5c 25729 net optional nrpe-ng_0.2.0.orig.tar.gz
 12e4c0b3d7a45e98634c756b77cd3a37 4064 net optional 
nrpe-ng_0.2.0-1.debian.tar.xz
 6255d0ed4a7d0d67d30e74b6c5dc454d 6556 net optional 
nrpe-ng_0.2.0-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=9eqO
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to