Your message dated Fri, 12 May 2006 05:47:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#339535: fixed in netkit-telnet-ssl 0.17.24+0.1-10
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: telnet-ssl
Version: 0.17.24+0.1-7.1.1
Severity: normal

telnet-ssl will disable SSL negotiation, which is by design per the man page,
if connecting to localhost.  -z secure does not override this.

This fails when telnetd-ssl is using -z secure.  ie, if you disable non-ssl
fallback on telnetd, then you can never telnet to localhost.

telnet-ssl should either detect this, or it should follow -z secure,
even when connecting to localhost.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686-smp
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages telnet-ssl depends on:
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libgcc1                       1:4.0.2-2  GCC support library
ii  libncurses5                   5.4-9      Shared libraries for terminal hand
ii  libssl0.9.8                   0.9.8a-3   SSL shared libraries
ii  libstdc++6                    4.0.2-2    The GNU Standard C++ Library v3
ii  netbase                       4.22       Basic TCP/IP networking system

telnet-ssl recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: netkit-telnet-ssl
Source-Version: 0.17.24+0.1-10

We believe that the bug you reported is fixed in the latest version of
netkit-telnet-ssl, which is due to be installed in the Debian FTP archive:

netkit-telnet-ssl_0.17.24+0.1-10.diff.gz
  to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-10.diff.gz
netkit-telnet-ssl_0.17.24+0.1-10.dsc
  to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-10.dsc
telnet-ssl_0.17.24+0.1-10_i386.deb
  to pool/main/n/netkit-telnet-ssl/telnet-ssl_0.17.24+0.1-10_i386.deb
telnetd-ssl_0.17.24+0.1-10_i386.deb
  to pool/main/n/netkit-telnet-ssl/telnetd-ssl_0.17.24+0.1-10_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ian Beckwith <[EMAIL PROTECTED]> (supplier of updated netkit-telnet-ssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 28 Apr 2006 20:13:02 +0100
Source: netkit-telnet-ssl
Binary: telnet-ssl telnetd-ssl
Architecture: source i386
Version: 0.17.24+0.1-10
Distribution: unstable
Urgency: low
Maintainer: Ian Beckwith <[EMAIL PROTECTED]>
Changed-By: Ian Beckwith <[EMAIL PROTECTED]>
Description: 
 telnet-ssl - The telnet client with SSL encryption support
 telnetd-ssl - The telnet server with SSL encryption support
Closes: 339528 339535 357737
Changes: 
 netkit-telnet-ssl (0.17.24+0.1-10) unstable; urgency=low
 .
   * telnet: don't disable ssl to localhost if -z secure
     is set (Closes: #339528, #339535).
   * Applied Justin Pryzby's netkit-telnet patch to reject invalid
     port numbers (See #300273).
   * Man page fixes:
     + telnet.1: formatting fix, thanks to Nicolas François (Closes: #357737).
     + issue.net.5: insert \& in %-sequences to stop groff interpreting them.
Files: 
 a378f3716beabe38ddec3b04d826638c 947 net extra 
netkit-telnet-ssl_0.17.24+0.1-10.dsc
 a36e16da96ec86498076f18d704a048e 26509 net extra 
netkit-telnet-ssl_0.17.24+0.1-10.diff.gz
 57dd1757fa55bd8a8889072a63889750 83880 net extra 
telnet-ssl_0.17.24+0.1-10_i386.deb
 eef7b953ae898e177ba5cab6d26a6f81 53672 net extra 
telnetd-ssl_0.17.24+0.1-10_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQEVAwUBRGSBbW4/9k35XC9tAQLsUQf+Ozri/kB4f0qy8DT6ZUzci5WuZgUC9O+6
Jt7JP8FhLDBDRDNIQFuhArJ04vU0nD9nc2uzAcY3WcurjKIQs0UEyMyUR3l/lm/K
0HAmLWzNWnSnok66jgP8Qlf9UNHUD0aZ+U1c+4BOtn5WYNOWKbrHjVsNY3P5ie4C
yJqLjgtJjXdTGnFatzF5un5CoUJMrM0fjmp0QffliMQ4FWczN61IClRwZO0bvESX
cviEQ1yVSYCNUCJazYS6l3f43pbjS8vtqymyUfC1VvOxMdX67RETgpks2TlTZlnJ
rO2Kd/CPEYAhG+a4J3HO/G33wN2z8tSqfTa36kMHTdVOI6/D7pjIVQ==
=fa+o
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to