Your message dated Sat, 24 Sep 2022 19:34:45 +0000
with message-id <[email protected]>
and subject line Bug#1020542: fixed in inetutils 2:2.3-6
has caused the Debian Bug report #1020542,
regarding inetutils: telnet[d] descriptions: suggest different alternative 
packages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1020542: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020542
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: inetutils
Version: 2:2.3-5
Severity: wishlist
Control: block 1018949 by -1

To help with #1018949 (netkit-telnet: Drop in favour of netkit-telnet-ssl),
please suggest to install telnet[d]-ssl in the telnet[d] descriptions
instead of the lately introduced packages.

This can prevent introducing the new netkit-telnet[d] packages in bookworm.
They are unnecessary and duplicate code in the archive.

I have included a patch that applies on the current main branch.
From: Bastian Germann <[email protected]>
Date: Fri, 23 Sep 2022 02:08:08 +0200
Subject: Mention the netkit ssl-enabled packages

To help with #1018949 (netkit-telnet: Drop in favour of netkit-telnet-ssl),
suggest to install telnet[d]-ssl in the telnet[d] descriptions.

This prevents introducing the new netkit-telnet[d] packages in bookworm.
They are unnecessary and duplicate code in the archive.
---
 debian/control | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/debian/control b/debian/control
index fd9b525..088862e 100644
--- a/debian/control
+++ b/debian/control
@@ -177,7 +177,7 @@ Description: transitional dummy package for inetutils-telnet default switch
  provided after Debian bookworm's release.
  .
  If you want to keep using the netkit implementation, then install
- netkit-telnet instead.
+ telnet-ssl instead.
 
 Package: inetutils-telnetd
 Architecture: any
@@ -217,7 +217,8 @@ Description: transitional dummy package for inetutils-telnetd default switch
  provided after Debian bookworm's release.
  .
  If you want to keep using the netkit implementation, then install
- netkit-telnetd instead.
+ telnetd-ssl instead and run in.telnetd with the argument -z nossl for the
+ clear-text protocol.
 
 Package: inetutils-talk
 Architecture: any

--- End Message ---
--- Begin Message ---
Source: inetutils
Source-Version: 2:2.3-6
Done: Guillem Jover <[email protected]>

We believe that the bug you reported is fixed in the latest version of
inetutils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guillem Jover <[email protected]> (supplier of updated inetutils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 24 Sep 2022 21:16:43 +0200
Source: inetutils
Architecture: source
Version: 2:2.3-6
Distribution: unstable
Urgency: medium
Maintainer: Guillem Jover <[email protected]>
Changed-By: Guillem Jover <[email protected]>
Closes: 1020542
Changes:
 inetutils (2:2.3-6) unstable; urgency=medium
 .
   * Add CVE references to changelog entries and patches.
   * Place Source field next to Format in debian/copyright.
   * Improve metadata and description for old patch taken from FreeBSD.
   * Refer to telnet-ssl and telnetd-ssl instead of netkit-telnet and
     netkit-telnetd as implementation reverts, now that the latter have
     been slated for removal from Debian, as they were essentially the same
     except for the SSL/TLS support. (Closes: #1020542)
     Thanks to Bastian Germann <[email protected]>.
Checksums-Sha1:
 1cdec1cde9bad9211befd5d98048ec5ec837255b 3116 inetutils_2.3-6.dsc
 532774eec0738251d907adde0cb474ec1c0382cc 81256 inetutils_2.3-6.debian.tar.xz
 057c2a418a6a9769710fc019ebd72f6b4769e0f0 12865 inetutils_2.3-6_amd64.buildinfo
Checksums-Sha256:
 628579d5938c7725d77fadb2ea3e1a60a04dc53f117a769099f57e978445baa2 3116 
inetutils_2.3-6.dsc
 b8e471e9451794384d1269c89d944f8f08c1612805111af9ccf64a2296e166e3 81256 
inetutils_2.3-6.debian.tar.xz
 4baabd9e91a3d5c43bb8b5e1d05861e977d28365c82c54fb3742fe7fadc65d76 12865 
inetutils_2.3-6_amd64.buildinfo
Files:
 ebc39b79623a2e1c6f8acaee55313d23 3116 net optional inetutils_2.3-6.dsc
 bfccd65dce3e4fffd226aab02e38f3dd 81256 net optional 
inetutils_2.3-6.debian.tar.xz
 f9798aafabad97aaff880cc0ce5fb2ad 12865 net optional 
inetutils_2.3-6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEETz509DYFDBD1aWV0uXK/PqSuV6MFAmMvWRsACgkQuXK/PqSu
V6Pm4xAAw8B/+UBNjJuUQp49rKlzqGhBIt/7y+F3/0iKX5XFkf4huG2gGAnO09xI
6euNBsBms53Rxom/VBJ7O8yfOjW7YGPZu9dmY4AH5OV4zA2t9qaCOEXe/r7M+Q/2
jleWc5f+/hORzt7w041/hd8JQAysQmGYJNrKwRGwP5RVjdTikJ+ArpXZUU8UDy2I
0ZjEOyb3wS+IF1d68DGR3IazNHMZyo6LeZOTfYZ2w+0j4PQ7CHKl0EqZmt777ak2
2Xi78oGAJiAy44i9AJL0VQazbZk86FLfck88S7mt9+SG+7uNJSStnNd9KlRIxo9t
faYBoOi/LNCtCf6XgShFhKSGuqX8wyuFsYAxS6FooHSgtUnltoaI+LM2xcZtvDeR
croYea8b+J5bYSpHfQ8o2y/whXXJzUN/5xgTKJq2tvEWtGwko7glgO84+8tHZlXN
JuJCzJzMOnhbYSsj1p+VgtNRenr3t0b2axBg1LaibQTRlbMKNhludWDXX0UwJbfC
FiNMrsM3CHARSVG0fEHY6CpkQiNgoETY/qbghixLyMAhcS5M+lZxL6wbUnSSJiha
vzqg5o+IotomySkSpnTtOxOBPrUEur03buKdqozhsSwu2XY0JkCUVRbTNlXzSF0Z
hScOXkUFUVdO5SSgTrpAhfpGJyA6Z4EmhzYGhzw7LCjOCVnVHKM=
=1rd6
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to