Your message dated Wed, 21 Nov 2012 22:10:30 -0500
with message-id 
<CANTw=mor031i2nzshpsev261bptvcywwng9l3p7mzzqvai8...@mail.gmail.com>
and subject line Re: Bug#693925: RFS: harden/0.1.38+nmu1 [RC] [NMU]
has caused the Debian Bug report #693925,
regarding RFS: harden/0.1.38+nmu1 [RC] [NMU]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
693925: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693925
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my NMU of "harden".

It lowers the depency on openvas-server, as requested by RC bug #690656, to
allow the obsolete openvas-server to be removed (#690655). See debdiff below.

 * Package name    : harden
   Version         : 0.1.38+nmu1
   Upstream Author : Ola Lundqvist
 * License         : GPL2+
   Section         : admin

It builds those binary packages:

 harden     - Makes your system hardened
 harden-clients - Avoid clients that are known to be insecure
 harden-development - Development tools for creating more secure programs
 harden-environment - Hardened system environment
 harden-nids - Harden a system by using a network intrusion detection system
 harden-remoteaudit - Audit your remote systems from this host
 harden-servers - Avoid servers that are known to be insecure
 harden-surveillance - Check services and/or servers automatically
 harden-tools - Tools to enhance or analyze the security of the local system

To access further information about this package, please visit the following 
URL:

http://mentors.debian.net/package/harden


Alternatively, one can download the package with dget using this command:

dget -x 
http://mentors.debian.net/debian/pool/main/h/harden/harden_0.1.38+nmu1.dsc


debdiff:

diff -Nru harden-0.1.38/debian/changelog harden-0.1.38+nmu1/debian/changelog
--- harden-0.1.38/debian/changelog      2012-01-27 18:28:43.000000000 +0100
+++ harden-0.1.38+nmu1/debian/changelog 2012-11-21 20:43:10.000000000 +0100
@@ -1,3 +1,11 @@
+harden (0.1.38+nmu1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Lower dependency of harden-remoteaudit on openvas-server to suggests.
+    Closes: #690656.
+
+ -- Ivo De Decker <[email protected]>  Wed, 21 Nov 2012 20:40:39 +0100
+
 harden (0.1.38) unstable; urgency=low
 
   * Added Danish translation. Thanks to oe Dalton <[email protected]>
diff -Nru harden-0.1.38/debian/control harden-0.1.38+nmu1/debian/control
--- harden-0.1.38/debian/control        2009-08-27 22:41:23.000000000 +0200
+++ harden-0.1.38+nmu1/debian/control   2012-11-21 20:40:10.000000000 +0100
@@ -124,9 +124,8 @@
 
 Package: harden-remoteaudit
 Architecture: all
-Depends: openvas-server
 Priority: optional
-Suggests: openvas-client, nagios3, dsniff, harden-nids, ettercap
+Suggests: openvas-scanner | openvas-server, openvas-client, nagios3, dsniff, 
harden-nids, ettercap
 Description: Audit your remote systems from this host
  This package helps you to install a set of tools to check remote systems,
  sniff for passwords and more. Observe that this kind of activity can be


Regards,
   Ivo De Decker

--- End Message ---
--- Begin Message ---
On Wed, Nov 21, 2012 at 3:06 PM, Ivo De Decker wrote:
> I am looking for a sponsor for my NMU of "harden".
>
> It lowers the depency on openvas-server, as requested by RC bug #690656, to
> allow the obsolete openvas-server to be removed (#690655). See debdiff below.
>
>  * Package name    : harden
>    Version         : 0.1.38+nmu1
>    Upstream Author : Ola Lundqvist
>  * License         : GPL2+
>    Section         : admin

Reviewed and uploaded.  Thanks!

Best wishes,
Mike

--- End Message ---

Reply via email to