Your message dated Wed, 14 Oct 2015 10:00:50 +0000 with message-id <e1zmira-0003fg...@franck.debian.org> and subject line Bug#800055: fixed in testssl.sh 2.6+dfsg1-1 has caused the Debian Bug report #800055, regarding ITP: testssl.sh -- Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 800055: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800055 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: wnpp Severity: wishlist Owner: "ChangZhuo Chen (陳昌倬)" <czc...@debian.org> * Package name : testssl.sh Version : 2.6 Upstream Author : Dirk Wetter <dirk aet testssl dot sh> * URL : https://testssl.sh/ * License : GPL-2 Programming Lang: bash Description : Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws (Include the long description here.) testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. . Key features . * Clear output: you can tell easily whether anything is good or bad . * Ease of installation: It works for Linux, Darwin, FreeBSD and MSYS2/Cygwin out of the box: no need to install or configure something, no gems, CPAN, pip or the like. . * Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only webservers at port 443 . * Toolbox: Several command line options help you to run YOUR test and configure YOUR output . * Reliability: features are tested thoroughly . * Verbosity: If a particular check cannot be performed because of a missing capability on your client side, you'll get a warning . * Privacy: It's only you who sees the result, not a third party . * Freedom: It's 100% open source. You can look at the code, see what's going on and you can change it. Heck, even the development is open (github) -- ChangZhuo Chen (陳昌倬) <czc...@debian.org> Debian Developer Key fingerprint = EC9F 905D 866D BE46 A896 C827 BE0C 9242 03F4 552D
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: testssl.sh Source-Version: 2.6+dfsg1-1 We believe that the bug you reported is fixed in the latest version of testssl.sh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 800...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. ChangZhuo Chen (陳昌倬) <czc...@debian.org> (supplier of updated testssl.sh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 27 Sep 2015 22:38:29 +0800 Source: testssl.sh Binary: testssl.sh Architecture: source all Version: 2.6+dfsg1-1 Distribution: unstable Urgency: low Maintainer: ChangZhuo Chen (陳昌倬) <czc...@debian.org> Changed-By: ChangZhuo Chen (陳昌倬) <czc...@debian.org> Description: testssl.sh - Command line tool to check TLS/SSL ciphers, protocols and cryptog Closes: 800055 Changes: testssl.sh (2.6+dfsg1-1) unstable; urgency=low . * Initial release. Closes: #800055 Checksums-Sha1: 46cc9d134405f541482bd68c49141693421d306b 1870 testssl.sh_2.6+dfsg1-1.dsc de398d24200f83c5245cdfb53025974dfe8d9933 94454 testssl.sh_2.6+dfsg1.orig.tar.gz 367261be3fbbf43a986ecaff34a53a787a618e2d 4204 testssl.sh_2.6+dfsg1-1.debian.tar.xz 857f13a701bfd6f3a858152d06868a0b6848eec6 50434 testssl.sh_2.6+dfsg1-1_all.deb Checksums-Sha256: 685c046018eb12717143feffcf4d4dc8a34ad7b2c212ff2ba499be7bdd123104 1870 testssl.sh_2.6+dfsg1-1.dsc 44915538568353d572b537efebfa3ae2edc53407eca52e7794c79402b7520ca0 94454 testssl.sh_2.6+dfsg1.orig.tar.gz 51e0ed4ad30fe45810d3c2195f6dd238304a5b186662fc322cdc572407d949b7 4204 testssl.sh_2.6+dfsg1-1.debian.tar.xz ae8b814738ac179b2d3872d44afe15d42031027452c6e4428f6bd317be366974 50434 testssl.sh_2.6+dfsg1-1_all.deb Files: a1f973fa019754bc7f9b3df4c543de49 1870 utils extra testssl.sh_2.6+dfsg1-1.dsc 4c180808c587c836137132695ee694a8 94454 utils extra testssl.sh_2.6+dfsg1.orig.tar.gz 58e1f1c5b2d52056f7a71917d8c7dcb7 4204 utils extra testssl.sh_2.6+dfsg1-1.debian.tar.xz 1e3cdcbbea5498187eda13bfec6d2f14 50434 utils extra testssl.sh_2.6+dfsg1-1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWCAA4AAoJELTYlw90nD9qJXkP/ixHgr5TkbTw2o28B+O8snxN 0r4/zb4RqChvzKdrpOemmKAS9OV9FeAbmaqQ3uXWk6HhLHsLV1gpQJ5/3SdubkgL xAZcw0DFaAO6KXinDyuNSHjjQtU2t2KZ0cI3cforQADsSG0OpCFjNS8jYGngyKAt tQvFDlIutKg80DYhMqMhQZekjqrQqxhAf/8ijMvdRdhJYg4g2OpsoMPmVw6gsRh3 IiHA/9oQipps+eOY9ss+R9Ic+smmciOty4JpEGUeGcEkgoIxt2Yg2okQOyVf36E3 PHEzjScut2klNS6DQ9m3//lUwhhxaI8PU1bA83PjLIugPT/+IQ9NKDU6YDSJCsCJ QtLWNi2bN+gaI9luePFitELjQYoEkM2L+5TFYEpQyCpJ/e6DhNWHXjUNWkINSYKu QQ2jkH2WHaoQVRoLURhHVGsI5191/sq5UVqaFIk1a9rQ2RNltjwg8p2wERTri9iE o93KX5Kc1Qn3LbEr1+EwC3Z7UCovBDsvtwSTW1pNpr4mz1bFGylRrDTrgbkw6aoX e4Z8lRaXkC12T4JAV2GEvayN8+WbN3K4TVxrubvTy0B70+5YlAIN0FCg+QAVz/sD 125MIFrX5OOhsMLP9zzxkkS7+Dw84z06SWGs2JiL1kbSUgeti+oktVO9+aHQuV2M 6HjFXUZznFDFqE0+J9WT =ANXr -----END PGP SIGNATURE-----
--- End Message ---