Your message dated Sun, 30 Sep 2018 10:19:59 +0000
with message-id <e1g6ypt-00071s...@quantz.debian.org>
and subject line closing RFP: credns -- DNS(SEC) verification proxy
has caused the Debian Bug report #678003,
regarding RFP: credns -- DNS(SEC) verification proxy
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
678003: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678003
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: "Ondřej Surý" <ond...@debian.org>
[Note: DNSSEX has been recently renamed to credns.]
* Package name : credns
Version : 0.2.10
Upstream Author : NLNet Labs
* URL : http://www.nlnetlabs.nl/projects/dnssexy/
* License : BSD
Programming Lang: C
Description : DNS(SEC) verification proxy
Credns is a software program aimed at fortifying DNSSEC by performing
validation in the DNS notify/transfer-chain. Currently credns is a
fork of the NSD3 that has been extended with the possibility to asses
zones (received or updated by AXFR or IXFR) by running an external
verifier. Only zones that are deemed correct by the verifier will be
notified to (public) slave servers and offered for transfer.
.
Credns allows to specify an external validator which is called just
after a zone is received by transfer, but just before the zone will be
served (and delivered via transfer).
--- End Message ---
--- Begin Message ---
RFP 678003 has no visible progress for a long time, so closing.
--- End Message ---