tcp-wrappers 7.6.q-27 source package in Ubuntu
Changelog
tcp-wrappers (7.6.q-27) unstable; urgency=medium * Stop recommending tcpd. (Closes: #855919) -- Marco d'Itri <email address hidden> Mon, 30 Oct 2017 00:22:41 +0100
Upload details
- Uploaded by:
- Marco d'Itri
- Uploaded to:
- Sid
- Original maintainer:
- Marco d'Itri
- Architectures:
- any
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Bionic | release | main | net |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tcp-wrappers_7.6.q-27.dsc | 1.7 KiB | 5313bbce685bf4d4bfc1311ecdbf2a42a3acbc1d5d9fbb5c1b2e27e17d89fa9b |
tcp-wrappers_7.6.q.orig.tar.gz | 97.1 KiB | 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d |
tcp-wrappers_7.6.q-27.debian.tar.xz | 35.2 KiB | b73487b0faf59dfcc1074b9f11a91556713d9ae210033536f20cfd3c8bc73b36 |
Available diffs
- diff from 7.6.q-26 to 7.6.q-27 (1.1 KiB)
No changes file available.
Binary packages built by this source
- libwrap0: Wietse Venema's TCP wrappers library
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- libwrap0-dbgsym: debug symbols for libwrap0
- libwrap0-dev: Wietse Venema's TCP wrappers library, development files
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- tcpd: Wietse Venema's TCP wrapper utilities
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- tcpd-dbgsym: debug symbols for tcpd