tcp-wrappers 7.6.q-27 source package in Ubuntu

Changelog

tcp-wrappers (7.6.q-27) unstable; urgency=medium

  * Stop recommending tcpd. (Closes: #855919)

 -- Marco d'Itri <email address hidden>  Mon, 30 Oct 2017 00:22:41 +0100

Upload details

Uploaded by:
Marco d'Itri
Uploaded to:
Sid
Original maintainer:
Marco d'Itri
Architectures:
any
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Bionic release main net

Downloads

File Size SHA-256 Checksum
tcp-wrappers_7.6.q-27.dsc 1.7 KiB 5313bbce685bf4d4bfc1311ecdbf2a42a3acbc1d5d9fbb5c1b2e27e17d89fa9b
tcp-wrappers_7.6.q.orig.tar.gz 97.1 KiB 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d
tcp-wrappers_7.6.q-27.debian.tar.xz 35.2 KiB b73487b0faf59dfcc1074b9f11a91556713d9ae210033536f20cfd3c8bc73b36

Available diffs

No changes file available.

Binary packages built by this source

libwrap0: Wietse Venema's TCP wrappers library

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

libwrap0-dbgsym: debug symbols for libwrap0
libwrap0-dev: Wietse Venema's TCP wrappers library, development files

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd: Wietse Venema's TCP wrapper utilities

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd-dbgsym: debug symbols for tcpd