tcp-wrappers 7.6.q-29 source package in Ubuntu
Changelog
tcp-wrappers (7.6.q-29) unstable; urgency=medium * Moved the library from /lib/ to /usr/lib/. (Closes: #941047) * Added support for the musl libc, because they are too good to implement 30-years-old interfaces. (Closes: #941839) -- Marco d'Itri <email address hidden> Sun, 24 Nov 2019 23:29:52 +0100
Upload details
- Uploaded by:
- Marco d'Itri
- Uploaded to:
- Sid
- Original maintainer:
- Marco d'Itri
- Architectures:
- any
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tcp-wrappers_7.6.q-29.dsc | 1.9 KiB | 72d2d0568f29729244205d42fdd17f516f6dc7434a92cbbdfe686629ee227470 |
tcp-wrappers_7.6.q.orig.tar.gz | 97.1 KiB | 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d |
tcp-wrappers_7.6.q-29.debian.tar.xz | 35.3 KiB | 59ccbef911f78a8de0149d4ced3cd250a9f33d8d4958717600ad408f86cf5af9 |
Available diffs
No changes file available.
Binary packages built by this source
- libwrap0: Wietse Venema's TCP wrappers library
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- libwrap0-dbgsym: debug symbols for libwrap0
- libwrap0-dev: Wietse Venema's TCP wrappers library, development files
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- tcpd: Wietse Venema's TCP wrapper utilities
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- tcpd-dbgsym: debug symbols for tcpd