tcp-wrappers 7.6.q-19ubuntu1 source package in Bilimbi Test
Changelog
tcp-wrappers (7.6.q-19ubuntu1) natty; urgency=low * Fix FTBFS with ld --as-needed, move libraries behind object files when linking. -- Matthias Klose <email address hidden> Mon, 10 Jan 2011 19:09:01 +0100
Upload details
- Uploaded by:
- Matthias Klose
- Uploaded to:
- Natty
- Original maintainer:
- Marco d'Itri
- Architectures:
- any
- Section:
- net
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Angry Aardvark | release | universe | net |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tcp-wrappers_7.6.q.orig.tar.gz | 97.1 KiB | 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d |
tcp-wrappers_7.6.q-19ubuntu1.debian.tar.gz | 41.2 KiB | e6bc642c14a3ea5475aea53a2a70346912d617f41ca7d7e04d1ff68c0f136dfc |
tcp-wrappers_7.6.q-19ubuntu1.dsc | 1.0 KiB | 38a79f72ba51d0449ebe919992a9aac2106bb5a1e50e5dc67dcc7c2b2d1be47f |
Available diffs
- diff from 7.6.q-19 to 7.6.q-19ubuntu1 (1.3 KiB)
Binary packages built by this source
- libwrap0: Wietse Venema's TCP wrappers library
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- libwrap0-dev: Wietse Venema's TCP wrappers library, development files
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
- tcpd: Wietse Venema's TCP wrapper utilities
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.