tcp-wrappers 7.6.q-19ubuntu1 source package in Bilimbi Test

Changelog

tcp-wrappers (7.6.q-19ubuntu1) natty; urgency=low

  * Fix FTBFS with ld --as-needed, move libraries behind object files when
    linking.
 -- Matthias Klose <email address hidden>   Mon, 10 Jan 2011 19:09:01 +0100

Upload details

Uploaded by:
Matthias Klose
Uploaded to:
Natty
Original maintainer:
Marco d'Itri
Architectures:
any
Section:
net
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Angry Aardvark release universe net

Builds

Natty: [FULLYBUILT] i386

Downloads

File Size SHA-256 Checksum
tcp-wrappers_7.6.q.orig.tar.gz 97.1 KiB 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d
tcp-wrappers_7.6.q-19ubuntu1.debian.tar.gz 41.2 KiB e6bc642c14a3ea5475aea53a2a70346912d617f41ca7d7e04d1ff68c0f136dfc
tcp-wrappers_7.6.q-19ubuntu1.dsc 1.0 KiB 38a79f72ba51d0449ebe919992a9aac2106bb5a1e50e5dc67dcc7c2b2d1be47f

Available diffs

View changes file

Binary packages built by this source

libwrap0: Wietse Venema's TCP wrappers library

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

libwrap0-dev: Wietse Venema's TCP wrappers library, development files

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd: Wietse Venema's TCP wrapper utilities

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.