tcp-wrappers 7.6.q-31build2 source package in Ubuntu

Changelog

tcp-wrappers (7.6.q-31build2) jammy; urgency=high

  * No change rebuild for ppc64el baseline bump.

 -- Julian Andres Klode <email address hidden>  Fri, 25 Mar 2022 10:52:20 +0100

Upload details

Uploaded by:
Julian Andres Klode
Uploaded to:
Jammy
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
net
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section
Kinetic release main net
Jammy release main net

Downloads

File Size SHA-256 Checksum
tcp-wrappers_7.6.q.orig.tar.gz 97.1 KiB 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d
tcp-wrappers_7.6.q-31build2.debian.tar.xz 35.6 KiB f6045abe8e3345f4ec5274ded46d261d6dc625413274bae2128d3054ecb6f34f
tcp-wrappers_7.6.q-31build2.dsc 2.0 KiB 434314999dbcf4c7c1b81b7ee37836dee2651382caca33c675332ddceadbfbb6

View changes file

Binary packages built by this source

libwrap0: Wietse Venema's TCP wrappers library

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

libwrap0-dbgsym: debug symbols for libwrap0
libwrap0-dev: Wietse Venema's TCP wrappers library, development files

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd: Wietse Venema's TCP wrapper utilities

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd-dbgsym: debug symbols for tcpd