tcp-wrappers 7.6.q-ok2 source package in openKylin

Changelog

tcp-wrappers (7.6.q-ok2) nile; urgency=medium

  * No-change rebuild against yp_get_default_domain@LIBNSL_1.0

 -- liwenjun <email address hidden>  Thu, 01 Aug 2024 15:04:36 +0800

Upload details

Uploaded by:
liwenjun
Sponsored by:
Cibot
Uploaded to:
Nile V2.0
Original maintainer:
Marco d'Itri
Architectures:
any
Section:
net
Urgency:
Medium Urgency

Publishing See full publishing history

Series Pocket Published Component Section
Nile V2.0 release main net
Nile V2.0 proposed main net

Downloads

File Size SHA-256 Checksum
tcp-wrappers_7.6.q.orig.tar.gz 97.1 KiB 9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d
tcp-wrappers_7.6.q-ok2.debian.tar.xz 32.7 KiB 1ff02aa09964fc5cccafa1ea4a4b1ca70faa70c0f4da22bf4d2d75f98d3e5ecf
tcp-wrappers_7.6.q-ok2.dsc 1.7 KiB d3c4bac95c84dc1514bf97464d83580a4cdee39961e7d902df764cc5fcc34143

View changes file

Binary packages built by this source

libwrap0: Wietse Venema's TCP wrappers library

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

libwrap0-dbgsym: debug symbols for libwrap0
libwrap0-dev: Wietse Venema's TCP wrappers library, development files

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd: Wietse Venema's TCP wrapper utilities

 Wietse Venema's network logger, also known as TCPD or LOG_TCP.
 .
 These programs log the client host name of incoming telnet,
 ftp, rsh, rlogin, finger etc. requests.
 .
 Security options are:
  - access control per host, domain and/or service;
  - detection of host name spoofing or host address spoofing;
  - booby traps to implement an early-warning system.

tcpd-dbgsym: debug symbols for tcpd