1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
|
Source: tcp-wrappers
Section: net
Priority: important
Maintainer: Marco d'Itri <md@linux.it>
Build-Depends: debhelper (>= 9)
Standards-Version: 3.9.8
Vcs-Git: https://anonscm.debian.org/git/users/md/tcp-wrappers.git
Vcs-Browser: https://anonscm.debian.org/cgit/users/md/tcp-wrappers.git
Package: tcpd
Priority: optional
Architecture: any
Multi-Arch: foreign
Depends: ${shlibs:Depends}, ${misc:Depends}
Description: Wietse Venema's TCP wrapper utilities
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
Package: libwrap0
Section: libs
Priority: standard
Architecture: any
Multi-Arch: same
Pre-Depends: ${misc:Pre-Depends}
Depends: ${shlibs:Depends}, ${misc:Depends}
Breaks: tcpd (<< 7.6.q-20)
Replaces: tcpd (<< 7.6.q-20)
Recommends: tcpd
Description: Wietse Venema's TCP wrappers library
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
Package: libwrap0-dev
Section: libdevel
Priority: optional
Architecture: any
Multi-Arch: same
Depends: libwrap0 (= ${binary:Version}), ${misc:Depends}
Description: Wietse Venema's TCP wrappers library, development files
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
|