60 lines
1.9 KiB
Plaintext
60 lines
1.9 KiB
Plaintext
Source: tcp-wrappers
|
|
Section: net
|
|
Priority: optional
|
|
Maintainer: Marco d'Itri <md@linux.it>
|
|
Build-Depends: debhelper-compat (= 12)
|
|
Standards-Version: 4.4.1.1
|
|
Rules-Requires-Root: no
|
|
Vcs-Git: https://salsa.debian.org/md/tcp-wrappers.git
|
|
Vcs-Browser: https://salsa.debian.org/md/tcp-wrappers
|
|
|
|
Package: tcpd
|
|
Architecture: any
|
|
Multi-Arch: foreign
|
|
Pre-Depends: ${misc:Pre-Depends}
|
|
Depends: ${shlibs:Depends}, ${misc:Depends}
|
|
Description: Wietse Venema's TCP wrapper utilities
|
|
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
|
|
.
|
|
These programs log the client host name of incoming telnet,
|
|
ftp, rsh, rlogin, finger etc. requests.
|
|
.
|
|
Security options are:
|
|
- access control per host, domain and/or service;
|
|
- detection of host name spoofing or host address spoofing;
|
|
- booby traps to implement an early-warning system.
|
|
|
|
Package: libwrap0
|
|
Section: libs
|
|
Architecture: any
|
|
Multi-Arch: same
|
|
Pre-Depends: ${misc:Pre-Depends}
|
|
Depends: ${shlibs:Depends}, ${misc:Depends}
|
|
Description: Wietse Venema's TCP wrappers library
|
|
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
|
|
.
|
|
These programs log the client host name of incoming telnet,
|
|
ftp, rsh, rlogin, finger etc. requests.
|
|
.
|
|
Security options are:
|
|
- access control per host, domain and/or service;
|
|
- detection of host name spoofing or host address spoofing;
|
|
- booby traps to implement an early-warning system.
|
|
|
|
Package: libwrap0-dev
|
|
Section: libdevel
|
|
Architecture: any
|
|
Multi-Arch: same
|
|
Pre-Depends: ${misc:Pre-Depends}
|
|
Depends: libwrap0 (= ${binary:Version}), ${misc:Depends}
|
|
Description: Wietse Venema's TCP wrappers library, development files
|
|
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
|
|
.
|
|
These programs log the client host name of incoming telnet,
|
|
ftp, rsh, rlogin, finger etc. requests.
|
|
.
|
|
Security options are:
|
|
- access control per host, domain and/or service;
|
|
- detection of host name spoofing or host address spoofing;
|
|
- booby traps to implement an early-warning system.
|