           SPELL=thp
         VERSION=0.4.6
          SOURCE=${SPELL}-${VERSION}.tar.gz
SOURCE_DIRECTORY=${BUILD_DIRECTORY}/${SPELL}-${VERSION}
   SOURCE_URL[0]=http://www.alpinista.org/files/${SPELL}/${SOURCE}
     SOURCE_HASH=sha512:9d60a78d4dd4cb526dee3e318846a24baa3f860812ed107ec8998b668dccc0c25e54cdf874a444b358f66327272f1125b9882192f36ab1019cd614d7638e1916
      LICENSE[0]=GPL
         ENTERED=20030729
        WEB_SITE=http://www.alpinista.org/files/thp/
        KEYWORDS="firewall security"
       BUILD_API=1
           SHORT="Tiny Honeypot (thp) is a simple honey pot program based on iptables redirects and an xinetd listener."
cat << EOF
Tiny Honeypot (thp) is a simple honey pot program based on iptables 
redirects and an xinetd listener. It listens on every TCP port not 
currently in use, logging all activity and providing some feedback 
to the attacker. The responders are entirely written in Perl, and 
provide just enough interaction to fool most automated attack tools, 
as well as quite a few humans, at least for a little while. With 
appropriate limits (default), thp can reside on production hosts 
with negligible impact on performance.
EOF
