Rev 2 | Rev 47 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
2 | magnus | 1 | Source: lsh |
2 | Section: net |
||
3 | Priority: extra |
||
4 | Maintainer: Simon Law <sfllaw@debian.org> |
||
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
||
6 | Magnus Holmgren <magnus@kibibyte.se> |
||
7 | Standards-Version: 3.7.2 |
||
8 | Build-Depends: cdbs, debhelper (>= 4.1.16), libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4, autotools-dev |
||
9 | |||
10 | Package: lsh-utils |
||
11 | Architecture: any |
||
12 | Depends: lsh-client, ${shlibs:Depends} |
||
13 | Recommends: lsh-server |
||
14 | Suggests: lsh-utils-doc |
||
15 | Conflicts: nettle-bin (<< 1.12-1), |
||
16 | Description: Secure Shell v2 (SSH2) protocol utilities |
||
17 | lsh is GNU GPL'd implementation of the Secure Shell |
||
18 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
||
19 | is a secure replacement for rlogin, rsh and rcp. |
||
20 | . |
||
21 | This package contains the lsh utilities. This includes |
||
22 | programs such as lsh-keygen, lsh-writekey (both programs |
||
23 | for public/private key generation), lsh-authorize (for |
||
24 | automatic remote key authentication), sexp-conv and ssh-conv |
||
25 | (utilities for converting between various public & private |
||
26 | key formats), and a number of other utilities for use with |
||
27 | both the lsh server and client. |
||
28 | . |
||
29 | In some countries it may be illegal to use any encryption |
||
30 | at all without a special permit. |
||
31 | |||
32 | Package: lsh-server |
||
33 | Architecture: any |
||
34 | Provides: ssh-server |
||
35 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0 |
||
36 | Conflicts: lsh-utils (<< 1.0.2-3) |
||
37 | Suggests: lsh-client | openssh-client |
||
38 | Description: Secure Shell v2 (SSH2) protocol server |
||
39 | lsh is GNU GPL'd implementation of the Secure Shell |
||
40 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
||
41 | is a secure replacement for rlogin, rsh and rcp. |
||
42 | . |
||
43 | This package contains the lsh server, lshd. This package is required |
||
44 | to allow SSH2 logins to the local machine. |
||
45 | . |
||
46 | In some countries it may be illegal to use any encryption |
||
47 | at all without a special permit. |
||
48 | |||
49 | Package: lsh-client |
||
50 | Architecture: any |
||
51 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends} |
||
52 | Conflicts: lsh-utils (<< 1.0.2-3) |
||
53 | Description: Secure Shell v2 (SSH2) protocol client |
||
54 | lsh is GNU GPL'd implementation of the Secure Shell |
||
55 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
||
56 | is a secure replacement for rlogin, rsh and rcp. |
||
57 | . |
||
58 | This package contains the lsh client. This package is |
||
59 | required to log into a remote lsh or ssh2 server. Please |
||
60 | note that the client binary is normally called 'lsh' rather |
||
61 | than 'lshc', but as there is already a 'lsh' binary in |
||
62 | Debian (the Limited SHell - see the 'lsh' package), the |
||
63 | client binary has been renamed to 'lshc'. All the other |
||
64 | program names remain as normal. |
||
65 | . |
||
66 | In some countries it may be illegal to use any encryption |
||
67 | at all without a special permit. |
||
68 | |||
69 | Package: lsh-doc |
||
70 | Architecture: all |
||
71 | Section: doc |
||
72 | Suggests: lsh-utils, lsh-server, lsh-client |
||
73 | Conflicts: lsh-utils (<< 1.0.2-3) |
||
74 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
||
75 | lsh is GNU GPL'd implementation of the Secure Shell |
||
76 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
||
77 | is a secure replacement for rlogin, rsh and rcp. |
||
78 | . |
||
79 | This package contains the lsh documentation, including info |
||
80 | pages, manpages about the various protocols which lsh uses, |
||
81 | as well as various documents about lsh internals, protocols |
||
82 | and general lsh development. |
||
83 | . |
||
84 | In some countries it may be illegal to use any encryption |
||
85 | at all without a special permit. |
||
86 |