Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 57 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
29 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
29 magnus 4
Maintainer: Magnus Holmgren <holmgren@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>
54 magnus 6
Standards-Version: 3.8.3
47 magnus 7
Build-Depends: cdbs, debhelper (>= 5), dpatch, autotools-dev,
29 magnus 8
 libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev,
9
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
10
 libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4
11
Homepage: http://www.lysator.liu.se/~nisse/lsh/
57 magnus 12
Vcs-Svn: svn://svn.kibibyte.se/lsh/branches/experimental
13
Vcs-Browser: http://svn.kibibyte.se/lsh
2 magnus 14
 
15
Package: lsh-utils
16
Architecture: any
49 magnus 17
Depends: nettle-bin, ${shlibs:Depends}, ${misc:Depends}
29 magnus 18
Suggests: lsh-server, lsh-client, lsh-doc
2 magnus 19
Description: Secure Shell v2 (SSH2) protocol utilities
29 magnus 20
 lsh is GNU GPL'd implementation of the Secure Shell protocol version
21
 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for
22
 rlogin, rsh and rcp.
2 magnus 23
 .
29 magnus 24
 This package contains the lsh utilities. This includes programs such
25
 as lsh-keygen, lsh-writekey (both programs for public/private key
26
 generation), lsh-authorize (for automatic remote key authentication),
27
 ssh-conv (utilities for converting between various public & private
28
 key formats), and a number of other utilities for use with both the
29
 lsh server and client.
2 magnus 30
 .
29 magnus 31
 In some countries it may be illegal to use any encryption at all
32
 without a special permit.
2 magnus 33
 
34
Package: lsh-server
35
Architecture: any
36
Provides: ssh-server
49 magnus 37
Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, ${misc:Depends}
2 magnus 38
Conflicts: lsh-utils (<< 1.0.2-3)
29 magnus 39
Suggests: lsh-client | openssh-client, lsh-doc
2 magnus 40
Description: Secure Shell v2 (SSH2) protocol server
41
 lsh is GNU GPL'd implementation of the Secure Shell
42
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
43
 is a secure replacement for rlogin, rsh and rcp.
44
 .
45
 This package contains the lsh server, lshd. This package is required
46
 to allow SSH2 logins to the local machine.
47
 .
48
 In some countries it may be illegal to use any encryption
49
 at all without a special permit.
50
 
51
Package: lsh-client
52
Architecture: any
58 magnus 53
Depends: nettle-bin (>= 2.0), ${shlibs:Depends}, ${misc:Depends}, lsh-utils (= ${binary:Version})
29 magnus 54
Conflicts: lsh-utils (<< 2.0.4-dfsg-1)
55
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
56
Suggests: lsh-doc
2 magnus 57
Description: Secure Shell v2 (SSH2) protocol client
58
 lsh is GNU GPL'd implementation of the Secure Shell
59
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
60
 is a secure replacement for rlogin, rsh and rcp.
61
 .
29 magnus 62
 This package contains the lsh client used to log in to a remote lsh
63
 or ssh2 server.
2 magnus 64
 .
65
 In some countries it may be illegal to use any encryption
66
 at all without a special permit.
67
 
68
Package: lsh-doc
69
Architecture: all
70
Section: doc
49 magnus 71
Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends}
2 magnus 72
Suggests: lsh-utils, lsh-server, lsh-client
29 magnus 73
Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1)
74
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
2 magnus 75
Description: Secure Shell v2 (SSH2) client / server / utilities documentation
76
 lsh is GNU GPL'd implementation of the Secure Shell
77
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
78
 is a secure replacement for rlogin, rsh and rcp.
79
 .
80
 This package contains the lsh documentation, including info
81
 pages, manpages about the various protocols which lsh uses,
82
 as well as various documents about lsh internals, protocols
83
 and general lsh development.
84
 .
85
 In some countries it may be illegal to use any encryption
86
 at all without a special permit.