Rev 62 | Rev 76 | Go to most recent revision | Only display areas with differences | Regard whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 62 | Rev 67 | ||
---|---|---|---|
1 | Source: lsh-utils |
1 | Source: lsh-utils |
2 | Section: net |
2 | Section: net |
3 | Priority: extra |
3 | Priority: extra |
4 | Maintainer: Magnus Holmgren <holmgren@debian.org> |
4 | Maintainer: Magnus Holmgren <holmgren@debian.org> |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de> |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de> |
6 | Standards-Version: 3.8.3 |
6 | Standards-Version: 3.8.3 |
7 | Build-Depends: cdbs, debhelper (>= 5), dpatch, autotools-dev, |
7 | Build-Depends: cdbs, debhelper (>= 5), dpatch, autotools-dev, |
8 | libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev, |
8 | libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev, |
9 | texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, |
9 | texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, |
10 | libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4 |
10 | libpam0g-dev | libpam-dev, libreadline-dev, m4 |
11 | Homepage: http://www.lysator.liu.se/~nisse/lsh/ |
11 | Homepage: http://www.lysator.liu.se/~nisse/lsh/ |
12 | 12 | ||
13 | Package: lsh-utils |
13 | Package: lsh-utils |
14 | Architecture: any |
14 | Architecture: any |
15 | Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends} |
15 | Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends} |
16 | Recommends: openssh-blacklist, openssh-blacklist-extra |
16 | Recommends: openssh-blacklist, openssh-blacklist-extra |
17 | Suggests: lsh-server, lsh-client, lsh-doc |
17 | Suggests: lsh-server, lsh-client, lsh-doc |
18 | Description: Secure Shell v2 (SSH2) protocol utilities |
18 | Description: Secure Shell v2 (SSH2) protocol utilities |
19 | lsh is GNU GPL'd implementation of the Secure Shell protocol version |
19 | lsh is GNU GPL'd implementation of the Secure Shell protocol version |
20 | 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for |
20 | 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for |
21 | rlogin, rsh and rcp. |
21 | rlogin, rsh and rcp. |
22 | . |
22 | . |
23 | This package contains the lsh utilities. This includes programs such |
23 | This package contains the lsh utilities. This includes programs such |
24 | as lsh-keygen, lsh-writekey (both programs for public/private key |
24 | as lsh-keygen, lsh-writekey (both programs for public/private key |
25 | generation), lsh-authorize (for automatic remote key authentication), |
25 | generation), lsh-authorize (for automatic remote key authentication), |
26 | ssh-conv (utilities for converting between various public & private |
26 | ssh-conv (utilities for converting between various public & private |
27 | key formats), and a number of other utilities for use with both the |
27 | key formats), and a number of other utilities for use with both the |
28 | lsh server and client. |
28 | lsh server and client. |
29 | . |
29 | . |
30 | In some countries it may be illegal to use any encryption at all |
30 | In some countries it may be illegal to use any encryption at all |
31 | without a special permit. |
31 | without a special permit. |
32 | 32 | ||
33 | Package: lsh-server |
33 | Package: lsh-server |
34 | Architecture: any |
34 | Architecture: any |
35 | Provides: ssh-server |
35 | Provides: ssh-server |
36 | Depends: lsh-utils (= ${binary:Version}), openssh-blacklist, |
36 | Depends: lsh-utils (= ${binary:Version}), openssh-blacklist, |
37 | ${shlibs:Depends}, ${misc:Depends} |
37 | ${shlibs:Depends}, ${misc:Depends} |
38 | Conflicts: lsh-utils (<< 1.0.2-3) |
38 | Conflicts: lsh-utils (<< 1.0.2-3) |
39 | Recommends: openssh-blacklist-extra |
39 | Recommends: openssh-blacklist-extra |
40 | Suggests: lsh-client | openssh-client, lsh-doc |
40 | Suggests: lsh-client | openssh-client, lsh-doc |
41 | Description: Secure Shell v2 (SSH2) protocol server |
41 | Description: Secure Shell v2 (SSH2) protocol server |
42 | lsh is GNU GPL'd implementation of the Secure Shell |
42 | lsh is GNU GPL'd implementation of the Secure Shell |
43 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
43 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
44 | is a secure replacement for rlogin, rsh and rcp. |
44 | is a secure replacement for rlogin, rsh and rcp. |
45 | . |
45 | . |
46 | This package contains the lsh server, lshd. This package is required |
46 | This package contains the lsh server, lshd. This package is required |
47 | to allow SSH2 logins to the local machine. |
47 | to allow SSH2 logins to the local machine. |
48 | . |
48 | . |
49 | In some countries it may be illegal to use any encryption |
49 | In some countries it may be illegal to use any encryption |
50 | at all without a special permit. |
50 | at all without a special permit. |
51 | 51 | ||
52 | Package: lsh-client |
52 | Package: lsh-client |
53 | Architecture: any |
53 | Architecture: any |
54 | Depends: nettle-bin, lsh-utils (= ${binary:Version}), |
54 | Depends: nettle-bin, lsh-utils (= ${binary:Version}), |
55 | ${shlibs:Depends}, ${misc:Depends} |
55 | ${shlibs:Depends}, ${misc:Depends} |
56 | Conflicts: lsh-utils (<< 2.0.4-dfsg-1) |
56 | Conflicts: lsh-utils (<< 2.0.4-dfsg-1) |
57 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
57 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
58 | Suggests: lsh-doc |
58 | Suggests: lsh-doc |
59 | Description: Secure Shell v2 (SSH2) protocol client |
59 | Description: Secure Shell v2 (SSH2) protocol client |
60 | lsh is GNU GPL'd implementation of the Secure Shell |
60 | lsh is GNU GPL'd implementation of the Secure Shell |
61 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
61 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
62 | is a secure replacement for rlogin, rsh and rcp. |
62 | is a secure replacement for rlogin, rsh and rcp. |
63 | . |
63 | . |
64 | This package contains the lsh client used to log in to a remote lsh |
64 | This package contains the lsh client used to log in to a remote lsh |
65 | or ssh2 server. |
65 | or ssh2 server. |
66 | . |
66 | . |
67 | In some countries it may be illegal to use any encryption |
67 | In some countries it may be illegal to use any encryption |
68 | at all without a special permit. |
68 | at all without a special permit. |
69 | 69 | ||
70 | Package: lsh-doc |
70 | Package: lsh-doc |
71 | Architecture: all |
71 | Architecture: all |
72 | Section: doc |
72 | Section: doc |
73 | Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends} |
73 | Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends} |
74 | Suggests: lsh-utils, lsh-server, lsh-client |
74 | Suggests: lsh-utils, lsh-server, lsh-client |
75 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1) |
75 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1) |
76 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
76 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
77 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
77 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
78 | lsh is GNU GPL'd implementation of the Secure Shell |
78 | lsh is GNU GPL'd implementation of the Secure Shell |
79 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
79 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
80 | is a secure replacement for rlogin, rsh and rcp. |
80 | is a secure replacement for rlogin, rsh and rcp. |
81 | . |
81 | . |
82 | This package contains the lsh documentation, including info |
82 | This package contains the lsh documentation, including info |
83 | pages, manpages about the various protocols which lsh uses, |
83 | pages, manpages about the various protocols which lsh uses, |
84 | as well as various documents about lsh internals, protocols |
84 | as well as various documents about lsh internals, protocols |
85 | and general lsh development. |
85 | and general lsh development. |
86 | . |
86 | . |
87 | In some countries it may be illegal to use any encryption |
87 | In some countries it may be illegal to use any encryption |
88 | at all without a special permit. |
88 | at all without a special permit. |