Rev 11 | Rev 14 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 11 | Rev 13 | ||
---|---|---|---|
1 | Source: lsh-utils |
1 | Source: lsh-utils |
2 | Section: net |
2 | Section: net |
3 | Priority: extra |
3 | Priority: extra |
4 | Maintainer: Simon Law <sfllaw@debian.org> |
4 | Maintainer: Simon Law <sfllaw@debian.org> |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
6 | Magnus Holmgren <holmgren@debian.org> |
6 | Magnus Holmgren <holmgren@debian.org> |
7 | Standards-Version: 3.7.2 |
7 | Standards-Version: 3.7.2 |
8 | Build-Depends: cdbs, debhelper (>= 4.1.16), dpatch, autotools-dev, |
8 | Build-Depends: cdbs, debhelper (>= 4.1.16), dpatch, autotools-dev, |
9 | libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, libnettle-dev, |
9 | libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, libnettle-dev, |
10 | texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, |
10 | texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, |
11 | libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4 |
11 | libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4 |
12 | Homepage: http://www.lysator.liu.se/~nisse/lsh/ |
12 | Homepage: http://www.lysator.liu.se/~nisse/lsh/ |
13 | 13 | ||
14 | Package: lsh-utils |
14 | Package: lsh-utils |
15 | Architecture: any |
15 | Architecture: any |
16 | Depends: lsh-client, ${shlibs:Depends} |
16 | Depends: lsh-client, ${shlibs:Depends} |
17 | Recommends: lsh-server |
17 | Recommends: lsh-server |
18 | Suggests: lsh-doc |
18 | Suggests: lsh-doc |
19 | Description: Secure Shell v2 (SSH2) protocol utilities |
19 | Description: Secure Shell v2 (SSH2) protocol utilities |
20 | lsh is GNU GPL'd implementation of the Secure Shell |
20 | lsh is GNU GPL'd implementation of the Secure Shell protocol version |
21 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
21 | 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for |
22 | is a secure replacement for rlogin, rsh and rcp. |
22 | rlogin, rsh and rcp. |
- | 23 | . |
|
- | 24 | This package contains the lsh utilities. This includes programs such |
|
- | 25 | as lsh-keygen, lsh-writekey (both programs for public/private key |
|
- | 26 | generation), lsh-authorize (for automatic remote key authentication), |
|
- | 27 | ssh-conv (utilities for converting between various public & private |
|
- | 28 | key formats), and a number of other utilities for use with both the |
|
- | 29 | lsh server and client. |
|
23 | . |
30 | . |
24 | This package contains the lsh utilities. This includes |
- | |
25 | programs such as lsh-keygen, lsh-writekey (both programs |
- | |
26 | for public/private key generation), lsh-authorize (for |
- | |
27 | automatic remote key authentication), sexp-conv and ssh-conv |
- | |
28 | (utilities for converting between various public & private |
- | |
29 | key formats), and a number of other utilities for use with |
- | |
30 | both the lsh server and client. |
- | |
31 | . |
- | |
32 | In some countries it may be illegal to use any encryption |
31 | In some countries it may be illegal to use any encryption at all |
33 | at all without a special permit. |
32 | without a special permit. |
34 | 33 | ||
35 | Package: lsh-server |
34 | Package: lsh-server |
36 | Architecture: any |
35 | Architecture: any |
37 | Provides: ssh-server |
36 | Provides: ssh-server |
38 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0 |
37 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0 |
39 | Conflicts: lsh-utils (<< 1.0.2-3) |
38 | Conflicts: lsh-utils (<< 1.0.2-3) |
40 | Suggests: lsh-client | openssh-client |
39 | Suggests: lsh-client | openssh-client |
41 | Description: Secure Shell v2 (SSH2) protocol server |
40 | Description: Secure Shell v2 (SSH2) protocol server |
42 | lsh is GNU GPL'd implementation of the Secure Shell |
41 | lsh is GNU GPL'd implementation of the Secure Shell |
43 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
42 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
44 | is a secure replacement for rlogin, rsh and rcp. |
43 | is a secure replacement for rlogin, rsh and rcp. |
45 | . |
44 | . |
46 | This package contains the lsh server, lshd. This package is required |
45 | This package contains the lsh server, lshd. This package is required |
47 | to allow SSH2 logins to the local machine. |
46 | to allow SSH2 logins to the local machine. |
48 | . |
47 | . |
49 | In some countries it may be illegal to use any encryption |
48 | In some countries it may be illegal to use any encryption |
50 | at all without a special permit. |
49 | at all without a special permit. |
51 | 50 | ||
52 | Package: lsh-client |
51 | Package: lsh-client |
53 | Architecture: any |
52 | Architecture: any |
54 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends} |
53 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends} |
55 | Conflicts: lsh-utils (<< 2.0.4-dfsg-1) |
54 | Conflicts: lsh-utils (<< 2.0.4-dfsg-1) |
56 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
55 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
57 | Description: Secure Shell v2 (SSH2) protocol client |
56 | Description: Secure Shell v2 (SSH2) protocol client |
58 | lsh is GNU GPL'd implementation of the Secure Shell |
57 | lsh is GNU GPL'd implementation of the Secure Shell |
59 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
58 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
60 | is a secure replacement for rlogin, rsh and rcp. |
59 | is a secure replacement for rlogin, rsh and rcp. |
61 | . |
60 | . |
62 | This package contains the lsh client. This package is |
61 | This package contains the lsh client used to log in to a remote lsh |
63 | required to log into a remote lsh or ssh2 server. Please |
- | |
64 | note that the client binary is normally called 'lsh' rather |
- | |
65 | than 'lshc', but as there is already a 'lsh' binary in |
- | |
66 | Debian (the Limited SHell - see the 'lsh' package), the |
- | |
67 | client binary has been renamed to 'lshc'. All the other |
- | |
68 | program names remain as normal. |
62 | or ssh2 server. |
69 | . |
63 | . |
70 | In some countries it may be illegal to use any encryption |
64 | In some countries it may be illegal to use any encryption |
71 | at all without a special permit. |
65 | at all without a special permit. |
72 | 66 | ||
73 | Package: lsh-doc |
67 | Package: lsh-doc |
74 | Architecture: all |
68 | Architecture: all |
75 | Section: doc |
69 | Section: doc |
76 | Suggests: lsh-utils, lsh-server, lsh-client |
70 | Suggests: lsh-utils, lsh-server, lsh-client |
77 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1) |
71 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1) |
78 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
72 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
79 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
73 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
80 | lsh is GNU GPL'd implementation of the Secure Shell |
74 | lsh is GNU GPL'd implementation of the Secure Shell |
81 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
75 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
82 | is a secure replacement for rlogin, rsh and rcp. |
76 | is a secure replacement for rlogin, rsh and rcp. |
83 | . |
77 | . |
84 | This package contains the lsh documentation, including info |
78 | This package contains the lsh documentation, including info |
85 | pages, manpages about the various protocols which lsh uses, |
79 | pages, manpages about the various protocols which lsh uses, |
86 | as well as various documents about lsh internals, protocols |
80 | as well as various documents about lsh internals, protocols |
87 | and general lsh development. |
81 | and general lsh development. |
88 | . |
82 | . |
89 | In some countries it may be illegal to use any encryption |
83 | In some countries it may be illegal to use any encryption |
90 | at all without a special permit. |
84 | at all without a special permit. |