Rev 9 | Rev 11 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
| Rev 9 | Rev 10 | ||
|---|---|---|---|
| 1 | Source: lsh |
1 | Source: lsh-utils |
| 2 | Section: net |
2 | Section: net |
| 3 | Priority: extra |
3 | Priority: extra |
| 4 | Maintainer: Simon Law <sfllaw@debian.org> |
4 | Maintainer: Simon Law <sfllaw@debian.org> |
| 5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
| 6 | Magnus Holmgren <magnus@kibibyte.se> |
6 | Magnus Holmgren <magnus@kibibyte.se> |
| 7 | Standards-Version: 3.7.2 |
7 | Standards-Version: 3.7.2 |
| 8 | Build-Depends: cdbs, debhelper (>= 4.1.16), dpatch, autotools-dev, |
8 | Build-Depends: cdbs, debhelper (>= 4.1.16), dpatch, autotools-dev, |
| 9 | libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, libnettle-dev, |
9 | libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, libnettle-dev, |
| 10 | texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, |
10 | texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, |
| 11 | libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4 |
11 | libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4 |
| 12 | 12 | ||
| 13 | Package: lsh-utils |
13 | Package: lsh-utils |
| 14 | Architecture: any |
14 | Architecture: any |
| 15 | Depends: lsh-client, ${shlibs:Depends}
|
15 | Depends: lsh-client, ${shlibs:Depends}
|
| 16 | Recommends: lsh-server |
16 | Recommends: lsh-server |
| 17 | Suggests: lsh-doc |
17 | Suggests: lsh-doc |
| 18 | Description: Secure Shell v2 (SSH2) protocol utilities |
18 | Description: Secure Shell v2 (SSH2) protocol utilities |
| 19 | lsh is GNU GPL'd implementation of the Secure Shell |
19 | lsh is GNU GPL'd implementation of the Secure Shell |
| 20 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
20 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
| 21 | is a secure replacement for rlogin, rsh and rcp. |
21 | is a secure replacement for rlogin, rsh and rcp. |
| 22 | . |
22 | . |
| 23 | This package contains the lsh utilities. This includes |
23 | This package contains the lsh utilities. This includes |
| 24 | programs such as lsh-keygen, lsh-writekey (both programs |
24 | programs such as lsh-keygen, lsh-writekey (both programs |
| 25 | for public/private key generation), lsh-authorize (for |
25 | for public/private key generation), lsh-authorize (for |
| 26 | automatic remote key authentication), sexp-conv and ssh-conv |
26 | automatic remote key authentication), sexp-conv and ssh-conv |
| 27 | (utilities for converting between various public & private |
27 | (utilities for converting between various public & private |
| 28 | key formats), and a number of other utilities for use with |
28 | key formats), and a number of other utilities for use with |
| 29 | both the lsh server and client. |
29 | both the lsh server and client. |
| 30 | . |
30 | . |
| 31 | In some countries it may be illegal to use any encryption |
31 | In some countries it may be illegal to use any encryption |
| 32 | at all without a special permit. |
32 | at all without a special permit. |
| 33 | 33 | ||
| 34 | Package: lsh-server |
34 | Package: lsh-server |
| 35 | Architecture: any |
35 | Architecture: any |
| 36 | Provides: ssh-server |
36 | Provides: ssh-server |
| 37 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0
|
37 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0
|
| 38 | Conflicts: lsh-utils (<< 1.0.2-3) |
38 | Conflicts: lsh-utils (<< 1.0.2-3) |
| 39 | Suggests: lsh-client | openssh-client |
39 | Suggests: lsh-client | openssh-client |
| 40 | Description: Secure Shell v2 (SSH2) protocol server |
40 | Description: Secure Shell v2 (SSH2) protocol server |
| 41 | lsh is GNU GPL'd implementation of the Secure Shell |
41 | lsh is GNU GPL'd implementation of the Secure Shell |
| 42 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
42 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
| 43 | is a secure replacement for rlogin, rsh and rcp. |
43 | is a secure replacement for rlogin, rsh and rcp. |
| 44 | . |
44 | . |
| 45 | This package contains the lsh server, lshd. This package is required |
45 | This package contains the lsh server, lshd. This package is required |
| 46 | to allow SSH2 logins to the local machine. |
46 | to allow SSH2 logins to the local machine. |
| 47 | . |
47 | . |
| 48 | In some countries it may be illegal to use any encryption |
48 | In some countries it may be illegal to use any encryption |
| 49 | at all without a special permit. |
49 | at all without a special permit. |
| 50 | 50 | ||
| 51 | Package: lsh-client |
51 | Package: lsh-client |
| 52 | Architecture: any |
52 | Architecture: any |
| 53 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}
|
53 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}
|
| 54 | Conflicts: lsh-utils (<< 2.0.4-dfsg-1) |
54 | Conflicts: lsh-utils (<< 2.0.4-dfsg-1) |
| 55 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
55 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
| 56 | Description: Secure Shell v2 (SSH2) protocol client |
56 | Description: Secure Shell v2 (SSH2) protocol client |
| 57 | lsh is GNU GPL'd implementation of the Secure Shell |
57 | lsh is GNU GPL'd implementation of the Secure Shell |
| 58 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
58 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
| 59 | is a secure replacement for rlogin, rsh and rcp. |
59 | is a secure replacement for rlogin, rsh and rcp. |
| 60 | . |
60 | . |
| 61 | This package contains the lsh client. This package is |
61 | This package contains the lsh client. This package is |
| 62 | required to log into a remote lsh or ssh2 server. Please |
62 | required to log into a remote lsh or ssh2 server. Please |
| 63 | note that the client binary is normally called 'lsh' rather |
63 | note that the client binary is normally called 'lsh' rather |
| 64 | than 'lshc', but as there is already a 'lsh' binary in |
64 | than 'lshc', but as there is already a 'lsh' binary in |
| 65 | Debian (the Limited SHell - see the 'lsh' package), the |
65 | Debian (the Limited SHell - see the 'lsh' package), the |
| 66 | client binary has been renamed to 'lshc'. All the other |
66 | client binary has been renamed to 'lshc'. All the other |
| 67 | program names remain as normal. |
67 | program names remain as normal. |
| 68 | . |
68 | . |
| 69 | In some countries it may be illegal to use any encryption |
69 | In some countries it may be illegal to use any encryption |
| 70 | at all without a special permit. |
70 | at all without a special permit. |
| 71 | 71 | ||
| 72 | Package: lsh-doc |
72 | Package: lsh-doc |
| 73 | Architecture: all |
73 | Architecture: all |
| 74 | Section: doc |
74 | Section: doc |
| 75 | Suggests: lsh-utils, lsh-server, lsh-client |
75 | Suggests: lsh-utils, lsh-server, lsh-client |
| 76 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1) |
76 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1) |
| 77 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
77 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
| 78 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
78 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
| 79 | lsh is GNU GPL'd implementation of the Secure Shell |
79 | lsh is GNU GPL'd implementation of the Secure Shell |
| 80 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
80 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
| 81 | is a secure replacement for rlogin, rsh and rcp. |
81 | is a secure replacement for rlogin, rsh and rcp. |
| 82 | . |
82 | . |
| 83 | This package contains the lsh documentation, including info |
83 | This package contains the lsh documentation, including info |
| 84 | pages, manpages about the various protocols which lsh uses, |
84 | pages, manpages about the various protocols which lsh uses, |
| 85 | as well as various documents about lsh internals, protocols |
85 | as well as various documents about lsh internals, protocols |
| 86 | and general lsh development. |
86 | and general lsh development. |
| 87 | . |
87 | . |
| 88 | In some countries it may be illegal to use any encryption |
88 | In some countries it may be illegal to use any encryption |
| 89 | at all without a special permit. |
89 | at all without a special permit. |