Rev 100 | Rev 107 | Go to most recent revision | Show entire file | Regard whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 100 | Rev 102 | ||
---|---|---|---|
Line 14... | Line 14... | ||
14 | Architecture: any |
14 | Architecture: any |
15 | Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends} |
15 | Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends} |
16 | Recommends: openssh-blacklist, openssh-blacklist-extra |
16 | Recommends: openssh-blacklist, openssh-blacklist-extra |
17 | Suggests: lsh-server, lsh-client, lsh-doc |
17 | Suggests: lsh-server, lsh-client, lsh-doc |
18 | Description: Secure Shell v2 (SSH2) protocol utilities |
18 | Description: Secure Shell v2 (SSH2) protocol utilities |
19 | lsh is GNU GPL'd implementation of the Secure Shell protocol version |
19 | lsh is a GPLed implementation of the Secure SHell protocol version 2 |
20 | 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for |
20 | (SSH2), a secure replacement for rlogin, rsh, and rcp. |
21 | rlogin, rsh and rcp. |
- | |
22 | . |
21 | . |
23 | This package contains the lsh utilities. This includes programs such |
22 | This package contains the lsh utilities. This includes programs such |
24 | as lsh-keygen, lsh-writekey (both programs for public/private key |
23 | as lsh-keygen, lsh-writekey (both programs for public/private key |
25 | generation), lsh-authorize (for automatic remote key authentication), |
24 | generation), lsh-authorize (for automatic remote key authentication), |
26 | ssh-conv (utilities for converting between various public & private |
25 | ssh-conv (utilities for converting between various public and private |
27 | key formats), and a number of other utilities for use with both the |
26 | key formats), and a number of other utilities for use with both the |
28 | lsh server and client. |
27 | lsh server and client. |
29 | . |
28 | . |
30 | In some countries it may be illegal to use any encryption at all |
29 | In some countries it may be illegal to use any encryption at all |
31 | without a special permit. |
30 | without a special permit. |
Line 36... | Line 35... | ||
36 | Depends: lsh-utils (= ${binary:Version}), openssh-blacklist, |
35 | Depends: lsh-utils (= ${binary:Version}), openssh-blacklist, |
37 | ${shlibs:Depends}, ${misc:Depends} |
36 | ${shlibs:Depends}, ${misc:Depends} |
38 | Recommends: openssh-blacklist-extra |
37 | Recommends: openssh-blacklist-extra |
39 | Suggests: lsh-client | openssh-client, lsh-doc |
38 | Suggests: lsh-client | openssh-client, lsh-doc |
40 | Description: Secure Shell v2 (SSH2) protocol server |
39 | Description: Secure Shell v2 (SSH2) protocol server |
41 | lsh is GNU GPL'd implementation of the Secure Shell |
40 | lsh is a GPLed implementation of the Secure SHell protocol version 2 |
42 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
- | |
43 | is a secure replacement for rlogin, rsh and rcp. |
41 | (SSH2), a secure replacement for rlogin, rsh, and rcp. |
44 | . |
42 | . |
45 | This package contains the lsh server, lshd. This package is required |
43 | This package contains the lsh server, lshd. This package is required |
46 | to allow SSH2 logins to the local machine. |
44 | to allow SSH2 logins to the local machine. |
47 | . |
45 | . |
48 | In some countries it may be illegal to use any encryption |
46 | In some countries it may be illegal to use any encryption |
Line 54... | Line 52... | ||
54 | ${shlibs:Depends}, ${misc:Depends} |
52 | ${shlibs:Depends}, ${misc:Depends} |
55 | Breaks: lsh-utils (<< 2.0.4-dfsg-1) |
53 | Breaks: lsh-utils (<< 2.0.4-dfsg-1) |
56 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
54 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) |
57 | Suggests: lsh-doc |
55 | Suggests: lsh-doc |
58 | Description: Secure Shell v2 (SSH2) protocol client |
56 | Description: Secure Shell v2 (SSH2) protocol client |
59 | lsh is GNU GPL'd implementation of the Secure Shell |
57 | lsh is a GPLed implementation of the Secure SHell protocol version 2 |
60 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
- | |
61 | is a secure replacement for rlogin, rsh and rcp. |
58 | (SSH2), a secure replacement for rlogin, rsh, and rcp. |
62 | . |
59 | . |
63 | This package contains the lsh client used to log in to a remote lsh |
60 | This package contains the lsh client used to log in to a remote lsh |
64 | or ssh2 server. |
61 | or SSH2 server. |
65 | . |
62 | . |
66 | In some countries it may be illegal to use any encryption |
63 | In some countries it may be illegal to use any encryption |
67 | at all without a special permit. |
64 | at all without a special permit. |
68 | 65 | ||
69 | Package: lsh-doc |
66 | Package: lsh-doc |
Line 72... | Line 69... | ||
72 | Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends} |
69 | Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends} |
73 | Suggests: lsh-utils, lsh-server, lsh-client |
70 | Suggests: lsh-utils, lsh-server, lsh-client |
74 | Conflicts: lsh-utils (<< 1.0.2-3) |
71 | Conflicts: lsh-utils (<< 1.0.2-3) |
75 | Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1) |
72 | Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1) |
76 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
73 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) |
77 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
74 | Description: Secure Shell v2 (SSH2) documentation |
78 | lsh is GNU GPL'd implementation of the Secure Shell |
75 | lsh is a GPLed implementation of the Secure SHell protocol version 2 |
79 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
- | |
80 | is a secure replacement for rlogin, rsh and rcp. |
76 | (SSH2), a secure replacement for rlogin, rsh, and rcp. |
81 | . |
77 | . |
82 | This package contains the lsh documentation, including info |
78 | This package contains the lsh documentation, including info |
83 | pages, manpages about the various protocols which lsh uses, |
79 | pages and manpages about the various protocols which lsh uses, |
84 | as well as various documents about lsh internals, protocols |
80 | as well as various documents about lsh internals, protocols, |
85 | and general lsh development. |
81 | and general lsh development. |
86 | . |
82 | . |
87 | In some countries it may be illegal to use any encryption |
83 | In some countries it may be illegal to use any encryption |
88 | at all without a special permit. |
84 | at all without a special permit. |