Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 113 | Rev 120 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
23 magnus 4
Maintainer: Magnus Holmgren <holmgren@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>
114 magnus 6
Standards-Version: 3.9.5
93 magnus 7
Build-Depends: dpkg-dev (>= 1.15.7), debhelper (>= 7), dh-autoreconf, automake,
91 magnus 8
 libgmp-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev (>= 2.2~), nettle-bin,
8 magnus 9
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
67 magnus 10
 libpam0g-dev | libpam-dev, libreadline-dev, m4
11 magnus 11
Homepage: http://www.lysator.liu.se/~nisse/lsh/
2 magnus 12
 
13
Package: lsh-utils
14
Architecture: any
62 magnus 15
Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends}
60 magnus 16
Recommends: openssh-blacklist, openssh-blacklist-extra
19 magnus 17
Suggests: lsh-server, lsh-client, lsh-doc
2 magnus 18
Description: Secure Shell v2 (SSH2) protocol utilities
102 magnus 19
 lsh is a GPLed implementation of the Secure SHell protocol version 2
20
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 21
 .
13 magnus 22
 This package contains the lsh utilities. This includes programs such
23
 as lsh-keygen, lsh-writekey (both programs for public/private key
24
 generation), lsh-authorize (for automatic remote key authentication),
102 magnus 25
 ssh-conv (utilities for converting between various public and private
13 magnus 26
 key formats), and a number of other utilities for use with both the
27
 lsh server and client.
2 magnus 28
 .
13 magnus 29
 In some countries it may be illegal to use any encryption at all
30
 without a special permit.
2 magnus 31
 
32
Package: lsh-server
33
Architecture: any
34
Provides: ssh-server
62 magnus 35
Depends: lsh-utils (= ${binary:Version}), openssh-blacklist,
36
 ${shlibs:Depends}, ${misc:Depends}
60 magnus 37
Recommends: openssh-blacklist-extra
19 magnus 38
Suggests: lsh-client | openssh-client, lsh-doc
2 magnus 39
Description: Secure Shell v2 (SSH2) protocol server
102 magnus 40
 lsh is a GPLed implementation of the Secure SHell protocol version 2
41
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 42
 .
43
 This package contains the lsh server, lshd. This package is required
44
 to allow SSH2 logins to the local machine.
45
 .
46
 In some countries it may be illegal to use any encryption
47
 at all without a special permit.
48
 
49
Package: lsh-client
50
Architecture: any
62 magnus 51
Depends: nettle-bin, lsh-utils (= ${binary:Version}),
52
 ${shlibs:Depends}, ${misc:Depends}
76 magnus 53
Breaks: lsh-utils (<< 2.0.4-dfsg-1)
9 magnus 54
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
19 magnus 55
Suggests: lsh-doc
2 magnus 56
Description: Secure Shell v2 (SSH2) protocol client
102 magnus 57
 lsh is a GPLed implementation of the Secure SHell protocol version 2
58
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 59
 .
13 magnus 60
 This package contains the lsh client used to log in to a remote lsh
102 magnus 61
 or SSH2 server.
2 magnus 62
 .
63
 In some countries it may be illegal to use any encryption
64
 at all without a special permit.
65
 
66
Package: lsh-doc
67
Architecture: all
68
Section: doc
113 magnus 69
Depends: ${misc:Depends}
2 magnus 70
Suggests: lsh-utils, lsh-server, lsh-client
76 magnus 71
Conflicts: lsh-utils (<< 1.0.2-3)
72
Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1)
9 magnus 73
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
102 magnus 74
Description: Secure Shell v2 (SSH2) documentation
75
 lsh is a GPLed implementation of the Secure SHell protocol version 2
76
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 77
 .
78
 This package contains the lsh documentation, including info
102 magnus 79
 pages and manpages about the various protocols which lsh uses,
80
 as well as various documents about lsh internals, protocols,
2 magnus 81
 and general lsh development.
82
 .
83
 In some countries it may be illegal to use any encryption
84
 at all without a special permit.