Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 10 | Rev 14 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
4
Maintainer: Simon Law <sfllaw@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>,
11 magnus 6
 Magnus Holmgren <holmgren@debian.org>
2 magnus 7
Standards-Version: 3.7.2
8 magnus 8
Build-Depends: cdbs, debhelper (>= 4.1.16), dpatch, autotools-dev,
9
 libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, libnettle-dev,
10
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
11
 libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4
11 magnus 12
Homepage: http://www.lysator.liu.se/~nisse/lsh/
2 magnus 13
 
14
Package: lsh-utils
15
Architecture: any
16
Depends: lsh-client, ${shlibs:Depends}
17
Recommends: lsh-server
6 magnus 18
Suggests: lsh-doc
2 magnus 19
Description: Secure Shell v2 (SSH2) protocol utilities
20
 lsh is GNU GPL'd implementation of the Secure Shell
21
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
22
 is a secure replacement for rlogin, rsh and rcp.
23
 .
24
 This package contains the lsh utilities. This includes
25
 programs such as lsh-keygen, lsh-writekey (both programs
26
 for public/private key generation), lsh-authorize (for
27
 automatic remote key authentication), sexp-conv and ssh-conv
28
 (utilities for converting between various public & private
29
 key formats), and a number of other utilities for use with
30
 both the lsh server and client.
31
 .
32
 In some countries it may be illegal to use any encryption
33
 at all without a special permit.
34
 
35
Package: lsh-server
36
Architecture: any
37
Provides: ssh-server
38
Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0
39
Conflicts: lsh-utils (<< 1.0.2-3)
40
Suggests: lsh-client | openssh-client
41
Description: Secure Shell v2 (SSH2) protocol server
42
 lsh is GNU GPL'd implementation of the Secure Shell
43
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
44
 is a secure replacement for rlogin, rsh and rcp.
45
 .
46
 This package contains the lsh server, lshd. This package is required
47
 to allow SSH2 logins to the local machine.
48
 .
49
 In some countries it may be illegal to use any encryption
50
 at all without a special permit.
51
 
52
Package: lsh-client
53
Architecture: any
54
Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}
9 magnus 55
Conflicts: lsh-utils (<< 2.0.4-dfsg-1)
56
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
2 magnus 57
Description: Secure Shell v2 (SSH2) protocol client
58
 lsh is GNU GPL'd implementation of the Secure Shell
59
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
60
 is a secure replacement for rlogin, rsh and rcp.
61
 .
62
 This package contains the lsh client. This package is
63
 required to log into a remote lsh or ssh2 server. Please
64
 note that the client binary is normally called 'lsh' rather
65
 than 'lshc', but as there is already a 'lsh' binary in
66
 Debian (the Limited SHell - see the 'lsh' package), the
67
 client binary has been renamed to 'lshc'. All the other
68
 program names remain as normal.
69
 .
70
 In some countries it may be illegal to use any encryption
71
 at all without a special permit.
72
 
73
Package: lsh-doc
74
Architecture: all
75
Section: doc
76
Suggests: lsh-utils, lsh-server, lsh-client
9 magnus 77
Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1)
78
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
2 magnus 79
Description: Secure Shell v2 (SSH2) client / server / utilities documentation
80
 lsh is GNU GPL'd implementation of the Secure Shell
81
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
82
 is a secure replacement for rlogin, rsh and rcp.
83
 .
84
 This package contains the lsh documentation, including info
85
 pages, manpages about the various protocols which lsh uses,
86
 as well as various documents about lsh internals, protocols
87
 and general lsh development.
88
 .
89
 In some countries it may be illegal to use any encryption
90
 at all without a special permit.