Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 60 | Rev 76 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
23 magnus 4
Maintainer: Magnus Holmgren <holmgren@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>
42 magnus 6
Standards-Version: 3.8.3
32 magnus 7
Build-Depends: cdbs, debhelper (>= 5), dpatch, autotools-dev,
33 magnus 8
 libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev,
8 magnus 9
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
10
 libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4
11 magnus 11
Homepage: http://www.lysator.liu.se/~nisse/lsh/
2 magnus 12
 
13
Package: lsh-utils
14
Architecture: any
62 magnus 15
Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends}
60 magnus 16
Recommends: openssh-blacklist, openssh-blacklist-extra
19 magnus 17
Suggests: lsh-server, lsh-client, lsh-doc
2 magnus 18
Description: Secure Shell v2 (SSH2) protocol utilities
13 magnus 19
 lsh is GNU GPL'd implementation of the Secure Shell protocol version
20
 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for
21
 rlogin, rsh and rcp.
2 magnus 22
 .
13 magnus 23
 This package contains the lsh utilities. This includes programs such
24
 as lsh-keygen, lsh-writekey (both programs for public/private key
25
 generation), lsh-authorize (for automatic remote key authentication),
26
 ssh-conv (utilities for converting between various public & private
27
 key formats), and a number of other utilities for use with both the
28
 lsh server and client.
2 magnus 29
 .
13 magnus 30
 In some countries it may be illegal to use any encryption at all
31
 without a special permit.
2 magnus 32
 
33
Package: lsh-server
34
Architecture: any
35
Provides: ssh-server
62 magnus 36
Depends: lsh-utils (= ${binary:Version}), openssh-blacklist,
37
 ${shlibs:Depends}, ${misc:Depends}
2 magnus 38
Conflicts: lsh-utils (<< 1.0.2-3)
60 magnus 39
Recommends: openssh-blacklist-extra
19 magnus 40
Suggests: lsh-client | openssh-client, lsh-doc
2 magnus 41
Description: Secure Shell v2 (SSH2) protocol server
42
 lsh is GNU GPL'd implementation of the Secure Shell
43
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
44
 is a secure replacement for rlogin, rsh and rcp.
45
 .
46
 This package contains the lsh server, lshd. This package is required
47
 to allow SSH2 logins to the local machine.
48
 .
49
 In some countries it may be illegal to use any encryption
50
 at all without a special permit.
51
 
52
Package: lsh-client
53
Architecture: any
62 magnus 54
Depends: nettle-bin, lsh-utils (= ${binary:Version}),
55
 ${shlibs:Depends}, ${misc:Depends}
9 magnus 56
Conflicts: lsh-utils (<< 2.0.4-dfsg-1)
57
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
19 magnus 58
Suggests: lsh-doc
2 magnus 59
Description: Secure Shell v2 (SSH2) protocol client
60
 lsh is GNU GPL'd implementation of the Secure Shell
61
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
62
 is a secure replacement for rlogin, rsh and rcp.
63
 .
13 magnus 64
 This package contains the lsh client used to log in to a remote lsh
65
 or ssh2 server.
2 magnus 66
 .
67
 In some countries it may be illegal to use any encryption
68
 at all without a special permit.
69
 
70
Package: lsh-doc
71
Architecture: all
72
Section: doc
35 magnus 73
Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends}
2 magnus 74
Suggests: lsh-utils, lsh-server, lsh-client
9 magnus 75
Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1)
76
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
2 magnus 77
Description: Secure Shell v2 (SSH2) client / server / utilities documentation
78
 lsh is GNU GPL'd implementation of the Secure Shell
79
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
80
 is a secure replacement for rlogin, rsh and rcp.
81
 .
82
 This package contains the lsh documentation, including info
83
 pages, manpages about the various protocols which lsh uses,
84
 as well as various documents about lsh internals, protocols
85
 and general lsh development.
86
 .
87
 In some countries it may be illegal to use any encryption
88
 at all without a special permit.