Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 81 | Rev 90 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
23 magnus 4
Maintainer: Magnus Holmgren <holmgren@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>
76 magnus 6
Standards-Version: 3.9.1
84 magnus 7
Build-Depends: debhelper (>= 7), dh-autoreconf, automake,
81 magnus 8
 libgmp10-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev (>= 2.1), nettle-bin,
8 magnus 9
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
67 magnus 10
 libpam0g-dev | libpam-dev, libreadline-dev, m4
11 magnus 11
Homepage: http://www.lysator.liu.se/~nisse/lsh/
2 magnus 12
 
13
Package: lsh-utils
14
Architecture: any
62 magnus 15
Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends}
60 magnus 16
Recommends: openssh-blacklist, openssh-blacklist-extra
19 magnus 17
Suggests: lsh-server, lsh-client, lsh-doc
2 magnus 18
Description: Secure Shell v2 (SSH2) protocol utilities
13 magnus 19
 lsh is GNU GPL'd implementation of the Secure Shell protocol version
20
 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for
21
 rlogin, rsh and rcp.
2 magnus 22
 .
13 magnus 23
 This package contains the lsh utilities. This includes programs such
24
 as lsh-keygen, lsh-writekey (both programs for public/private key
25
 generation), lsh-authorize (for automatic remote key authentication),
26
 ssh-conv (utilities for converting between various public & private
27
 key formats), and a number of other utilities for use with both the
28
 lsh server and client.
2 magnus 29
 .
13 magnus 30
 In some countries it may be illegal to use any encryption at all
31
 without a special permit.
2 magnus 32
 
33
Package: lsh-server
34
Architecture: any
35
Provides: ssh-server
62 magnus 36
Depends: lsh-utils (= ${binary:Version}), openssh-blacklist,
37
 ${shlibs:Depends}, ${misc:Depends}
60 magnus 38
Recommends: openssh-blacklist-extra
19 magnus 39
Suggests: lsh-client | openssh-client, lsh-doc
2 magnus 40
Description: Secure Shell v2 (SSH2) protocol server
41
 lsh is GNU GPL'd implementation of the Secure Shell
42
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
43
 is a secure replacement for rlogin, rsh and rcp.
44
 .
45
 This package contains the lsh server, lshd. This package is required
46
 to allow SSH2 logins to the local machine.
47
 .
48
 In some countries it may be illegal to use any encryption
49
 at all without a special permit.
50
 
51
Package: lsh-client
52
Architecture: any
62 magnus 53
Depends: nettle-bin, lsh-utils (= ${binary:Version}),
54
 ${shlibs:Depends}, ${misc:Depends}
76 magnus 55
Breaks: lsh-utils (<< 2.0.4-dfsg-1)
9 magnus 56
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
19 magnus 57
Suggests: lsh-doc
2 magnus 58
Description: Secure Shell v2 (SSH2) protocol client
59
 lsh is GNU GPL'd implementation of the Secure Shell
60
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
61
 is a secure replacement for rlogin, rsh and rcp.
62
 .
13 magnus 63
 This package contains the lsh client used to log in to a remote lsh
64
 or ssh2 server.
2 magnus 65
 .
66
 In some countries it may be illegal to use any encryption
67
 at all without a special permit.
68
 
69
Package: lsh-doc
70
Architecture: all
71
Section: doc
35 magnus 72
Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends}
2 magnus 73
Suggests: lsh-utils, lsh-server, lsh-client
76 magnus 74
Conflicts: lsh-utils (<< 1.0.2-3)
75
Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1)
9 magnus 76
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
2 magnus 77
Description: Secure Shell v2 (SSH2) client / server / utilities documentation
78
 lsh is GNU GPL'd implementation of the Secure Shell
79
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
80
 is a secure replacement for rlogin, rsh and rcp.
81
 .
82
 This package contains the lsh documentation, including info
83
 pages, manpages about the various protocols which lsh uses,
84
 as well as various documents about lsh internals, protocols
85
 and general lsh development.
86
 .
87
 In some countries it may be illegal to use any encryption
88
 at all without a special permit.