Rev 100 | Rev 113 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
| Rev 100 | Rev 102 | ||
|---|---|---|---|
| Line 14... | Line 14... | ||
| 14 | Architecture: any | 14 | Architecture: any | 
| 15 | Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends}
 | 15 | Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends}
 | 
| 16 | Recommends: openssh-blacklist, openssh-blacklist-extra | 16 | Recommends: openssh-blacklist, openssh-blacklist-extra | 
| 17 | Suggests: lsh-server, lsh-client, lsh-doc | 17 | Suggests: lsh-server, lsh-client, lsh-doc | 
| 18 | Description: Secure Shell v2 (SSH2) protocol utilities | 18 | Description: Secure Shell v2 (SSH2) protocol utilities | 
| 19 | lsh is GNU GPL'd implementation of the Secure Shell protocol version | 19 | lsh is a GPLed implementation of the Secure SHell protocol version 2 | 
| 20 | 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for | 20 | (SSH2), a secure replacement for rlogin, rsh, and rcp. | 
| 21 | rlogin, rsh and rcp. | - | |
| 22 | . | 21 | . | 
| 23 | This package contains the lsh utilities. This includes programs such | 22 | This package contains the lsh utilities. This includes programs such | 
| 24 | as lsh-keygen, lsh-writekey (both programs for public/private key | 23 | as lsh-keygen, lsh-writekey (both programs for public/private key | 
| 25 | generation), lsh-authorize (for automatic remote key authentication), | 24 | generation), lsh-authorize (for automatic remote key authentication), | 
| 26 | ssh-conv (utilities for converting between various public & private | 25 | ssh-conv (utilities for converting between various public and private | 
| 27 | key formats), and a number of other utilities for use with both the | 26 | key formats), and a number of other utilities for use with both the | 
| 28 | lsh server and client. | 27 | lsh server and client. | 
| 29 | . | 28 | . | 
| 30 | In some countries it may be illegal to use any encryption at all | 29 | In some countries it may be illegal to use any encryption at all | 
| 31 | without a special permit. | 30 | without a special permit. | 
| Line 36... | Line 35... | ||
| 36 | Depends: lsh-utils (= ${binary:Version}), openssh-blacklist,
 | 35 | Depends: lsh-utils (= ${binary:Version}), openssh-blacklist,
 | 
| 37 |  ${shlibs:Depends}, ${misc:Depends}
 | 36 |  ${shlibs:Depends}, ${misc:Depends}
 | 
| 38 | Recommends: openssh-blacklist-extra | 37 | Recommends: openssh-blacklist-extra | 
| 39 | Suggests: lsh-client | openssh-client, lsh-doc | 38 | Suggests: lsh-client | openssh-client, lsh-doc | 
| 40 | Description: Secure Shell v2 (SSH2) protocol server | 39 | Description: Secure Shell v2 (SSH2) protocol server | 
| 41 | lsh is GNU GPL'd implementation of the Secure Shell | 40 | lsh is a GPLed implementation of the Secure SHell protocol version 2 | 
| 42 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol | - | |
| 43 | is a secure replacement for rlogin, rsh and rcp. | 41 | (SSH2), a secure replacement for rlogin, rsh, and rcp. | 
| 44 | . | 42 | . | 
| 45 | This package contains the lsh server, lshd. This package is required | 43 | This package contains the lsh server, lshd. This package is required | 
| 46 | to allow SSH2 logins to the local machine. | 44 | to allow SSH2 logins to the local machine. | 
| 47 | . | 45 | . | 
| 48 | In some countries it may be illegal to use any encryption | 46 | In some countries it may be illegal to use any encryption | 
| Line 54... | Line 52... | ||
| 54 |  ${shlibs:Depends}, ${misc:Depends}
 | 52 |  ${shlibs:Depends}, ${misc:Depends}
 | 
| 55 | Breaks: lsh-utils (<< 2.0.4-dfsg-1) | 53 | Breaks: lsh-utils (<< 2.0.4-dfsg-1) | 
| 56 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) | 54 | Replaces: lsh-utils (<< 2.0.4-dfsg-1) | 
| 57 | Suggests: lsh-doc | 55 | Suggests: lsh-doc | 
| 58 | Description: Secure Shell v2 (SSH2) protocol client | 56 | Description: Secure Shell v2 (SSH2) protocol client | 
| 59 | lsh is GNU GPL'd implementation of the Secure Shell | 57 | lsh is a GPLed implementation of the Secure SHell protocol version 2 | 
| 60 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol | - | |
| 61 | is a secure replacement for rlogin, rsh and rcp. | 58 | (SSH2), a secure replacement for rlogin, rsh, and rcp. | 
| 62 | . | 59 | . | 
| 63 | This package contains the lsh client used to log in to a remote lsh | 60 | This package contains the lsh client used to log in to a remote lsh | 
| 64 | or ssh2 server. | 61 | or SSH2 server. | 
| 65 | . | 62 | . | 
| 66 | In some countries it may be illegal to use any encryption | 63 | In some countries it may be illegal to use any encryption | 
| 67 | at all without a special permit. | 64 | at all without a special permit. | 
| 68 | 65 | ||
| 69 | Package: lsh-doc | 66 | Package: lsh-doc | 
| Line 72... | Line 69... | ||
| 72 | Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends}
 | 69 | Depends: dpkg (>= 1.15.4) | install-info, ${misc:Depends}
 | 
| 73 | Suggests: lsh-utils, lsh-server, lsh-client | 70 | Suggests: lsh-utils, lsh-server, lsh-client | 
| 74 | Conflicts: lsh-utils (<< 1.0.2-3) | 71 | Conflicts: lsh-utils (<< 1.0.2-3) | 
| 75 | Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1) | 72 | Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1) | 
| 76 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) | 73 | Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1) | 
| 77 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation | 74 | Description: Secure Shell v2 (SSH2) documentation | 
| 78 | lsh is GNU GPL'd implementation of the Secure Shell | 75 | lsh is a GPLed implementation of the Secure SHell protocol version 2 | 
| 79 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol | - | |
| 80 | is a secure replacement for rlogin, rsh and rcp. | 76 | (SSH2), a secure replacement for rlogin, rsh, and rcp. | 
| 81 | . | 77 | . | 
| 82 | This package contains the lsh documentation, including info | 78 | This package contains the lsh documentation, including info | 
| 83 | pages, manpages about the various protocols which lsh uses, | 79 | pages and manpages about the various protocols which lsh uses, | 
| 84 | as well as various documents about lsh internals, protocols | 80 | as well as various documents about lsh internals, protocols, | 
| 85 | and general lsh development. | 81 | and general lsh development. | 
| 86 | . | 82 | . | 
| 87 | In some countries it may be illegal to use any encryption | 83 | In some countries it may be illegal to use any encryption | 
| 88 | at all without a special permit. | 84 | at all without a special permit. |