Subversion Repositories lsh

Compare Revisions

Ignore whitespace Rev 13 → Rev 12

/trunk/debian/control
17,19 → 17,20
Recommends: lsh-server
Suggests: lsh-doc
Description: Secure Shell v2 (SSH2) protocol utilities
lsh is GNU GPL'd implementation of the Secure Shell protocol version
2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for
rlogin, rsh and rcp.
lsh is GNU GPL'd implementation of the Secure Shell
protocol version 2 (SSH2). The SSH (Secure SHell) protocol
is a secure replacement for rlogin, rsh and rcp.
.
This package contains the lsh utilities. This includes programs such
as lsh-keygen, lsh-writekey (both programs for public/private key
generation), lsh-authorize (for automatic remote key authentication),
ssh-conv (utilities for converting between various public & private
key formats), and a number of other utilities for use with both the
lsh server and client.
This package contains the lsh utilities. This includes
programs such as lsh-keygen, lsh-writekey (both programs
for public/private key generation), lsh-authorize (for
automatic remote key authentication), sexp-conv and ssh-conv
(utilities for converting between various public & private
key formats), and a number of other utilities for use with
both the lsh server and client.
.
In some countries it may be illegal to use any encryption at all
without a special permit.
In some countries it may be illegal to use any encryption
at all without a special permit.
 
Package: lsh-server
Architecture: any
58,8 → 59,13
protocol version 2 (SSH2). The SSH (Secure SHell) protocol
is a secure replacement for rlogin, rsh and rcp.
.
This package contains the lsh client used to log in to a remote lsh
or ssh2 server.
This package contains the lsh client. This package is
required to log into a remote lsh or ssh2 server. Please
note that the client binary is normally called 'lsh' rather
than 'lshc', but as there is already a 'lsh' binary in
Debian (the Limited SHell - see the 'lsh' package), the
client binary has been renamed to 'lshc'. All the other
program names remain as normal.
.
In some countries it may be illegal to use any encryption
at all without a special permit.