Subversion Repositories lsh

Compare Revisions

Ignore whitespace Rev 12 → Rev 13

/trunk/debian/control
17,20 → 17,19
Recommends: lsh-server
Suggests: lsh-doc
Description: Secure Shell v2 (SSH2) protocol utilities
lsh is GNU GPL'd implementation of the Secure Shell
protocol version 2 (SSH2). The SSH (Secure SHell) protocol
is a secure replacement for rlogin, rsh and rcp.
lsh is GNU GPL'd implementation of the Secure Shell protocol version
2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for
rlogin, rsh and rcp.
.
This package contains the lsh utilities. This includes
programs such as lsh-keygen, lsh-writekey (both programs
for public/private key generation), lsh-authorize (for
automatic remote key authentication), sexp-conv and ssh-conv
(utilities for converting between various public & private
key formats), and a number of other utilities for use with
both the lsh server and client.
This package contains the lsh utilities. This includes programs such
as lsh-keygen, lsh-writekey (both programs for public/private key
generation), lsh-authorize (for automatic remote key authentication),
ssh-conv (utilities for converting between various public & private
key formats), and a number of other utilities for use with both the
lsh server and client.
.
In some countries it may be illegal to use any encryption
at all without a special permit.
In some countries it may be illegal to use any encryption at all
without a special permit.
 
Package: lsh-server
Architecture: any
59,13 → 58,8
protocol version 2 (SSH2). The SSH (Secure SHell) protocol
is a secure replacement for rlogin, rsh and rcp.
.
This package contains the lsh client. This package is
required to log into a remote lsh or ssh2 server. Please
note that the client binary is normally called 'lsh' rather
than 'lshc', but as there is already a 'lsh' binary in
Debian (the Limited SHell - see the 'lsh' package), the
client binary has been renamed to 'lshc'. All the other
program names remain as normal.
This package contains the lsh client used to log in to a remote lsh
or ssh2 server.
.
In some countries it may be illegal to use any encryption
at all without a special permit.