![]() |
File Search | Catalog | Content Search |
Ssh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. It is intended as a replacement for rlogin, rsh and rcp, and can be used to provide applications with a secure communication channel.
This package provides the ssh, scp and sftp clients, the ssh-agent and ssh-add programs to make public key authentication more convenient, and the ssh-keygen, ssh-keyscan, ssh-copy-id and ssh-argv0 utilities.
--------------------------------------------------------------------
In some countries it may be illegal to use any encryption at all without a special permit.
Homepage: | - |
Package version: | 1:4.3p2-9etch3 |
Architecture: | i386 |
Distribution: | Debian |
Filename: | openssh-client_4.3p2-9etch3_i386.deb |
See http://www.openssh.com/txt/release-4.3p2 for the release notes. - A Japanese translation of this document and of the OpenSSH FAQ is - available at http://www.unixuser.org/~haruyama/security/openssh/index.html - Thanks to HARUYAMA Seigo <haruyama@unixuser.org> This is the port of OpenBSD's excellent OpenSSH[0] to Linux and other Unices. OpenSSH is based on the last free version of Tatu Ylone more»
OpenSSH for Debian ------------------ Although this package is widely referred to as OpenSSH, it is actually a branch of an early version of ssh which has been tidied up by the OpenBSD folks. It has been decided that this version should have the privilege of carrying the ``ssh'' name in Debian, since it is the only version of ssh that is going to make it into Debian proper, being the only one t more»
The following instructions relate to CVE-2008-0166. They were prepared by Matt Zimmerman, assisted by Colin Watson. == What Happened == A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute more»
How to verify host keys using OpenSSH and DNS --------------------------------------------- OpenSSH more»
How to use OpenSSH-based virtual private networks ------------------------------------------------- more»
openssh (1:3.8.1p1-9) experimental; urgency=low The ssh package has been split into openssh-clien more»
SCP(1) BSD General Commands Manual SCP(1) NAME scp — secure copy more»
.\" $OpenBSD: sftp.1,v 1.63 2006/01/20 00:14:55 dtucker Exp $ .\" .\" Copyright (c) 2001 Damien Mill more»
[DIR] | DEBIAN/ (8) 65535+ mirrors | ||
[DIR] | etc/ (1) 65535+ mirrors | ||
[DIR] | usr/ (3) 65535+ mirrors | ||
[DIR] | var/ (1) 41013+ mirrors |