Commit 2bc5b12a authored by Niels Möller's avatar Niels Möller
Browse files

* doc/lsh.texinfo: Updated nodes and menus.

Rev: doc/lsh.texinfo:1.2
parent bc34b21b
...@@ -72,9 +72,9 @@ translation approved by the Free Software Foundation. ...@@ -72,9 +72,9 @@ translation approved by the Free Software Foundation.
@end titlepage @end titlepage
@node Top,, (dir), (dir) @node Top, Introduction, (dir), (dir)
@top
@comment node-name, next, previous, up @comment node-name, next, previous, up
@top
This document describes @code{lsh} and related programs. @code{lsh} suit This document describes @code{lsh} and related programs. @code{lsh} suit
of programs is intended as a free replacement for the @code{ssh} suit of of programs is intended as a free replacement for the @code{ssh} suit of
programs. In turn, @code{ssh} was intended as a secure replacement for programs. In turn, @code{ssh} was intended as a secure replacement for
...@@ -83,7 +83,31 @@ internet. ...@@ -83,7 +83,31 @@ internet.
This manual explains how to use and hack @code{lsh}. This manual explains how to use and hack @code{lsh}.
@node Introduction @menu
* Introduction::
* Terminology::
* Concept Index::
@detailmenu
--- The Detailed Node Listing ---
Introduction
* Threats::
* Features::
* Related techniques::
Related programs and techniques
* ssh1:: SSH version 1
* ssh2:: SSH version 2
* Kerberos:: Kerberos
* ipsec:: IP Sec
@end detailmenu
@end menu
@node Introduction, Terminology, Top, Top
@comment node-name, next, previous, up @comment node-name, next, previous, up
@chapter Introduction @chapter Introduction
...@@ -111,7 +135,13 @@ Remember that just because your paranoid that doesn't mean that nobody ...@@ -111,7 +135,13 @@ Remember that just because your paranoid that doesn't mean that nobody
is trying to get you @dots{} is trying to get you @dots{}
@node Threats @menu
* Threats::
* Features::
* Related techniques::
@end menu
@node Threats, Features, Introduction, Introduction
@comment node-name, next, previous, up @comment node-name, next, previous, up
@section Threats @section Threats
...@@ -210,7 +240,7 @@ adjust the security measures so that your enemies will not find it worth ...@@ -210,7 +240,7 @@ adjust the security measures so that your enemies will not find it worth
the effort to break them. the effort to break them.
@node Features @node Features, Related techniques, Threats, Introduction
@comment node-name, next, previous, up @comment node-name, next, previous, up
@section Other convenient features @section Other convenient features
...@@ -242,7 +272,7 @@ of tunneling that may turn out to be useful include authentication (i.e. ...@@ -242,7 +272,7 @@ of tunneling that may turn out to be useful include authentication (i.e.
general ip-tunneling. general ip-tunneling.
@node Related techniques @node Related techniques, , Features, Introduction
@comment node-name, next, previous, up @comment node-name, next, previous, up
@section Related programs and techniques @section Related programs and techniques
...@@ -252,7 +282,14 @@ security as @code{lsh}. Kerberos and @acronym{IPSEC} operate quite ...@@ -252,7 +282,14 @@ security as @code{lsh}. Kerberos and @acronym{IPSEC} operate quite
differently, in particular when it comes to protection against differently, in particular when it comes to protection against
Man-in-the-middle attacks. Man-in-the-middle attacks.
@node ssh1 @menu
* ssh1:: SSH version 1
* ssh2:: SSH version 2
* Kerberos:: Kerberos
* ipsec:: IP Sec
@end menu
@node ssh1, ssh2, Related techniques, Related techniques
@comment node-name, next, previous, up @comment node-name, next, previous, up
@subsection ssh-1.x @subsection ssh-1.x
...@@ -273,7 +310,7 @@ Windows. ...@@ -273,7 +310,7 @@ Windows.
Until @code{lsh} becomes stable and well tested, I would recommend using Until @code{lsh} becomes stable and well tested, I would recommend using
some implementation of the ssh-1 protocol. some implementation of the ssh-1 protocol.
@node ssh2 @node ssh2, Kerberos, ssh1, Related techniques
@comment node-name, next, previous, up @comment node-name, next, previous, up
@subsection ssh-2.x @subsection ssh-2.x
...@@ -296,7 +333,7 @@ The license for Datafellow's @code{ssh-2} programs is similar to that ...@@ -296,7 +333,7 @@ The license for Datafellow's @code{ssh-2} programs is similar to that
for recent versions of @code{ssh-1}, but with a narrower definition of for recent versions of @code{ssh-1}, but with a narrower definition of
``non-commercial use''. ``non-commercial use''.
@node Kerberos @node Kerberos, ipsec, ssh2, Related techniques
@comment node-name, next, previous, up @comment node-name, next, previous, up
@subsection Kerberos @subsection Kerberos
...@@ -333,7 +370,7 @@ forwarding with authentication based on Kerberos. Such an arrangement ...@@ -333,7 +370,7 @@ forwarding with authentication based on Kerberos. Such an arrangement
may provide the best of two worlds for those who happen to have an may provide the best of two worlds for those who happen to have an
account at a suitable ticket-granting server. account at a suitable ticket-granting server.
@node ipsec @node ipsec, , Kerberos, Related techniques
@comment node-name, next, previous, up @comment node-name, next, previous, up
@subsection @acronym{IPSEC} @subsection @acronym{IPSEC}
...@@ -363,11 +400,11 @@ protocol to tunnel arbitrary ip traffic accross an ssh connection. This ...@@ -363,11 +400,11 @@ protocol to tunnel arbitrary ip traffic accross an ssh connection. This
arrangement provides some of the functionality of @acronym{IPSEC}, and arrangement provides some of the functionality of @acronym{IPSEC}, and
is some times referred to as ``a poor man's Virtual Private Network''. is some times referred to as ``a poor man's Virtual Private Network''.
@node Terminology @node Terminology, Concept Index, Introduction, Top
@comment node-name, next, previous, up @comment node-name, next, previous, up
Chapter Terminology @chapter Terminology
@node Concept Index, , Overview, Top @node Concept Index, , Terminology, Top
@comment node-name, next, previous, up @comment node-name, next, previous, up
@unnumbered Concept Index @unnumbered Concept Index
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment