Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
L
lsh
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
LSH
lsh
Commits
2bc5b12a
Commit
2bc5b12a
authored
Jan 6, 2000
by
Niels Möller
Browse files
Options
Downloads
Patches
Plain Diff
* doc/lsh.texinfo: Updated nodes and menus.
Rev: doc/lsh.texinfo:1.2
parent
bc34b21b
No related branches found
No related tags found
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/lsh.texinfo
+50
-13
50 additions, 13 deletions
doc/lsh.texinfo
with
50 additions
and
13 deletions
doc/lsh.texinfo
+
50
−
13
View file @
2bc5b12a
...
...
@@ -72,9 +72,9 @@ translation approved by the Free Software Foundation.
@end titlepage
@node Top,, (dir), (dir)
@top
@node Top, Introduction, (dir), (dir)
@comment node-name, next, previous, up
@top
This document describes @code
{
lsh
}
and related programs. @code
{
lsh
}
suit
of programs is intended as a free replacement for the @code
{
ssh
}
suit of
programs. In turn, @code
{
ssh
}
was intended as a secure replacement for
...
...
@@ -83,7 +83,31 @@ internet.
This manual explains how to use and hack @code
{
lsh
}
.
@node Introduction
@menu
* Introduction::
* Terminology::
* Concept Index::
@detailmenu
--- The Detailed Node Listing ---
Introduction
* Threats::
* Features::
* Related techniques::
Related programs and techniques
* ssh1:: SSH version 1
* ssh2:: SSH version 2
* Kerberos:: Kerberos
* ipsec:: IP Sec
@end detailmenu
@end menu
@node Introduction, Terminology, Top, Top
@comment node-name, next, previous, up
@chapter Introduction
...
...
@@ -111,7 +135,13 @@ Remember that just because your paranoid that doesn't mean that nobody
is trying to get you @dots
{}
@node Threats
@menu
* Threats::
* Features::
* Related techniques::
@end menu
@node Threats, Features, Introduction, Introduction
@comment node-name, next, previous, up
@section Threats
...
...
@@ -210,7 +240,7 @@ adjust the security measures so that your enemies will not find it worth
the effort to break them.
@node Features
@node Features
, Related techniques, Threats, Introduction
@comment node-name, next, previous, up
@section Other convenient features
...
...
@@ -242,7 +272,7 @@ of tunneling that may turn out to be useful include authentication (i.e.
general ip-tunneling.
@node Related techniques
@node Related techniques
, , Features, Introduction
@comment node-name, next, previous, up
@section Related programs and techniques
...
...
@@ -252,7 +282,14 @@ security as @code{lsh}. Kerberos and @acronym{IPSEC} operate quite
differently, in particular when it comes to protection against
Man-in-the-middle attacks.
@node ssh1
@menu
* ssh1:: SSH version 1
* ssh2:: SSH version 2
* Kerberos:: Kerberos
* ipsec:: IP Sec
@end menu
@node ssh1, ssh2, Related techniques, Related techniques
@comment node-name, next, previous, up
@subsection ssh-1.x
...
...
@@ -273,7 +310,7 @@ Windows.
Until @code
{
lsh
}
becomes stable and well tested, I would recommend using
some implementation of the ssh-1 protocol.
@node ssh2
@node ssh2
, Kerberos, ssh1, Related techniques
@comment node-name, next, previous, up
@subsection ssh-2.x
...
...
@@ -296,7 +333,7 @@ The license for Datafellow's @code{ssh-2} programs is similar to that
for recent versions of @code
{
ssh-1
}
, but with a narrower definition of
``non-commercial use''.
@node Kerberos
@node Kerberos
, ipsec, ssh2, Related techniques
@comment node-name, next, previous, up
@subsection Kerberos
...
...
@@ -333,7 +370,7 @@ forwarding with authentication based on Kerberos. Such an arrangement
may provide the best of two worlds for those who happen to have an
account at a suitable ticket-granting server.
@node ipsec
@node ipsec
, , Kerberos, Related techniques
@comment node-name, next, previous, up
@subsection @acronym
{
IPSEC
}
...
...
@@ -363,11 +400,11 @@ protocol to tunnel arbitrary ip traffic accross an ssh connection. This
arrangement provides some of the functionality of @acronym
{
IPSEC
}
, and
is some times referred to as ``a poor man's Virtual Private Network''.
@node Terminology
@node Terminology
, Concept Index, Introduction, Top
@comment node-name, next, previous, up
C
hapter Terminology
@c
hapter Terminology
@node Concept Index,
, Overview
, Top
@node Concept Index,
, Terminology
, Top
@comment node-name, next, previous, up
@unnumbered Concept Index
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment