summaryrefslogtreecommitdiff
path: root/security/ssh2
diff options
context:
space:
mode:
authorMichael Haro <mharo@FreeBSD.org>1999-12-24 18:39:48 +0000
committerMichael Haro <mharo@FreeBSD.org>1999-12-24 18:39:48 +0000
commit332b0f4a830f7403e0b41592bbae6e4094f8ef23 (patch)
tree9aa86e9c08a6d45d9cb6cc1ab3b1b095d54bc7ec /security/ssh2
parentRemove the old KerberosIV stuff and PAM-ize. (diff)
remove --prefix=${PREFIX} when GNU_CONFIGURE=yes and other minor cleanups
PR: 14759 Submitted by: Jeremy Lea <reg@shale.csir.co.za>
Notes
Notes: svn path=/head/; revision=23999
Diffstat (limited to 'security/ssh2')
-rw-r--r--security/ssh2/Makefile2
-rw-r--r--security/ssh2/pkg-descr12
2 files changed, 2 insertions, 12 deletions
diff --git a/security/ssh2/Makefile b/security/ssh2/Makefile
index 7cc7302384f1..6bc3cf7fb1d1 100644
--- a/security/ssh2/Makefile
+++ b/security/ssh2/Makefile
@@ -24,7 +24,7 @@ RESTRICTED= "Crypto; export-controlled"
GNU_CONFIGURE= YES
-CONFIGURE_ARGS= --prefix=${PREFIX} --with-etcdir=${PREFIX}/etc --enable-debug
+CONFIGURE_ARGS= --with-etcdir=${PREFIX}/etc --enable-debug
#Uncomment if all your users are in their own group and their homedir
#is writeable by that group. Beware the security implications!
#CONFIGURE_ARGS+= --enable-group-writeability
diff --git a/security/ssh2/pkg-descr b/security/ssh2/pkg-descr
index 88c6003dc9ae..c0b7a0dce270 100644
--- a/security/ssh2/pkg-descr
+++ b/security/ssh2/pkg-descr
@@ -6,28 +6,18 @@ very easy-to-use program that uses strong cryptography for protecting
all transmitted confidential data, including passwords, binary files,
and administrative commands.
- SSH Communications Security is the developer of the Secure Shell and
-the SSH protocol, technologies that are the de-facto standard for
-encrypted terminal connections on the Internet. The benefits of SSH
-include
+The benefits of SSH include:
o Automatic authentication of users, no passwords sent in cleartext to
prevent the stealing of passwords.
-
o Multiple strong authentication methods that prevent such security
threats as spoofing identity.
-
o Authentication of both ends of connection, the server and the client
are authenticated to prevent identity spoofing, trojan horses, etc.
-
o Automatic authentication using agents to enable strong
authentication to multiple systems with a single-sign-on.
-
o Encryption and compression of data for security and speed.
-
o Secure file transfer.
-
o Tunneling and encryption of arbitrary connections.
-
WWW: http://www.ssh.fi/