Top Qs
Timeline
Chat
Perspective

Lsh

Cryptographic network protocol From Wikipedia, the free encyclopedia

Remove ads

lsh is a copyleft implementation of the Secure Shell (SSH) protocol version 2, by the GNU Project[3][4][5][6] including both server and client programs. Featuring Secure Remote Password protocol (SRP) as specified in secsh-srp[7][8] besides, public-key authentication. Kerberos is somewhat supported as well.[citation needed] Currently however for password verification only, not as a single sign-on (SSO) method.[citation needed]

Quick Facts Developer(s), Initial release ...

lsh was started from scratch and predates OpenSSH.[9]

Karim Yaghmour concluded in 2003 that lsh was "not fit for use" in production embedded Linux systems, because of its dependencies upon other software packages that have a multiplicity of further dependencies. The lsh package requires the GNU MP library, zlib, and liboop, the latter of which in turn requires GLib, which then requires pkg-config. Yaghmour further notes that lsh suffers from cross-compilation problems that it inherits from glib. "If ... your target isn't the same architecture as your host," he states, "LSH isn't a practical choice at this time."[10]

Debian provides packages of lsh as lsh-server,[11] lsh-utils, lsh-doc and lsh-client.[12]

Remove ads

See also

References

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads