Lsh
Encyclopedia
lsh is a free software
implementation of the Secure Shell
(SSH) protocol version 2, by the GNU Project
including both server
and client
programs. Featuring SRP
as specified in secsh-srp besides, public-key authentication. Kerberos is somewhat supported as well . Currently however for password verification only, not as an SSO
method .
secsh-srp
lsh was started from scratch and predates OpenSSH
, a more popular alternative.
Karim Yaghmour concluded in 2003 that lsh was "not fit for use" in production embedded Linux
systems, because of its dependencies upon other software packages, that have a multiplicity of further dependencies. The lsh package requires the GNU MP library, zlib, and liboop, the latter of which in turn requires glib, when then requires pkg-config. Yaghmour further notes that lsh suffers from cross-compilation problems that it inherits from glib. "If […] your target isn't the same architecture as your host," he states, "LSH isn't a practical choice at this time."
Free software
Free software, software libre or libre software is software that can be used, studied, and modified without restriction, and which can be copied and redistributed in modified or unmodified form either without restriction, or with restrictions that only ensure that further recipients can also do...
implementation of the Secure Shell
Secure Shell
Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client...
(SSH) protocol version 2, by the GNU Project
GNU Project
The GNU Project is a free software, mass collaboration project, announced on September 27, 1983, by Richard Stallman at MIT. It initiated GNU operating system development in January, 1984...
including both server
Server (computing)
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients"...
and client
Client (computing)
A client is an application or system that accesses a service made available by a server. The server is often on another computer system, in which case the client accesses the service by way of a network....
programs. Featuring SRP
Secure remote password protocol
The Secure Remote Password protocol is a password-authenticated key agreement protocol.- Overview :The SRP protocol has a number of desirable properties: it allows a user to authenticate themselves to a server, it is resistant to dictionary attacks mounted by an eavesdropper, and it does not...
as specified in secsh-srp besides, public-key authentication. Kerberos is somewhat supported as well . Currently however for password verification only, not as an SSO
Single sign-on
Single sign-on is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them...
method .
secsh-srp
lsh was started from scratch and predates OpenSSH
OpenSSH
OpenSSH is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol...
, a more popular alternative.
Karim Yaghmour concluded in 2003 that lsh was "not fit for use" in production embedded Linux
Embedded Linux
Embedded Linux is the use of Linux in embedded computer systems such as mobile phones, personal digital assistants, media players, set-top boxes, and other consumer electronics devices, networking equipment, machine control, industrial automation, navigation equipment and medical instruments...
systems, because of its dependencies upon other software packages, that have a multiplicity of further dependencies. The lsh package requires the GNU MP library, zlib, and liboop, the latter of which in turn requires glib, when then requires pkg-config. Yaghmour further notes that lsh suffers from cross-compilation problems that it inherits from glib. "If […] your target isn't the same architecture as your host," he states, "LSH isn't a practical choice at this time."
See also
- Comparison of SSH clientsComparison of SSH clientsAn SSH client is a software program which uses the secure shell protocol to connect to a remote computer. This article compares a selection of popular clients.-General:-Platform:...
- TCP Wrappers
- GnuTLSGnuTLSGnuTLS , the GNU Transport Layer Security Library, is a free software implementation of the SSL and TLS protocols. Its purpose is to offer an application programming interface for applications to enable secure communication protocols over their network transport layer.-Features:GnuTLS consists of...