diff options
author | mharo <mharo@FreeBSD.org> | 1999-12-24 18:39:48 +0000 |
---|---|---|
committer | mharo <mharo@FreeBSD.org> | 1999-12-24 18:39:48 +0000 |
commit | 6732e58892144622578ef18a9ce32b3ae624f032 (patch) | |
tree | cffe8655b21fb7e485b88e43bce778b6a02fb9ed /security/ssh2 | |
parent | a1aa7c31fe5eb626a0a93e1418b4a01dcef37e17 (diff) | |
download | FreeBSD-ports-6732e58892144622578ef18a9ce32b3ae624f032.zip FreeBSD-ports-6732e58892144622578ef18a9ce32b3ae624f032.tar.gz |
remove --prefix=${PREFIX} when GNU_CONFIGURE=yes and other minor cleanups
PR: 14759
Submitted by: Jeremy Lea <reg@shale.csir.co.za>
Diffstat (limited to 'security/ssh2')
-rw-r--r-- | security/ssh2/Makefile | 2 | ||||
-rw-r--r-- | security/ssh2/pkg-descr | 12 |
2 files changed, 2 insertions, 12 deletions
diff --git a/security/ssh2/Makefile b/security/ssh2/Makefile index 7cc7302..6bc3cf7 100644 --- a/security/ssh2/Makefile +++ b/security/ssh2/Makefile @@ -24,7 +24,7 @@ RESTRICTED= "Crypto; export-controlled" GNU_CONFIGURE= YES -CONFIGURE_ARGS= --prefix=${PREFIX} --with-etcdir=${PREFIX}/etc --enable-debug +CONFIGURE_ARGS= --with-etcdir=${PREFIX}/etc --enable-debug #Uncomment if all your users are in their own group and their homedir #is writeable by that group. Beware the security implications! #CONFIGURE_ARGS+= --enable-group-writeability diff --git a/security/ssh2/pkg-descr b/security/ssh2/pkg-descr index 88c6003..c0b7a0d 100644 --- a/security/ssh2/pkg-descr +++ b/security/ssh2/pkg-descr @@ -6,28 +6,18 @@ very easy-to-use program that uses strong cryptography for protecting all transmitted confidential data, including passwords, binary files, and administrative commands. - SSH Communications Security is the developer of the Secure Shell and -the SSH protocol, technologies that are the de-facto standard for -encrypted terminal connections on the Internet. The benefits of SSH -include +The benefits of SSH include: o Automatic authentication of users, no passwords sent in cleartext to prevent the stealing of passwords. - o Multiple strong authentication methods that prevent such security threats as spoofing identity. - o Authentication of both ends of connection, the server and the client are authenticated to prevent identity spoofing, trojan horses, etc. - o Automatic authentication using agents to enable strong authentication to multiple systems with a single-sign-on. - o Encryption and compression of data for security and speed. - o Secure file transfer. - o Tunneling and encryption of arbitrary connections. - WWW: http://www.ssh.fi/ |