Advertisement
Guest User

control output

a guest
Dec 29th, 2022
22
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.68 KB | None | 0 0
  1. ╭─sedrosken@JST-TETHANA ~/netkit-telnet-0.17/debian
  2. ╰─$ cat control
  3. Source: netkit-telnet
  4. Section: net
  5. Priority: standard
  6. Maintainer: Debian QA Group <packages@qa.debian.org>
  7. Standards-Version: 3.9.8
  8. Build-Depends: debhelper (>= 10~), libncurses-dev, cmake
  9.  
  10. Package: telnet
  11. Architecture: any
  12. Depends: netbase, ${shlibs:Depends}, ${misc:Depends}
  13. Replaces: netstd
  14. Provides: telnet-client
  15. Description: basic telnet client
  16. The telnet command is used for interactive communication with another host
  17. using the TELNET protocol.
  18. .
  19. For the purpose of remote login, the present client executable should be
  20. depreciated in favour of an ssh-client, or in some cases with variants like
  21. telnet-ssl or Kerberized TELNET clients. The most important reason is that
  22. this implementation exchanges user name and password in clear text.
  23. .
  24. On the other hand, the present program does satisfy common use cases of
  25. network diagnostics, like protocol testing of SMTP services, so it can
  26. become handy enough.
  27.  
  28. Package: telnetd
  29. Architecture: any
  30. Priority: optional
  31. Depends: adduser, openbsd-inetd | inet-superserver, passwd, ${shlibs:Depends}, ${misc:Depends}
  32. Replaces: netstd
  33. Provides: telnet-server
  34. Description: basic telnet server
  35. The in.telnetd program is a server which supports the DARPA telnet interactive
  36. communication protocol.
  37. .
  38. This legacy server should in general be abandoned in favour of a contemporary
  39. ssh-server, as this implementation only is able to process password and user
  40. name in clear text. Other variants, like telnetd-ssl and a selection of
  41. Kerberized TELNET servers, are able to improve on this by providing secure
  42. forms of authentication and encryption.
  43.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement