NAME
lsh - secsh (SSH2) client
SYNOPSIS
lsh [OPTION...] HOST [COMMAND]
DESCRIPTION
CAUTION! The information in this manpage may be invalid or outdated.
For authorative information on lsh, please see it's Texinfo manual (see
the SEE ALSO section).
Connects to the the remote machine HOST, and perform one or more
actions, i.e. command execution, various forwarding services. The
default action is to start a remote interactive shell or execute a
given command on the remote machine.
OPTIONS
--capture-to=File
When a new hostkey is received, append an ACL expressing trust
in the key. In sloppy mode, the default is ~/.lsh/captured_keys.
--dh-keyexchange
Enable DH support (default, unless SRP is being used).
--host-db=Filename
By default, ~/.lsh/host-acls
-i, --identity=Identity key
Use this key to authenticate.
--no-dh-keyexchange
Disable DH support.
--no-publickey
Don't try publickey user authentication.
--no-srp-keyexchange
Disable experimental SRP support (default).
--publickey
Try publickey user authentication (default).
--sloppy-host-authentication
Allow untrusted hostkeys.
--srp-keyexchange
Enable experimental SRP support.
--strict-host-authentication
Never, never, ever trust an unknown hostkey. (default)
--debug
Print huge amounts of debug information
--log-file=File name
Append messages to this file.
-q, --quiet
Suppress all warnings and diagnostic messages
--trace
Detailed trace
-v, --verbose
Verbose diagnostic messages
Algorithm selection:
-c, --crypto=Algorithm
--hostkey-algorithm=Algorithm
--list-algorithms
List supported algorithms.
-m, --mac=Algorithm
-z, --compression[=Algorithm]
Default is zlib.
--askpass=Program
Program to use for reading passwords. Should be an absolute
filename.
-l, --user=User name
Login as this user.
-p, --port=Port
Connect to this port.
Actions:
-B, --background
Put process into the background. Implies -N.
-D, --forward-socks[=port] Enable socks dynamic forwarding
-E, --execute=command
Execute a command on the remote machine
-L, --forward-local-port=local-port:target-host:target-port
-N, --nop
No operation (suppresses the default action, which is to spawn a
remote shell)
--subsystem=subsystem-name
Connect to given subsystem. Implies --no-pty.
-S, --shell=command
Spawn a remote shell
Universal not:
-n, --no
Inverts the effect of the next modifier
Modifiers that apply to port forwarding:
-g, --remote-peers
Allow remote access to forwarded ports
--no-remote-peers
Disallow remote access to forwarded ports (default).
Modifiers that apply to remote execution:
--detach
Detach from terminal at session end.
--no-detach
Do not detach session at end, wait for all open channels
(default).
--no-pty
Don't request a remote pty.
--no-stderr
Redirect stderr to /dev/null
--no-stdin
Redirect stdin from /dev/null
--no-stdout
Redirect stdout to /dev/null
--stderr=Filename
Redirect stderr
--stdin=Filename
Redirect stdin
--stdout=Filename
Redirect stdout
-t, --pty
Request a remote pty (default).
Miscellaneous options:
-e, --escape-char=Character
Escape char. `none' means disable. Default is to use `~' if we
have a tty, otherwise none.
--write-pid
Make -B write the pid of the backgrounded process to stdout.
-G, --gateway
Setup a local gateway
-R, --forward-remote-port=remote-port:target-host:target-port
--no-x11-forward
Disable X11 forwarding (default).
-x, --x11-forward
Enable X11 forwarding.
-?, --help
Give this help list
--usage
Give a short usage message
-V, --version
Print program version
FILES
$HOME/.lsh/captured_keys
is the default file used for storing keys captured when connecting to
hosts with keys not previously accepted (see the --capture-to option).
$HOME/.lsh/host_acls
is the default file containing accepted keys (see the --host-db
option).
$HOME/.lsh/identity
is the key file lsh attempts to use by default (see the --identity
option).
DIAGNOSTICS
See the --verbose , --trace and --debug options.
REPORTING BUGS
Report bugs to <bug-lsh@gnu.org>.
ENVIRONMENT
LSH_YARROW_SEED_FILE may be used to specify the random seed file.
LSHFLAGS may be used for passing additional parameters. The parsing
order is undefined.
COPYING
The lsh suite of programs is distributed under the GNU General Public
License; see the COPYING and AUTHORS files in the source distribution
for details.
AUTHOR
The lsh program suite is written mainly by Niels Moller
<nisse@lysator.liu.se>.
This man-page was originally written by J.H.M. Dassen (Ray)
<jdassen@wi.LeidenUniv.nl>. It was modified and updated for lsh 2.0 by
Pontus Freyhult <pont_lsh@soua.net>
SEE ALSO
lsftp(1), lshg(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1),
lsh-upgrade(1), lsh-upgrade-key(1), lsh-writekey(1), lshd(8), ssh-
conv(1)
The full documentation for lsh is maintained as a Texinfo manual. If
the info and lsh programs are properly installed at your site, the
command
info lsh
should give you access to the complete manual.