SYNOPSIS

lsh [OPTION...] HOST [COMMAND]

DESCRIPTION

CAUTION! The information in this manpage may be invalid or outdated. For authorative information on lsh, please see it's Texinfo manual (see the SEE ALSO section).

Connects to the the remote machine HOST, and perform one or more actions, i.e. command execution, various forwarding services. The default action is to start a remote interactive shell or execute a given command on the remote machine.

OPTIONS

--capture-to=File

When a new hostkey is received, append an ACL expressing trust in the key. In sloppy mode, the default is ~/.lsh/captured_keys.

--dh-keyexchange

Enable DH support (default, unless SRP is being used).

--host-db=Filename

By default, ~/.lsh/host-acls

-i, --identity=Identity key

Use this key to authenticate.

--no-dh-keyexchange

Disable DH support.

--no-publickey

Don't try publickey user authentication.

--no-srp-keyexchange

Disable experimental SRP support (default).

--publickey

Try publickey user authentication (default).

--sloppy-host-authentication

Allow untrusted hostkeys.

--srp-keyexchange

Enable experimental SRP support.

--strict-host-authentication

Never, never, ever trust an unknown hostkey. (default)

--debug

Print huge amounts of debug information

--log-file=File name

Append messages to this file.

-q, --quiet

Suppress all warnings and diagnostic messages

--trace

Detailed trace

-v, --verbose

Verbose diagnostic messages

Algorithm selection:

-c, --crypto=Algorithm --hostkey-algorithm=Algorithm

--list-algorithms

List supported algorithms. -m, --mac=Algorithm

-z, --compression[=Algorithm]

Default is zlib.

--askpass=Program

Program to use for reading passwords. Should be an absolute filename.

-l, --user=User name

Login as this user.

-p, --port=Port

Connect to this port.

Actions:

-B, --background

Put process into the background. Implies -N. -D, --forward-socks[=port] Enable socks dynamic forwarding

-E, --execute=command

Execute a command on the remote machine -L, --forward-local-port=local-port:target-host:target-port

-N, --nop

No operation (suppresses the default action, which is to spawn a remote shell)

--subsystem=subsystem-name

Connect to given subsystem. Implies --no-pty.

-S, --shell=command

Spawn a remote shell

Universal not:

-n, --no

Inverts the effect of the next modifier

Modifiers that apply to port forwarding:

-g, --remote-peers

Allow remote access to forwarded ports

--no-remote-peers

Disallow remote access to forwarded ports (default).

Modifiers that apply to remote execution:

--detach

Detach from terminal at session end.

--no-detach

Do not detach session at end, wait for all open channels (default).

--no-pty

Don't request a remote pty.

--no-stderr

Redirect stderr to /dev/null

--no-stdin

Redirect stdin from /dev/null

--no-stdout

Redirect stdout to /dev/null

--stderr=Filename

Redirect stderr

--stdin=Filename

Redirect stdin

--stdout=Filename

Redirect stdout

-t, --pty

Request a remote pty (default).

Miscellaneous options:

-e, --escape-char=Character

Escape char. `none' means disable. Default is to use `~' if we have a tty, otherwise none.

--write-pid

Make -B write the pid of the backgrounded process to stdout.

-G, --gateway

Setup a local gateway -R, --forward-remote-port=remote-port:target-host:target-port

--no-x11-forward

Disable X11 forwarding (default).

-x, --x11-forward

Enable X11 forwarding.

-?, --help

Give this help list

--usage

Give a short usage message

-V, --version

Print program version

FILES

$HOME/.lsh/captured_keys

is the default file used for storing keys captured when connecting to hosts with keys not previously accepted (see the --capture-to option).

$HOME/.lsh/host_acls

is the default file containing accepted keys (see the --host-db option).

$HOME/.lsh/identity

is the key file lsh attempts to use by default (see the --identity option).

DIAGNOSTICS

See the --verbose , --trace and --debug options.

REPORTING BUGS

Report bugs to <[email protected]>.

ENVIRONMENT

LSH_YARROW_SEED_FILE may be used to specify the random seed file.

LSHFLAGS may be used for passing additional parameters. The parsing order is undefined.

COPYING

The lsh suite of programs is distributed under the GNU General Public License; see the COPYING and AUTHORS files in the source distribution for details.

AUTHOR

The lsh program suite is written mainly by Niels M\[:o]ller <[email protected]>.

This man-page was originally written by J.H.M. Dassen (Ray) <[email protected]>. It was modified and updated for lsh 2.0 by Pontus Freyhult <[email protected]>

RELATED TO lsh…

lsftp(1), lshg(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-upgrade-key(1), lsh-writekey(1), lshd(8), ssh-conv(1)

The full documentation for lsh is maintained as a Texinfo manual. If the info and lsh programs are properly installed at your site, the command

  • info lsh

should give you access to the complete manual.