Provided by: lsh-client_2.0.4-dfsg-9_i386 bug

NAME

       lsh - secsh (SSH2) client

SYNOPSIS

       lsh [OPTION...] HOST [COMMAND]

DESCRIPTION

       CAUTION!  The  information  in this manpage may be invalid or outdated.
       For authorative information on lsh, please see it's Texinfo manual (see
       the SEE ALSO section).

       Connects  to  the  the  remote  machine  HOST,  and perform one or more
       actions, i.e.  command  execution,  various  forwarding  services.  The
       default  action  is  to  start  a remote interactive shell or execute a
       given command on the remote machine.

OPTIONS

       --capture-to=File
              When a new hostkey is received, append an ACL  expressing  trust
              in the key. In sloppy mode, the default is ~/.lsh/captured_keys.

       --dh-keyexchange
              Enable DH support (default, unless SRP is being used).

       --host-db=Filename
              By default, ~/.lsh/host-acls

       -i, --identity=Identity key
              Use this key to authenticate.

       --no-dh-keyexchange
              Disable DH support.

       --no-publickey
              Don't try publickey user authentication.

       --no-srp-keyexchange
              Disable experimental SRP support (default).

       --publickey
              Try publickey user authentication (default).

       --sloppy-host-authentication
              Allow untrusted hostkeys.

       --srp-keyexchange
              Enable experimental SRP support.

       --strict-host-authentication
              Never, never, ever trust an unknown hostkey.  (default)

       --debug
              Print huge amounts of debug information

       --log-file=File name
              Append messages to this file.

       -q, --quiet
              Suppress all warnings and diagnostic messages

       --trace
              Detailed trace

       -v, --verbose
              Verbose diagnostic messages

       Algorithm selection:

       -c, --crypto=Algorithm

       --hostkey-algorithm=Algorithm

       --list-algorithms
              List supported algorithms.

       -m, --mac=Algorithm

       -z, --compression[=Algorithm]
              Default is zlib.

       --askpass=Program
              Program  to  use  for  reading  passwords. Should be an absolute
              filename.

       -l, --user=User name
              Login as this user.

       -p, --port=Port
              Connect to this port.

       Actions:

       -B, --background
              Put process into the background. Implies -N.

       -D, --forward-socks[=port] Enable socks dynamic forwarding

       -E, --execute=command
              Execute a command on the remote machine

       -L, --forward-local-port=local-port:target-host:target-port

       -N, --nop
              No operation (suppresses the default action, which is to spawn a
              remote shell)

       --subsystem=subsystem-name
              Connect to given subsystem. Implies --no-pty.

       -S, --shell=command
              Spawn a remote shell

       Universal not:

       -n, --no
              Inverts the effect of the next modifier

       Modifiers that apply to port forwarding:

       -g, --remote-peers
              Allow remote access to forwarded ports

       --no-remote-peers
              Disallow remote access to forwarded ports (default).

       Modifiers that apply to remote execution:

       --detach
              Detach from terminal at session end.

       --no-detach
              Do  not  detach  session  at  end,  wait  for  all open channels
              (default).

       --no-pty
              Don't request a remote pty.

       --no-stderr
              Redirect stderr to /dev/null

       --no-stdin
              Redirect stdin from /dev/null

       --no-stdout
              Redirect stdout to /dev/null

       --stderr=Filename
              Redirect stderr

       --stdin=Filename
              Redirect stdin

       --stdout=Filename
              Redirect stdout

       -t, --pty
              Request a remote pty (default).

       Miscellaneous options:

       -e, --escape-char=Character
              Escape char. `none' means disable. Default is to use `~'  if  we
              have a tty, otherwise none.

       --write-pid
              Make -B write the pid of the backgrounded process to stdout.

       -G, --gateway
              Setup a local gateway

       -R, --forward-remote-port=remote-port:target-host:target-port

       --no-x11-forward
              Disable X11 forwarding (default).

       -x, --x11-forward
              Enable X11 forwarding.

       -?, --help
              Give this help list

       --usage
              Give a short usage message

       -V, --version
              Print program version

FILES

       $HOME/.lsh/captured_keys

       is  the  default file used for storing keys captured when connecting to
       hosts with keys not previously accepted (see the --capture-to option).

       $HOME/.lsh/host_acls

       is the  default  file  containing  accepted  keys  (see  the  --host-db
       option).

       $HOME/.lsh/identity

       is  the  key  file  lsh  attempts to use by default (see the --identity
       option).

DIAGNOSTICS

       See the --verbose , --trace and --debug options.

REPORTING BUGS

       Report bugs to <bug-lsh@gnu.org>.

ENVIRONMENT

       LSH_YARROW_SEED_FILE may be used to specify the random seed file.

       LSHFLAGS may be used for passing  additional  parameters.  The  parsing
       order is undefined.

COPYING

       The  lsh  suite of programs is distributed under the GNU General Public
       License; see the COPYING and AUTHORS files in the  source  distribution
       for details.

AUTHOR

       The   lsh   program   suite   is   written   mainly   by  Niels  Moller
       <nisse@lysator.liu.se>.

       This  man-page  was  originally  written   by   J.H.M.   Dassen   (Ray)
       <jdassen@wi.LeidenUniv.nl>.  It was modified and updated for lsh 2.0 by
       Pontus Freyhult <pont_lsh@soua.net>

SEE ALSO

       lsftp(1), lshg(1), lsh-authorize(1),  lsh-keygen(1),  lsh-make-seed(1),
       lsh-upgrade(1),   lsh-upgrade-key(1),  lsh-writekey(1),  lshd(8),  ssh-
       conv(1)

       The full documentation for lsh is maintained as a Texinfo  manual.   If
       the  info  and  lsh  programs  are properly installed at your site, the
       command

              info lsh

       should give you access to the complete manual.