Provided by: lsh-client_2.1-12build3_amd64 bug

NAME

       lsh - secsh (SSH2) client

SYNOPSIS

       lsh [OPTION...] HOST [COMMAND]

DESCRIPTION

       CAUTION!  The information in this manpage may be invalid or outdated. For authorative information on lsh,
       please see it's Texinfo manual (see the SEE ALSO section).

       Connects to the the remote machine HOST, and perform  one  or  more  actions,  i.e.   command  execution,
       various forwarding services. The default action is to start a remote interactive shell or execute a given
       command on the remote machine.

OPTIONS

       --capture-to=File
              When a new hostkey is received, append an ACL expressing trust in the key.  In  sloppy  mode,  the
              default is ~/.lsh/captured_keys.

       --dh-keyexchange
              Enable DH support (default, unless SRP is being used).

       --host-db=Filename
              By default, ~/.lsh/host-acls

       -i, --identity=Identity key
              Use this key to authenticate.

       --no-dh-keyexchange
              Disable DH support.

       --no-publickey
              Don't try publickey user authentication.

       --no-srp-keyexchange
              Disable experimental SRP support (default).

       --publickey
              Try publickey user authentication (default).

       --sloppy-host-authentication
              Allow untrusted hostkeys.

       --srp-keyexchange
              Enable experimental SRP support.

       --strict-host-authentication
              Never, never, ever trust an unknown hostkey.  (default)

       --debug
              Print huge amounts of debug information

       --log-file=File name
              Append messages to this file.

       -q, --quiet
              Suppress all warnings and diagnostic messages

       --trace
              Detailed trace

       -v, --verbose
              Verbose diagnostic messages

       Algorithm selection:

       -c, --crypto=Algorithm

       --hostkey-algorithm=Algorithm

       --list-algorithms
              List supported algorithms.

       -m, --mac=Algorithm

       -z, --compression[=Algorithm]
              Default is zlib.

       --askpass=Program
              Program to use for reading passwords. Should be an absolute filename.

       -l, --user=User name
              Login as this user.

       -p, --port=Port
              Connect to this port.

       Actions:

       -B, --background
              Put process into the background. Implies -N.

       -D, --forward-socks[=port] Enable socks dynamic forwarding

       -E, --execute=command
              Execute a command on the remote machine

       -L, --forward-local-port=local-port:target-host:target-port

       -N, --nop
              No operation (suppresses the default action, which is to spawn a remote shell)

       --subsystem=subsystem-name
              Connect to given subsystem. Implies --no-pty.

       -S, --shell=command
              Spawn a remote shell

       Universal not:

       -n, --no
              Inverts the effect of the next modifier

       Modifiers that apply to port forwarding:

       -g, --remote-peers
              Allow remote access to forwarded ports

       --no-remote-peers
              Disallow remote access to forwarded ports (default).

       Modifiers that apply to remote execution:

       --detach
              Detach from terminal at session end.

       --no-detach
              Do not detach session at end, wait for all open channels (default).

       --no-pty
              Don't request a remote pty.

       --no-stderr
              Redirect stderr to /dev/null

       --no-stdin
              Redirect stdin from /dev/null

       --no-stdout
              Redirect stdout to /dev/null

       --stderr=Filename
              Redirect stderr

       --stdin=Filename
              Redirect stdin

       --stdout=Filename
              Redirect stdout

       -t, --pty
              Request a remote pty (default).

       Miscellaneous options:

       -e, --escape-char=Character
              Escape char. `none' means disable. Default is to use `~' if we have a tty, otherwise none.

       --write-pid
              Make -B write the pid of the backgrounded process to stdout.

       -G, --gateway
              Setup a local gateway

       -R, --forward-remote-port=remote-port:target-host:target-port

       --no-x11-forward
              Disable X11 forwarding (default).

       -x, --x11-forward
              Enable X11 forwarding.

       -?, --help
              Give this help list

       --usage
              Give a short usage message

       -V, --version
              Print program version

FILES

       $HOME/.lsh/captured_keys

       is  the  default  file  used  for storing keys captured when connecting to hosts with keys not previously
       accepted (see the --capture-to option).

       $HOME/.lsh/host_acls

       is the default file containing accepted keys (see the --host-db option).

       $HOME/.lsh/identity

       is the key file lsh attempts to use by default (see the --identity option).

DIAGNOSTICS

       See the --verbose , --trace and --debug options.

REPORTING BUGS

       Report bugs to <bug-lsh@gnu.org>.

ENVIRONMENT

       LSH_YARROW_SEED_FILE may be used to specify the random seed file.

       LSHFLAGS may be used for passing additional parameters. The parsing order is undefined.

COPYING

       The lsh suite of programs is distributed under the GNU  General  Public  License;  see  the  COPYING  and
       AUTHORS files in the source distribution for details.

AUTHOR

       The lsh program suite is written mainly by Niels Möller <nisse@lysator.liu.se>.

       This  man-page was originally written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>.  It was modified
       and updated for lsh 2.0 by Pontus Freyhult <pont_lsh@soua.net>

SEE ALSO

       lsftp(1), lshg(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-upgrade-key(1),
       lsh-writekey(1), lshd(8), ssh-conv(1)

       The  full  documentation  for  lsh  is  maintained as a Texinfo manual.  If the info and lsh programs are
       properly installed at your site, the command

              info lsh

       should give you access to the complete manual.