Provided by: lsh-client_2.1-13_amd64 bug

NAME

       lsh - secsh (SSH2) client

SYNOPSIS

       lsh [OPTION...] HOST [COMMAND]

DESCRIPTION

       CAUTION!  The  information  in  this  manpage  may be invalid or outdated. For authorative
       information on lsh, please see it's Texinfo manual (see the SEE ALSO section).

       Connects to the the remote machine HOST, and perform one or more  actions,  i.e.   command
       execution,  various  forwarding  services.  The  default  action  is  to  start  a  remote
       interactive shell or execute a given command on the remote machine.

OPTIONS

       --capture-to=File
              When a new hostkey is received, append an ACL  expressing  trust  in  the  key.  In
              sloppy mode, the default is ~/.lsh/captured_keys.

       --dh-keyexchange
              Enable DH support (default, unless SRP is being used).

       --host-db=Filename
              By default, ~/.lsh/host-acls

       -i, --identity=Identity key
              Use this key to authenticate.

       --no-dh-keyexchange
              Disable DH support.

       --no-publickey
              Don't try publickey user authentication.

       --no-srp-keyexchange
              Disable experimental SRP support (default).

       --publickey
              Try publickey user authentication (default).

       --sloppy-host-authentication
              Allow untrusted hostkeys.

       --srp-keyexchange
              Enable experimental SRP support.

       --strict-host-authentication
              Never, never, ever trust an unknown hostkey.  (default)

       --debug
              Print huge amounts of debug information

       --log-file=File name
              Append messages to this file.

       -q, --quiet
              Suppress all warnings and diagnostic messages

       --trace
              Detailed trace

       -v, --verbose
              Verbose diagnostic messages

       Algorithm selection:

       -c, --crypto=Algorithm

       --hostkey-algorithm=Algorithm

       --list-algorithms
              List supported algorithms.

       -m, --mac=Algorithm

       -z, --compression[=Algorithm]
              Default is zlib.

       --askpass=Program
              Program to use for reading passwords. Should be an absolute filename.

       -l, --user=User name
              Login as this user.

       -p, --port=Port
              Connect to this port.

       Actions:

       -B, --background
              Put process into the background. Implies -N.

       -D, --forward-socks[=port] Enable socks dynamic forwarding

       -E, --execute=command
              Execute a command on the remote machine

       -L, --forward-local-port=local-port:target-host:target-port

       -N, --nop
              No operation (suppresses the default action, which is to spawn a remote shell)

       --subsystem=subsystem-name
              Connect to given subsystem. Implies --no-pty.

       -S, --shell=command
              Spawn a remote shell

       Universal not:

       -n, --no
              Inverts the effect of the next modifier

       Modifiers that apply to port forwarding:

       -g, --remote-peers
              Allow remote access to forwarded ports

       --no-remote-peers
              Disallow remote access to forwarded ports (default).

       Modifiers that apply to remote execution:

       --detach
              Detach from terminal at session end.

       --no-detach
              Do not detach session at end, wait for all open channels (default).

       --no-pty
              Don't request a remote pty.

       --no-stderr
              Redirect stderr to /dev/null

       --no-stdin
              Redirect stdin from /dev/null

       --no-stdout
              Redirect stdout to /dev/null

       --stderr=Filename
              Redirect stderr

       --stdin=Filename
              Redirect stdin

       --stdout=Filename
              Redirect stdout

       -t, --pty
              Request a remote pty (default).

       Miscellaneous options:

       -e, --escape-char=Character
              Escape  char.  `none'  means  disable.  Default  is  to  use  `~' if we have a tty,
              otherwise none.

       --write-pid
              Make -B write the pid of the backgrounded process to stdout.

       -G, --gateway
              Setup a local gateway

       -R, --forward-remote-port=remote-port:target-host:target-port

       --no-x11-forward
              Disable X11 forwarding (default).

       -x, --x11-forward
              Enable X11 forwarding.

       -?, --help
              Give this help list

       --usage
              Give a short usage message

       -V, --version
              Print program version

FILES

       $HOME/.lsh/captured_keys

       is the default file used for storing keys captured when connecting to hosts with keys  not
       previously accepted (see the --capture-to option).

       $HOME/.lsh/host_acls

       is the default file containing accepted keys (see the --host-db option).

       $HOME/.lsh/identity

       is the key file lsh attempts to use by default (see the --identity option).

DIAGNOSTICS

       See the --verbose , --trace and --debug options.

REPORTING BUGS

       Report bugs to <bug-lsh@gnu.org>.

ENVIRONMENT

       LSH_YARROW_SEED_FILE may be used to specify the random seed file.

       LSHFLAGS may be used for passing additional parameters. The parsing order is undefined.

COPYING

       The  lsh  suite  of  programs is distributed under the GNU General Public License; see the
       COPYING and AUTHORS files in the source distribution for details.

AUTHOR

       The lsh program suite is written mainly by Niels Möller <nisse@lysator.liu.se>.

       This man-page was originally written by J.H.M.  Dassen  (Ray)  <jdassen@wi.LeidenUniv.nl>.
       It was modified and updated for lsh 2.0 by Pontus Freyhult <pont_lsh@soua.net>

SEE ALSO

       lsftp(1), lshg(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-
       upgrade-key(1), lsh-writekey(1), lshd(8), ssh-conv(1)

       The full documentation for lsh is maintained as a Texinfo manual.  If  the  info  and  lsh
       programs are properly installed at your site, the command

              info lsh

       should give you access to the complete manual.