Provided by: lsh-server_2.1-13_amd64 bug

NAME

       lshd - secsh (SSH2) server

SYNOPSIS

       lshd [OPTION...]

DESCRIPTION

       CAUTION!  The  information  in  this  manpage  may be invalid or outdated. For authorative
       information on lsh, please see it's Texinfo manual (see the SEE ALSO section).

       lshd is a server for the SSH-2 (secsh) protocol.

OPTIONS

       Miscellaneous options:

       -h, --host-key=Key file
              Location of the server's private key.

       --interface=interface
              Listen on this network interface.

       -p, --port=Port
              Listen on this port.

       --debug
              Print huge amounts of debug information

       --log-file=File name
              Append messages to this file.

       -q, --quiet
              Suppress all warnings and diagnostic messages

       --trace
              Detailed trace

       -v, --verbose
              Verbose diagnostic messages

       Algorithm selection:

       -c, --crypto=Algorithm

       --hostkey-algorithm=Algorithm

       --list-algorithms
              List supported algorithms.

       -m, --mac=Algorithm

       -z, --compression[=Algorithm]
              Default is zlib.

       --banner-file=File name
              Banner file to send before handshake.

       Keyexchange options:

       --dh-keyexchange
              Enable DH support (default).

       --no-dh-keyexchange
              Disable DH support.

       --no-srp-keyexchange
              Disable experimental SRP support (default).

       --srp-keyexchange
              Enable experimental SRP support.

       User authentication options:

       --kerberos-passwords
              Recognize kerberos passwords, using the  helper  program  "/usr/local/sbin/lsh-krb-
              checkpw". This option is experimental.

       --login-auth-mode
              Enable  a  telnet  like mode (accept none-authentication and launch thelogin-shell,
              making it responsible for authenticating the user).

       --login-shell=Program
              Use this program as the login shell for all users.  (Experimental)

       --no-kerberos-passwords
              Don't recognize kerberos passwords (default behaviour).

       --no-login-auth-mode
              Disable login-auth-mode (default).

       --no-password
              Disable password user authentication.

       --no-publickey
              Disable publickey user authentication.

       --no-root-login
              Don't allow root to login (default).

       --password
              Enable password user authentication (default).

       --password-helper=Program
              Use the named helper program for password verification. (Experimental).

       --publickey
              Enable publickey user authentication (default).

       --root-login
              Allow root to login.

       Offered services:

       --no-pty-support
              Disable pty allocation.

       --no-tcpip-forward
              Disable tcpip forwarding.

       --no-x11-forward
              Disable x11 forwarding.

       --pty-support
              Enable pty allocation (default).

       --subsystems=List of subsystem names and programs
              For example `sftp=/usr/sbin/sftp-server,foosystem=/usr/bin/foo' (experimental).

       --tcpip-forward
              Enable tcpip forwarding (default).

       --x11-forward
              Enable x11 forwarding (default).

       Options controlling daemonic mode and related options:

       --daemonic
              Run in the background, redirect stdio to /dev/null, and chdir to /.

       --enable-core
              Dump core on fatal errors (disabled by default).

       --no-daemonic
              Run in the foreground, with messages to stderr (default).

       --no-pid-file
              Don't use any pid file. Default in non-daemonic mode.

       --no-syslog
              Don't use syslog (by default, syslog is used when running in daemonic mode).

       --pid-file=file name
              Create a pid file. When running in daemonic mode, the default is /var/run/lshd.pid.

       -?, --help
              Give this help list

       --usage
              Give a short usage message

       -V, --version
              Print program version

       Mandatory or optional arguments to long options are also mandatory  or  optional  for  any
       corresponding short options.

FILES

       lshd  doesn't use any traditional configuration file, but must have a random seed file and
       the server key.  By default

       /var/spool/lsh/yarrow-seed-file

       is used as random seed file (see ENVIRONMENT for changing this) and

       /etc/lsh_host_key

       is the default key file.

       /var/run/lshd.pid

       is used to store the process id of the server by default.

       Authorized keys are stored in the directory

       $HOME/.lsh/authorized_keys_sha1/

DIAGNOSTICS

       Log messages are normally sent to syslog(3) when running in daemonic mode.

       See the --verbose , --trace and --debug options.

REPORTING BUGS

       Report bugs to <bug-lsh@gnu.org>.

ENVIRONMENT

       LSH_YARROW_SEED_FILE may be used to specify the random seed file.

       lshd mimics OpenSSH behaviour with respect to SSH_CLIENT  and  SSH_TTY  for  processes  it
       starts where applicable.

COPYING

       The  lsh  suite  of  programs is distributed under the GNU General Public License; see the
       COPYING and AUTHORS files in the source distribution for details.

AUTHOR

       The lsh program suite is written mainly by Niels Möller <nisse@lysator.liu.se>.

       This man-page was originally written by J.H.M.  Dassen  (Ray)  <jdassen@wi.LeidenUniv.nl>.
       It was modified and updated for lsh 2.0 by Pontus Freyhult <pont_lsh@soua.net>

SEE ALSO

       lsftp(1),  lsh(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-
       upgrade-key(1), lsh-writekey(1), secsh(5), sftp-server(8), syslogd(8)

       The full documentation for lsh is maintained as a Texinfo manual.  If  the  info  and  lsh
       programs are properly installed at your site, the command

              info lsh

       should give you access to the complete manual.