table of contents
LSHD(8) | Lsh Manuals | LSHD(8) |
NAME¶
lshd - secsh (SSH2) serverSYNOPSIS¶
lshd [ OPTION...]DESCRIPTION¶
CAUTION! The information in this manpage may be invalid or outdated. For authorative information on lsh, please see it's Texinfo manual (see the SEE ALSO section).OPTIONS¶
- Miscellaneous options:
-
- -h, --host-key=Key file
- Location of the server's private key.
- --interface=interface
- Listen on this network interface.
- -p, --port=Port
- Listen on this port.
- --debug
- Print huge amounts of debug information
- --log-file=File name
- Append messages to this file.
- -q, --quiet
- Suppress all warnings and diagnostic messages
- --trace
- Detailed trace
- -v, --verbose
- Verbose diagnostic messages
- Algorithm selection:
-c,
--crypto=Algorithm
--hostkey-algorithm=Algorithm
- --list-algorithms
- List supported algorithms.
-m,
--mac=Algorithm
- -z, --compression[=Algorithm]
- Default is zlib.
- --banner-file=File name
- Banner file to send before handshake.
- Keyexchange options:
- --dh-keyexchange
- Enable DH support (default).
- --no-dh-keyexchange
- Disable DH support.
- --no-srp-keyexchange
- Disable experimental SRP support (default).
- --srp-keyexchange
- Enable experimental SRP support.
- User authentication options:
- --kerberos-passwords
- Recognize kerberos passwords, using the helper program "/usr/local/sbin/lsh-krb-checkpw". This option is experimental.
- --login-auth-mode
- Enable a telnet like mode (accept none-authentication and launch thelogin-shell, making it responsible for authenticating the user).
- --login-shell=Program
- Use this program as the login shell for all users. (Experimental)
- --no-kerberos-passwords
- Don't recognize kerberos passwords (default behaviour).
- --no-login-auth-mode
- Disable login-auth-mode (default).
- --no-password
- Disable password user authentication.
- --no-publickey
- Disable publickey user authentication.
- --no-root-login
- Don't allow root to login (default).
- --password
- Enable password user authentication (default).
- --password-helper=Program
- Use the named helper program for password verification. (Experimental).
- --publickey
- Enable publickey user authentication (default).
- --root-login
- Allow root to login.
- Offered services:
- --no-pty-support
- Disable pty allocation.
- --no-tcpip-forward
- Disable tcpip forwarding.
- --no-x11-forward
- Disable x11 forwarding.
- --pty-support
- Enable pty allocation (default).
- --subsystems=List of subsystem names and programs
- For example `sftp=/usr/sbin/sftp-server,foosystem=/usr/bin/foo' (experimental).
- --tcpip-forward
- Enable tcpip forwarding (default).
- --x11-forward
- Enable x11 forwarding (default).
- Options controlling daemonic mode and related options:
- --daemonic
- Run in the background, redirect stdio to /dev/null, and chdir to /.
- --enable-core
- Dump core on fatal errors (disabled by default).
- --no-daemonic
- Run in the foreground, with messages to stderr (default).
- --no-pid-file
- Don't use any pid file. Default in non-daemonic mode.
- --no-syslog
- Don't use syslog (by default, syslog is used when running in daemonic mode).
- --pid-file=file name
- Create a pid file. When running in daemonic mode, the default is /var/run/lshd.pid.
- -?, --help
- Give this help list
- --usage
- Give a short usage message
- -V, --version
- Print program version
FILES¶
lshd doesn't use any traditional configuration file, but must have a random seed file and the server key. By defaultDIAGNOSTICS¶
Log messages are normally sent to syslog(3) when running in daemonic mode.REPORTING BUGS¶
Report bugs to <bug-lsh@gnu.org>.ENVIRONMENT¶
LSH_YARROW_SEED_FILE may be used to specify the random seed file.COPYING¶
The lsh suite of programs is distributed under the GNU General Public License; see the COPYING and AUTHORS files in the source distribution for details.AUTHOR¶
The lsh program suite is written mainly by Niels Möller <nisse@lysator.liu.se>.SEE ALSO¶
lsftp(1), lsh(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-upgrade-key(1), lsh-writekey(1), secsh(5), sftp-server(8), syslogd(8)- info lsh
NOVEMBER 2004 | LSHD |