man lshd (Administration système) - secsh (SSH2) server
NAME
lshd - secsh (SSH2) server
SYNOPSIS
lshd [OPTION...]
DESCRIPTION
CAUTION! The information in this manpage may be invalid or outdated. For authorative information on lsh, please see it's Texinfo manual (see the SEE ALSO section).
lshd is a server for the SSH-2 (secsh) protocol.
OPTIONS
- Miscellaneous options:
- -h, --host-key=Key file
- Location of the server's private key.
- --interface=interface
- Listen on this network interface.
- -p, --port=Port
- Listen on this port.
- --debug
- Print huge amounts of debug information
- --log-file=File name
- Append messages to this file.
- -q, --quiet
- Suppress all warnings and diagnostic messages
- --trace
- Detailed trace
- -v, --verbose
- Verbose diagnostic messages
- Algorithm selection:
-
-c, --crypto=Algorithm
--hostkey-algorithm=Algorithm
- --list-algorithms
- List supported algorithms.
-m, --mac=Algorithm
- -z, --compression[=Algorithm]
- Default is zlib.
- --banner-file=File name
- Banner file to send before handshake.
- Keyexchange options:
- --dh-keyexchange
- Enable DH support (default).
- --no-dh-keyexchange
- Disable DH support.
- --no-srp-keyexchange
- Disable experimental SRP support (default).
- --srp-keyexchange
- Enable experimental SRP support.
- User authentication options:
- --kerberos-passwords
- Recognize kerberos passwords, using the helper program "/usr/local/sbin/lsh-krb-checkpw". This option is experimental.
- --login-auth-mode
- Enable a telnet like mode (accept none-authentication and launch thelogin-shell, making it responsible for authenticating the user).
- --login-shell=Program
- Use this program as the login shell for all users. (Experimental)
- --no-kerberos-passwords
- Don't recognize kerberos passwords (default behaviour).
- --no-login-auth-mode
- Disable login-auth-mode (default).
- --no-password
- Disable password user authentication.
- --no-publickey
- Disable publickey user authentication.
- --no-root-login
- Don't allow root to login (default).
- --password
- Enable password user authentication (default).
- --password-helper=Program
- Use the named helper program for password verification. (Experimental).
- --publickey
- Enable publickey user authentication (default).
- --root-login
- Allow root to login.
- Offered services:
- --no-pty-support
- Disable pty allocation.
- --no-tcpip-forward
- Disable tcpip forwarding.
- --no-x11-forward
- Disable x11 forwarding.
- --pty-support
- Enable pty allocation (default).
- --subsystems=List of subsystem names and programs
- For example `sftp=/usr/sbin/sftp-server,foosystem=/usr/bin/foo' (experimental).
- --tcpip-forward
- Enable tcpip forwarding (default).
- --x11-forward
- Enable x11 forwarding (default).
- Options controlling daemonic mode and related options:
- --daemonic
- Run in the background, redirect stdio to /dev/null, and chdir to /.
- --enable-core
- Dump core on fatal errors (disabled by default).
- --no-daemonic
- Run in the foreground, with messages to stderr (default).
- --no-pid-file
- Don't use any pid file. Default in non-daemonic mode.
- --no-syslog
- Don't use syslog (by default, syslog is used when running in daemonic mode).
- --pid-file=file name
- Create a pid file. When running in daemonic mode, the default is /var/run/lshd.pid.
- -?, --help
- Give this help list
- --usage
- Give a short usage message
- -V, --version
- Print program version
Mandatory or optional arguments to long options are also mandatory or optional for any corresponding short options.
FILES
lshd doesn't use any traditional configuration file, but must have a random seed file and the server key. By default
/var/spool/lsh/yarrow-seed-file
is used as random seed file (see ENVIRONMENT for changing this) and
/etc/lsh_host_key
is the default key file.
/var/run/lshd.pid
is used to store the process id of the server by default.
Authorized keys are stored in the directory
$HOME/.lsh/authorized_keys_sha1/
DIAGNOSTICS
Log messages are normally sent to syslog(3) when running in daemonic mode.
See the --verbose , --trace and --debug options.
REPORTING BUGS
Report bugs to <bug-lsh@gnu.org>.
ENVIRONMENT
LSH_YARROW_SEED_FILE may be used to specify the random seed file.
lshd mimics OpenSSH behaviour with respect to SSH_CLIENT and SSH_TTY for processes it starts where applicable.
COPYING
The lsh suite of programs is distributed under the GNU General Public License; see the COPYING and AUTHORS files in the source distribution for details.
AUTHOR
The lsh program suite is written mainly by Niels M[:o]ller <nisse@lysator.liu.se>.
This man-page was originally written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. It was modified and updated for lsh 2.0 by Pontus Freyhult <pont_lsh@soua.net>
SEE ALSO
lsftp(1), lsh(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-upgrade-key(1), lsh-writekey(1), secsh(5), sftp-server(8), syslogd(8)
The full documentation for lsh is maintained as a Texinfo manual. If the info and lsh programs are properly installed at your site, the command
- info lsh
should give you access to the complete manual.