3 cpu \- connection to CPU server
22 .I encryption-hash-algs
41 This tool is deprecated and has been replaced by
49 machine, or the machine named in the
51 environment variable if there is no
55 standard input, output, and error files will be
57 in the name space where the
64 window on a terminal, so
66 output goes to that window, and input comes from the keyboard
67 when that window is current.
70 the working directory of the
74 The name space for the new
76 is an analogue of the name space where the
79 it is the same except for architecture-dependent bindings such as
81 and the use of fast paths to file servers, if available.
87 uses the argument as the remote user id.
91 argument is present, the remainder of the command line is executed by
93 on the server, and then
99 argument is present, the
103 to control how much of the local name space will be exported to
108 command allows the user to specify the authentication mechanism used
109 when connecting to the remote system. The two possibilities for
115 This is the default. Authentication is done using the standard Plan 9
118 No user interaction is required.
121 Authentication is done using challenge/response and a hand held
127 The user must encrypt the challenge and type the encryption
130 This is used if the local host is in a different protection domain than
131 the server or if the user wants to log into the server as a different
135 This skips authentication. This requires the
137 flag to be specified on the remote side.
142 option specifies an encryption and/or hash algorithm to
143 use for the connection. If both are specified, they must
144 be space separated and comprise a single argument, so they
145 must be quoted if in a shell command. The default is
151 for details on possible algorithms. The argument
153 specifies no encryption algorithm and can be used to talk
154 to older versions of the
160 flag specifies a key pattern to use to restrict the keys
163 call used for authentication.
165 The name space is built by running
166 .B /usr/$user/lib/profile
167 with the root of the invoking name space bound to
171 environment variable is set to
177 environment variables reflect the server's architecture.
183 to run the server (remote) side of the protocol.
184 It is run from service files such as
185 .BR /bin/service/tcp17010 .
188 option allows using the
190 authentication method for incoming connections and must be
199 filter onto the connection to protect against temporary
204 flag sets the announce-string
208 connections, if requested by the initial protocol.
210 The name space of the terminal side of the
212 command is mounted, via
214 on the CPU side on directory
218 are bound to their standard locations from there.
220 .B /sys/src/cmd/cpu.c
228 Binds and mounts done after the terminal
230 is run are not reflected in the new name space.
232 By default, the entire namespace of the local system is
233 exported to the remote system. Use of the
235 option in conjunction with a customized patternfile can
236 limit this exposure, but also limits the usefulness of