3 cpu \- connection to CPU server
22 .I encryption-hash-algs
46 machine, or the machine named in the
48 environment variable if there is no
52 standard input, output, and error files will be
54 in the name space where the
61 window on a terminal, so
63 output goes to that window, and input comes from the keyboard
64 when that window is current.
67 the working directory of the
71 The name space for the new
73 is an analogue of the name space where the
76 it is the same except for architecture-dependent bindings such as
78 and the use of fast paths to file servers, if available.
84 uses the argument as the remote user id.
88 argument is present, the remainder of the command line is executed by
90 on the server, and then
96 argument is present, the
100 to control how much of the local name space will be exported to
105 command allows the user to specify the authentication mechanism used
106 when connecting to the remote system. The two possibilities for
112 This is the default. Authentication is done using the standard Plan 9
115 No user interaction is required.
118 Authentication is done using challenge/response and a hand held
124 The user must encrypt the challenge and type the encryption
127 This is used if the local host is in a different protection domain than
128 the server or if the user wants to log into the server as a different
132 This skips authentication. This requires the
134 flag to be specified on the remote side.
139 option specifies an encryption and/or hash algorithm to
140 use for the connection. If both are specified, they must
141 be space separated and comprise a single argument, so they
142 must be quoted if in a shell command. The default is
148 for details on possible algorithms. The argument
150 specifies no encryption algorithm and can be used to talk
151 to older versions of the
157 flag specifies a key pattern to use to restrict the keys
160 call used for authentication.
162 The name space is built by running
163 .B /usr/$user/lib/profile
164 with the root of the invoking name space bound to
168 environment variable is set to
174 environment variables reflect the server's architecture.
180 to run the server (remote) side of the protocol.
181 It is run from service files such as
182 .BR /bin/service/tcp17010 .
185 option allows using the
187 authentication method for incoming connections and must be
196 filter onto the connection to protect against temporary
201 flag sets the announce-string
205 connections, if requested by the initial protocol.
207 The name space of the terminal side of the
209 command is mounted, via
211 on the CPU side on directory
215 are bound to their standard locations from there.
217 .B /sys/src/cmd/cpu.c
224 Binds and mounts done after the terminal
226 is run are not reflected in the new name space.
228 By default, the entire namespace of the local system is
229 exported to the remote system. Use of the
231 option in conjunction with a customized patternfile can
232 limit this exposure, but also limits the usefulness of