3 cpu \- connection to CPU server
22 .I encryption-hash-algs
48 machine, or the machine named in the
50 environment variable if there is no
54 standard input, output, and error files will be
56 in the name space where the
63 window on a terminal, so
65 output goes to that window, and input comes from the keyboard
66 when that window is current.
69 the working directory of the
73 The name space for the new
75 is an analogue of the name space where the
78 it is the same except for architecture-dependent bindings such as
80 and the use of fast paths to file servers, if available.
86 uses the argument as the remote user id.
90 argument is present, the remainder of the command line is executed by
92 on the server, and then
98 argument is present, the
102 to control how much of the local name space will be exported to
107 command allows the user to specify the authentication mechanism used
108 when connecting to the remote system. The two possibilities for
114 This is the default. Authentication is done using the standard Plan 9
117 No user interaction is required.
120 Authentication is done using challenge/response and a hand held
126 The user must encrypt the challenge and type the encryption
129 This is used if the local host is in a different protection domain than
130 the server or if the user wants to log into the server as a different
134 This skips authentication. This requires the
136 flag to be specified on the remote side.
141 option specifies an encryption and/or hash algorithm to
142 use for the connection. If both are specified, they must
143 be space separated and comprise a single argument, so they
144 must be quoted if in a shell command. The default is
150 for details on possible algorithms. The argument
152 specifies no encryption algorithm and can be used to talk
153 to older versions of the
159 flag specifies a key pattern to use to restrict the keys
162 call used for authentication.
164 The name space is built by running
165 .B /usr/$user/lib/profile
166 with the root of the invoking name space bound to
170 environment variable is set to
176 environment variables reflect the server's architecture.
182 to run the server (remote) side of the protocol.
183 It is run from service files such as
184 .BR /bin/service/tcp17010 .
187 flag is similar but simulates the pre-9P2000 version
193 option allows using the
195 authentication method for incoming connections and must be
206 filter onto the connection to protect against temporary
211 flag sets the announce-string
215 connections, if requested by the initial protocol.
217 The name space of the terminal side of the
219 command is mounted, via
221 on the CPU side on directory
225 are bound to their standard locations from there.
227 .B /sys/src/cmd/cpu.c
234 Binds and mounts done after the terminal
236 is run are not reflected in the new name space.
238 By default, the entire namespace of the local system is
239 exported to the remote system. Use of the
241 option in conjunction with a customized patternfile can
242 limit this exposure, but also limits the usefulness of