3 ssh - secure shell remote login client
35 starts a remote shell or
41 The input file descriptor is forwarded to the
42 remote side and output and error descriptors
43 are forwarded to the local side.
45 The connection is authenticated and encrypted
46 using the SSH2 protocol. The user authenticates
47 itself to the host using his RSA key pair (stored
48 in factotum) or plaintext passwords. To authenticate
49 the host to the user, the hosts RSA public key is
50 hashed and compared to the entries in
51 .B $home/lib/sshthumbs
56 location can be changed with the
62 is specified, it is concatenated with the list of quoted
64 and run on the remote side. No pseudo terminal will be requested.
69 is interpreted as a subsystem name such as sftp (see
74 a shell is started on the remote side.
75 In that case and when the
77 environment variable is set (such as when started under
78 a terminal emulator like
80 a pseudo terminal will be requested for the shell.
81 This can be disabled with the
84 A pseudo-terminal can be requested in all cases
91 option, instead of executing a command remotely, makes
92 the server dial a tcp connection to
94 which the client relays on standard input and output.
95 For handling multiple connections transparently to
101 option enables debug output.
103 .TF $home/lib/sshthumbs
105 .B $home/lib/sshthumbs
106 the user's thumbfile of known host fingerprints
108 .B /sys/src/cmd/ssh.c
111 .I keyboard-interactive
112 authentication fails, by default it is retried three times.
117 Setting it to zero disables keyboard-interactive authentication.