Name

ssh

Synopsis

ssh [-l user] host [commands]
ssh [options] [user@]host
                  

Secures shell. This is a secure replacement for the rsh, rlogin, and rcp programs. ssh uses strong public-key encryption technologies to provide end-to-end encryption of data. There may be licensing/patent issues restricting the use of the software in some countries.

Options

-a

Turn off authentication agent connection forwarding.

-A

Turn on authentication agent connection forwarding.

-b interface

Use the specified network interface (on a multiple interface machine).

-c cipher

Use the specified type of encryption, either blowfish, des or 3des. 3des is the default.

-C

Turn on compression.

-D

Behave like a SOCKS4 server.

-e c

Specify escape character c. Use the word “none” to disable any escape character.

-f

Send ssh to the background.

-F filename

Use specified configuration file.

-g

Accept connections to local forward ports from remote hosts.

-i keyfile

Specify an identity file to use for authentication. The default is $HOME/.ssh/identity.

-I device

Used smartcard device.

-k

Turn off Kerberos ticket forwarding.

-l user

Log in as user.

-L port1:host2: port2

Set up port forwarding from a local host to a remote host.

-m algorithm

Use specifed MAC algorithm(s).

-n

Does not allow reading form stdin.

-N

Turn off remote command execution.

-o keyword

Set configuration keyword.

-p port

Select TCP port number.

-P

Use a nonprivileged port is for outgoing connections.

-q

Run in quiet mode.

-R port1:host2: port2

Set up port forwarding ...

Get Mac OS X in a Nutshell now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.