Name

ssh

Synopsis

ssh [-l user] host[commands]
ssh [options] [user@]host

The Secure Shell, ssh is a secure replacement for the rsh, rlogin, and rcp programs. ssh uses strong public-key encryption technologies to provide end-to-end encryption of data. There may be licensing/patent issues restricting the use of the software in some countries.

Options

-a

Turn off authentication agent connection forwarding.

-A

Turn on authentication agent connection forwarding.

-b interface

Use the specified network interface (on a multiple interface machine).

-c cipher

Use the specified type of encryption, either blowfish, des, or 3des. 3des is the default.

-C

Turn on compression.

-D port

Behave like a SOCKS4 server, listening on port port.

-e c

Specify escape character c. Use the word “none” to disable any escape character.

-f

Send ssh to the background.

-F filename

Use specified configuration file.

-g

Accept connections to local forward ports from remote hosts.

-i keyfile

Specify an identity file to use for authentication. The default is $HOME/.ssh/identity.

-I device

Used smartcard device.

-k

Turn off Kerberos ticket forwarding.

-l user

Log in as user.

-L listenport:targethost: targetport

Set up port forwarding from local host to a target host. For example, to listen on port 8143 locally, and have it forwarded to imap.example.com on port 143, use -L 8143:imap.example.com:143.

-m algorithm

Use specified MAC algorithm(s).

-n

Don’t allow reading from STDIN. For use when ssh is running in the background. ...

Get Mac OS X Tiger in a Nutshell now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.