Name
ssh
Synopsis
ssh [-luser
]host
[commands
] ssh [options
] [user
@]host
The Secure Shell, ssh is a secure replacement for the rsh, rlogin, and rcp programs. ssh uses strong public-key encryption technologies to provide end-to-end encryption of data. There may be licensing/patent issues restricting the use of the software in some countries.
Options
- -a
Turn off authentication agent connection forwarding.
- -A
Turn on authentication agent connection forwarding.
-
-b
interface
Use the specified network interface (on a multiple interface machine).
-
-c
cipher
Use the specified type of encryption, either blowfish, des, or 3des. 3des is the default.
- -C
Turn on compression.
-
-D
port
Behave like a SOCKS4 server, listening on port
port
.-
-e
c
Specify escape character
c
. Use the word “none” to disable any escape character.- -f
Send ssh to the background.
-
-F
filename
Use specified configuration file.
- -g
Accept connections to local forward ports from remote hosts.
-
-i
keyfile
Specify an identity file to use for authentication. The default is $HOME/.ssh/identity.
-
-I
device
Used smartcard
device
.- -k
Turn off Kerberos ticket forwarding.
-
-l
user
Log in as
user
.-
-L
listenport
:targethost
:targetport
Set up port forwarding from local host to a target host. For example, to listen on port 8143 locally, and have it forwarded to imap.example.com on port 143, use -L 8143:imap.example.com:143.
-
-m
algorithm
Use specified MAC algorithm(s).
- -n
Don’t allow reading from STDIN. For use when ssh is running in the background. ...
Get Mac OS X Tiger in a Nutshell now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.