Rev 2 | Go to most recent revision | Blame | Compare with Previous | Last modification | View Log | RSS feed
.\" Hey, EMACS: -*- nroff -*-
.\" First parameter, NAME, should be all caps
.\" Second parameter, SECTION, should be 1-8, maybe w/ subsection
.\" other parameters are allowed: see man(7), man(1)
.TH LSHD 8 "Jul 06 2002" lshd "lsh manuals"
.\" Please adjust this date whenever revising the manpage.
.\"
.\" Some roff macros, for reference:
.\" .nh disable hyphenation
.\" .hy enable hyphenation
.\" .ad l left justify
.\" .ad b justify to both left and right margins
.\" .nf disable filling
.\" .fi enable filling
.\" .br insert line break
.\" .sp <n> insert n+1 empty lines
.\" for manpage-specific macros, see man(7)
.SH NAME
lshd \- server for the SECSH2 (Secure Shell v2) protocol
.SH SYNOPSIS
.B lshd
.RI [ options ] " files" ...
.SH DESCRIPTION
This manual page documents briefly the
.B lshd
command.
This manual page was written for the Debian distribution
because the original program does not have a manual page.
Instead, it has documentation in the GNU Info format; see below.
.PP
.\" TeX users may be more comfortable with the \fB<whatever>\fP and
.\" \fI<whatever>\fP escape sequences to invode bold face and italics,
.\" respectively.
\fBlshd\fP is a program that listens on a specified port for secure shell
clients to connect and log in securely from a remote machine.
.SH OPTIONS
This program follows the usual GNU command line syntax, with long
options starting with two dashes (`-').
A summary of options is included below.
For a complete description, see the Info files.
.TP
.B \-\-debug
Print huge amounts of debug information.
.TP
.B \-q, \-\-quiet
Suppress all warnings and diagnostic messages.
.TP
.B \-\-trace
Print a detailed program trace.
.TP
.B \-v, \-\-verbose
Print verbose diagnostic messages
.TP
.B \-\-kerberos\-passwords
Recognise kerberos passwords, using the helper program
\fI/usr/sbin/lsh\-krb\-checkpw\fP (experimental).
.TP
.B \-\-login\-shell=\fIprogram\fP
Use this program as the login shell for all users (experimental).
.TP
.B \-\-no\-kerberos\-passwords
Don't recognise kerberos passwords (default).
.TP
.B \-\-no\-password
Disable password user authentication.
.TP
.B \-\-no\-publickey
Disable publickey user authentication.
.TP
.B \-\-no\-root\-login
Don't allow root to login (default)
.TP
.B \-\-password
Enable password authentication (enabled by default).
.TP
.B \-\-password\-helper=\fIhelper-program\fP
Use the named helper program for password verification (experimental).
PAM passwords can be enabled by specifying
\fI\-\-password\-helper=/usr/sbin/lsh-pam-checkpw\fP.
.TP
.B \-\-publickey
Enable publickey user authentication (enabled by default).
.TP
.B \-\-root\-login
ALlow root to login.
.TP
.B \-\-pty\-support
.B \-\-no\-pty\-support
Enable pty allocation (enabled by default).
.TP
.B \-\-subsystems=\fIname\fP=\fIprogram\fP[,\fIname\fP=\fIprogram\fP...]
Lists subsystems to enable connections to (experimental).
For example:
\fI\-\-subsystems=sftp=/usr/sbin/sftp-server,foosystem=/usr/bin/foo\fP.
.TP
.B \-\-daemonic
Run in the background, redirect stdio to \fI/dev/null\fP, chdir to / and write
messages to syslog.
.TP
.B \-\-enable\-core
Dump core on fatal errors (disabled by default).
.TP
.B \-\-no\-daemonic
Run in the foreground, which messages to stderr (default).
.TP
.B \-\-no\-pid\-file
Don't use any pid file. Default in non-daemonic mode.
.TP
.B \-\-no\-syslog
Don't use syslog (by default, syslog is used when running in daemonic mode).
.TP
.B \-\-pid\-file[=\fIfile-name\fP]
Create a pid file. When running in daemonic mode, the default is
\fI/var/run/lshd.pid\fP.
.TP
.B \-?, \-\-help
Show summary of options.
.TP
.B \-\-usage
Show a short usage message.
.TP
.B \-V, \-\-version
Show version of program.
.SH SEE ALSO
.BR lshc (1),
.BR lshd (8).
.BR
The programs are documented fully by
.IR "Lsh" ,
available via the Info system.
.SH AUTHOR
This manual page was written by Timshel Knoll <timshel@debian.org>,
for the Debian GNU/Linux system (but may be used by others).