version 1.108, 2001/04/30 11:18:52 |
version 1.109, 2001/05/04 14:21:55 |
|
|
Only fatal errors are displayed. |
Only fatal errors are displayed. |
.It Fl s |
.It Fl s |
May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use |
May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use |
of SSH as a secure transport for other application (eg. sftp). The |
of SSH as a secure transport for other applications (eg. sftp). The |
subsystem is specified as the remote command. |
subsystem is specified as the remote command. |
.It Fl t |
.It Fl t |
Force pseudo-tty allocation. |
Force pseudo-tty allocation. |
|
|
is similar to |
is similar to |
.Cm RhostsRSAAuthentication . |
.Cm RhostsRSAAuthentication . |
.It Cm HostKeyAlgorithms |
.It Cm HostKeyAlgorithms |
Specfies the protocol version 2 host key algorithms |
Specifies the protocol version 2 host key algorithms |
that the client wants to use in order of preference. |
that the client wants to use in order of preference. |
The default for this option is: |
The default for this option is: |
.Dq ssh-rsa,ssh-dss |
.Dq ssh-rsa,ssh-dss |