version 1.116, 2001/06/23 02:34:31 |
version 1.117, 2001/06/23 17:48:19 |
|
|
.Ss Escape Characters |
.Ss Escape Characters |
.Pp |
.Pp |
When a pseudo terminal has been requested, ssh supports a number of functions |
When a pseudo terminal has been requested, ssh supports a number of functions |
through the use of an escape character. |
through the use of an escape character. |
.Pp |
.Pp |
A single tilde character can be sent as |
A single tilde character can be sent as |
.Ic ~~ |
.Ic ~~ |
|
|
special. |
special. |
The escape character can be changed in configuration files using the |
The escape character can be changed in configuration files using the |
.Cm EscapeChar |
.Cm EscapeChar |
configuration directive or on the command line by the |
configuration directive or on the command line by the |
.Fl e |
.Fl e |
option. |
option. |
.Pp |
.Pp |
|
|
Causes all warning and diagnostic messages to be suppressed. |
Causes all warning and diagnostic messages to be suppressed. |
Only fatal errors are displayed. |
Only fatal errors are displayed. |
.It Fl s |
.It Fl s |
May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use |
May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use |
of SSH as a secure transport for other applications (eg. sftp). The |
of SSH as a secure transport for other applications (eg. sftp). The |
subsystem is specified as the remote command. |
subsystem is specified as the remote command. |
.It Fl t |
.It Fl t |
Force pseudo-tty allocation. |
Force pseudo-tty allocation. |
|
|
Specifies the cipher to use for encrypting the session |
Specifies the cipher to use for encrypting the session |
in protocol version 1. |
in protocol version 1. |
Currently, |
Currently, |
.Dq blowfish |
.Dq blowfish |
and |
and |
.Dq 3des |
.Dq 3des |
are supported. |
are supported. |
|
|
QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG. |
QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG. |
The default is INFO. |
The default is INFO. |
.It Cm MACs |
.It Cm MACs |
Specifies the MAC (message authentication code) algorithms |
Specifies the MAC (message authentication code) algorithms |
in order of preference. |
in order of preference. |
The MAC algorithm is used in protocol version 2 |
The MAC algorithm is used in protocol version 2 |
for data integrity protection. |
for data integrity protection. |
|
|
Specifies the port number to connect on the remote host. |
Specifies the port number to connect on the remote host. |
Default is 22. |
Default is 22. |
.It Cm PreferredAuthentications |
.It Cm PreferredAuthentications |
Specifies the order in which the client should try protocol 2 |
Specifies the order in which the client should try protocol 2 |
authentication methods. This allows a client to prefer one method (e.g. |
authentication methods. This allows a client to prefer one method (e.g. |
.Cm keyboard-interactive ) |
.Cm keyboard-interactive ) |
over another method (e.g. |
over another method (e.g. |
.Cm password ) |
.Cm password ) |
|
|
authentication time on slow connections when rhosts authentication is |
authentication time on slow connections when rhosts authentication is |
not used. |
not used. |
Most servers do not permit RhostsAuthentication because it |
Most servers do not permit RhostsAuthentication because it |
is not secure (see |
is not secure (see |
.Cm RhostsRSAAuthentication ) . |
.Cm RhostsRSAAuthentication ) . |
The argument to this keyword must be |
The argument to this keyword must be |
.Dq yes |
.Dq yes |