Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

lsh-make-seed(1) [debian man page]

LSH-MAKE-SEED(1)						    Lsh Manuals 						  LSH-MAKE-SEED(1)

NAME
lsh-make-seed - Creates random seed file for the YARROW pseudorandomnessgenerator. SYNOPSIS
lsh-make-seed [OPTION...] DESCRIPTION
CAUTION! The information in this manpage may be invalid or outdated. For authorative information on lsh, please see it's Texinfo manual (see the SEE ALSO section). Creates an initial random seed file for the YARROW pseudorandomnessgenerator used by lsh. OPTIONS
-f, --force Overwrite any existing seed file. -o, --output-file=Filename Default is ~/.lsh/seed-file --server Save seed file where the lshd server expects it --sloppy Generate seed file even if we can't collect a good amount of randomness from the environment. --debug Print huge amounts of debug information --log-file=File name Append messages to this file. -q, --quiet Suppress all warnings and diagnostic messages --trace Detailed trace -v, --verbose Verbose diagnostic messages -?, --help Give this help list --usage Give a short usage message -V, --version Print program version Mandatory or optional arguments to long options are also mandatory or optional for any corresponding short options. DIAGNOSTICS
See the --log-file , --verbose , --trace and --debug options. REPORTING BUGS
Report bugs to <bug-lsh@gnu.org>. COPYING
The lsh suite of programs is distributed under the GNU General Public License; see the COPYING and AUTHORS files in the source distribution for details. AUTHOR
The lsh program suite is written mainly by Niels Moller <nisse@lysator.liu.se>. This man-page was written for lsh 2.0 by Pontus Freyhult <pont_lsh@soua.net>, it is based on a template written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. SEE ALSO
DSA(5), lsh(1), lsh-authorize(1), lsh-decode-key(1), lsh-decrypt-key(1), lsh-export-key(1), lsh-keygen(1), lsh-upgrade(1), lsh-upgrade- key(1), lsh-writekey(1), lshd(8), secsh(5), SHA(5), SPKI(5), ssh-conv(1) The full documentation for lsh is maintained as a Texinfo manual. If the info and lsh programs are properly installed at your site, the command info lsh should give you access to the complete manual. LSH-MAKE-SEED NOVEMBER 2004 LSH-MAKE-SEED(1)

Check Out this Related Man Page

LSH(1)								    Lsh Manuals 							    LSH(1)

NAME
lsh - secsh (SSH2) client SYNOPSIS
lsh [OPTION...] HOST [COMMAND] DESCRIPTION
CAUTION! The information in this manpage may be invalid or outdated. For authorative information on lsh, please see it's Texinfo manual (see the SEE ALSO section). Connects to the the remote machine HOST, and perform one or more actions, i.e. command execution, various forwarding services. The default action is to start a remote interactive shell or execute a given command on the remote machine. OPTIONS
--capture-to=File When a new hostkey is received, append an ACL expressing trust in the key. In sloppy mode, the default is ~/.lsh/captured_keys. --dh-keyexchange Enable DH support (default, unless SRP is being used). --host-db=Filename By default, ~/.lsh/host-acls -i, --identity=Identity key Use this key to authenticate. --no-dh-keyexchange Disable DH support. --no-publickey Don't try publickey user authentication. --no-srp-keyexchange Disable experimental SRP support (default). --publickey Try publickey user authentication (default). --sloppy-host-authentication Allow untrusted hostkeys. --srp-keyexchange Enable experimental SRP support. --strict-host-authentication Never, never, ever trust an unknown hostkey. (default) --debug Print huge amounts of debug information --log-file=File name Append messages to this file. -q, --quiet Suppress all warnings and diagnostic messages --trace Detailed trace -v, --verbose Verbose diagnostic messages Algorithm selection: -c, --crypto=Algorithm --hostkey-algorithm=Algorithm --list-algorithms List supported algorithms. -m, --mac=Algorithm -z, --compression[=Algorithm] Default is zlib. --askpass=Program Program to use for reading passwords. Should be an absolute filename. -l, --user=User name Login as this user. -p, --port=Port Connect to this port. Actions: -B, --background Put process into the background. Implies -N. -D, --forward-socks[=port] Enable socks dynamic forwarding -E, --execute=command Execute a command on the remote machine -L, --forward-local-port=local-port:target-host:target-port -N, --nop No operation (suppresses the default action, which is to spawn a remote shell) --subsystem=subsystem-name Connect to given subsystem. Implies --no-pty. -S, --shell=command Spawn a remote shell Universal not: -n, --no Inverts the effect of the next modifier Modifiers that apply to port forwarding: -g, --remote-peers Allow remote access to forwarded ports --no-remote-peers Disallow remote access to forwarded ports (default). Modifiers that apply to remote execution: --detach Detach from terminal at session end. --no-detach Do not detach session at end, wait for all open channels (default). --no-pty Don't request a remote pty. --no-stderr Redirect stderr to /dev/null --no-stdin Redirect stdin from /dev/null --no-stdout Redirect stdout to /dev/null --stderr=Filename Redirect stderr --stdin=Filename Redirect stdin --stdout=Filename Redirect stdout -t, --pty Request a remote pty (default). Miscellaneous options: -e, --escape-char=Character Escape char. `none' means disable. Default is to use `~' if we have a tty, otherwise none. --write-pid Make -B write the pid of the backgrounded process to stdout. -G, --gateway Setup a local gateway -R, --forward-remote-port=remote-port:target-host:target-port --no-x11-forward Disable X11 forwarding (default). -x, --x11-forward Enable X11 forwarding. -?, --help Give this help list --usage Give a short usage message -V, --version Print program version FILES
$HOME/.lsh/captured_keys is the default file used for storing keys captured when connecting to hosts with keys not previously accepted (see the --capture-to option). $HOME/.lsh/host_acls is the default file containing accepted keys (see the --host-db option). $HOME/.lsh/identity is the key file lsh attempts to use by default (see the --identity option). DIAGNOSTICS
See the --verbose , --trace and --debug options. REPORTING BUGS
Report bugs to <bug-lsh@gnu.org>. ENVIRONMENT
LSH_YARROW_SEED_FILE may be used to specify the random seed file. LSHFLAGS may be used for passing additional parameters. The parsing order is undefined. COPYING
The lsh suite of programs is distributed under the GNU General Public License; see the COPYING and AUTHORS files in the source distribution for details. AUTHOR
The lsh program suite is written mainly by Niels Moller <nisse@lysator.liu.se>. This man-page was originally written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. It was modified and updated for lsh 2.0 by Pontus Freyhult <pont_lsh@soua.net> SEE ALSO
lsftp(1), lshg(1), lsh-authorize(1), lsh-keygen(1), lsh-make-seed(1), lsh-upgrade(1), lsh-upgrade-key(1), lsh-writekey(1), lshd(8), ssh- conv(1) The full documentation for lsh is maintained as a Texinfo manual. If the info and lsh programs are properly installed at your site, the command info lsh should give you access to the complete manual. LSH
NOVEMBER 2004 LSH(1)
Man Page