Commonly, authentication is handled with standard username/password credentials, but it can also be useful to authenticate with a key exchange. This is done by generating a key on the client with ssh-keygen and populating the
Polecenie ssh
Opcje wykonania ssh
w konsoli
Try only SSH1.
Try only SSH2.
Use only IPv4 addresses.
Use only IPv6 addresses.
Disable forwarding of the authentication agent connection.
Allow forwarding of the authentication agent connection. Can also be specified on a per-host basis in a configuration file.
Specify the interface to transmit from when there are multiple available interfaces or aliased addresses.
Select the cipher for encrypting the session. The default is 3des. For SSH2, a comma-separated list of ciphers can also be specified, with the ciphers listed in order of preference. des is supported only for legacy SSH1 compatibility and otherwise should not be used.
Enable compression. Useful mainly for slow connections. The default compression level can be set on a per-host basis in the configuration file with the CompressionLevel option.
Enable dynamic application-level port forwarding using port on the local side. Can be specified in the configuration file. Only root can forward privileged ports.
Set the escape character (default ~). The escape character must be the first character on a line. If none is specified, disable the use of an escape character.
Run interactively for user authentication, then go into background mode for command execution. Implies -n.
Specify a per-user configuration file (default is $HOME/.ssh/config).
Allow remote hosts to connect to local forwarded ports.
Use idfile to read identity (private key) for RSA or DSA authentication. Default is $HOME/.ssh/id_rsa or $HOME/.ssh/id_dsa for SSH2, or $HOME/.ssh/identity for SSH1. You can specify more than one -i option on the command line or in the configuration file.
Specify a smartcard device from which to get the user's private RSA key.
Disable Kerberos ticket and AFS token forwarding. Can be set on a per-host basis in the configuration file.
Log in as user on the remote system. Can be specified on a per-host basis in the configuration file.
Forward port on the local host to the specified remote host and port. Can be specified in the configuration file. Only root can forward privileged ports. For IPv6, an alternative syntax is port/host/hostport.
For SSH2, the contents of macspec specify message authentication code (MAC) algorithms to use. macspec is a comma-separated list of algorithms in order of preference.
Put the ssh client into master mode for connection sharing.
Get standard input as a redirection from /dev/null. Used to prevent reading from standard input, which is required when running ssh in the background. Useful for running X programs on a remote host.
Do not execute a remote command. Useful with SSH2 for port forwarding.
Specify options in configuration-file format. Useful for specifying options that have no command-line equivalent.
Specify the port on the remote host to which ssh is to connect. Can be specified on a per-host basis in the configuration file.
Run quietly, suppressing warnings and error messages.
Forward port on the remote host to the local host:hostport. Can be specified in the configuration file. You can forward privileged ports only if you are logged in as root on the remote host. For IPv6, an alternative syntax is port/host/hostport.
For SSH2, request invocation of a subsystem on the remote host to be used for another application, such as sftp. The desired subsystem is specified as the remote command.
Specify the location of a control socket for connection sharing.
Force pseudo-tty allocation. Multiple -t options can be specified to force tty allocation even when ssh has no local tty.
Disable pseudo-tty allocation.
Verbose mode. Useful for debugging. Specify multiple -v options to increase verbosity.
Display version information and exit.
Disable X11 forwarding.
Enable X11 forwarding. Can be specified on a per-host basis in the configuration file.
Enable trusted X11 forwarding.
Przykłady ssh działanie w Słownik polecenie S
- Przykład SSH użycie :
- Jak użyć shell, a command interpreter into which all other commands are entered. On modern versions of Linux, this is just another name for the bash shell. For more information, see Chapter 6 . For legacy co to jest.
- Przykład SSH użycie :
- Jak użyć System administration command. The NFS status server, statd , reports server status to clients like the rup command definicja.
- Przykład SSH użycie :
- Jak użyć Server for the ssh program, providing a secure remote-login and remote-execution facility equivalent to rlogin and rsh . Normally started at boot, sshd listens for incoming connections, forking a new co znaczy.
- Przykład SSH użycie :
- Jak użyć TCP/IP command. Attach serial lines as network interfaces, thereby preparing them for use as point-to-point connections. Only a privileged user may attach or detach a network interface słownik.
- Przykład SSH użycie :
- Jak użyć used for public key authentication. ssh-agent is usually executed at the beginning of an X or login session; then all other windows or programs given as command are run as clients of ssh-agent . When znaczenie.