Skip to content
Snippets Groups Projects
Select Git revision
  • 00f29f1141b3592d6b3a03f1fe46e99a33d5010f
  • master default
  • wip-add-ed25519
  • disable-sha1
  • lsh-2.0.4
  • experimental-20050201
  • lsh-1.4.2
  • lsh-1.2
  • lsh_2.1_release_20130626
  • converted-master-branch-to-git
  • nettle_2.4_release_20110903
  • nettle_2.3_release_20110902
  • nettle_2.2_release_20110711
  • nettle_2.1_release_20100725
  • camellia_32bit_20100720
  • nettle_2.0_release_20090608
  • converted-lsh-2.0.4-branch-to-git
  • lsh_2.0.4_release_20070905
  • lsh_2.9_exp_release_20070404
  • nettle_1.15_release_20061128
  • after_experimental_merge_20060516
  • branch_before_experimental_merge_20060516
  • converted-experimental-branch-to-git
  • head_before_experimental_merge_20060516
  • lsh_2.0.3_release_20060509
  • lsh_2.0.2_release_20060127
  • nettle_1.14_release_20051205
  • nettle_1.13_release_20051006
28 results

lsh

  • Clone with SSH
  • Clone with HTTPS
  • Niels Möller's avatar
    Niels Möller authored
    * src/lshd.c (main_argp_parser): Likewise.
    
    Rev: src/lsh.c:1.199
    Rev: src/lshd.c:1.166
    00f29f11
    History
    LSH - a GNU implementation of the Secure Shell protocols.
    
    
    COPYRIGHT
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation. See the file COPYING for details.
    
    
    INSTALLATION
    
    If you have downloaded a release, you should be able to compile it
    with
    
       ./configure
       make
       make install
    
    You need GNU make. Some shells have had bugs preventing them from
    executing the configure script; if you experience problems, try
    running
    
      bash configure
    
    If you want to hack lsh, you need some more tools: autoconf (at least
    version 2.52), automake (at least version 1.6.1), bash, gcc, gperf (at
    least version 2.7) and a scheme implementation. The currently
    supported schemes are guile and scsh (at least version 0.5.2). All but
    scsh can be found at your local GNU mirror site. scsh, Olin Shiver's
    Scheme Shell, can be downloaded from <URL: http://www.scsh.net>. If
    you use guile, you also need the slib library, which is usually
    distributed separately. It's also available at the GNU mirrors.
    Installing tcputils is optional, but it is needed to get the most out
    of the lsh testsuite. It can be found at
    ftp://ftp.lysator.liu.se/pub/unix/tcputils.
    
    If you have checked out lsh from CVS, things are a little more
    complicated. Run the ./.bootstrap script, which will run aclocal,
    autoconf, autoheader and automake for you. This creates the configure
    script and several Makefile.in. Now run ./configure, to create
    Makefile. Next run make bootstap. This will create various
    automatically generated files. Then you are ready to run make, to
    build the programs.
    
    
    NEEDED LIBRARIES
    
    GMP (version 3.1 or better) can be found at ftp.gnu.org, or some of
    its mirrors.
    
    ZLIB can be found at http://www.zlib.org. Latest version is
    zlib-1.1.4, earlier versions of zlib have a known security problem, so
    make sure you get version 1.1.4 or later.
    
    liboop (version 0.8 or better) can be found at www.liboop.org.
    
    
    GETTING STARTED
    
    After install, the first thing you need to do is creating a seed-file
    for the randomness generator. Use
    
      lsh-make-seed
    
    to create a personal seed file. If you want to run the lshd server,
    you also need to run
    
      lsh-make-seed --server
    
    as root.
    
    Some examples...
    
    Create a new DSS key pair, and save it in ~/.lsh/identity and
    ~/.lsh/identity.pub: 
    
      lsh-keygen -l 8 | lsh-writekey
    
    To create a key for the server, using the server's seed-file and
    storing the result as /etc/lsh_host_key and /etc/lsh_host_key.pub, run
    
      lsh-keygen -l 8 --server | lsh-writekey --server
    
    Start an lshd server in the background, on the default port, using the
    key at /etc/lsh_host_key, created above:
    
      lshd --daemonic
    
    Connect to an lshd server running on port 4711 on HOST, and attempt to
    log in as USER:
    
      lsh -p 4711 -l USER HOST
    
    
    MORE INFORMATION
    
    For more information on using LSH, read the LSH manual, doc/lsh.info
    or doc/lsh.html.
    
    For an introduction to the inner workings of LSH, see the file
    doc/HACKING.
    
    Several people have contributed to LSH, see the AUTHORS file for
    details.
    
    If you are interested in lsh, you may want to subscribe to the
    psst-list. Subscription address is psst-request@net.lut.ac.uk.
    
    LSH releases are available at
    <URL: http://www.lysator.liu.se/~nisse/archive/> and <URL:
    ftp://ftp.lysator.liu.se/pub/security/lsh>.
    
    Happy hacking,
    /Niels Möller <nisse@lysator.liu.se>