Skip to content
Snippets Groups Projects
Select Git revision
  • aa7ce0e2d839f94ead48df295f0cebf5d866adbb
  • master default
  • wip-add-ed25519
  • disable-sha1
  • lsh-2.0.4
  • experimental-20050201
  • lsh-1.4.2
  • lsh-1.2
  • lsh_2.1_release_20130626
  • converted-master-branch-to-git
  • nettle_2.4_release_20110903
  • nettle_2.3_release_20110902
  • nettle_2.2_release_20110711
  • nettle_2.1_release_20100725
  • camellia_32bit_20100720
  • nettle_2.0_release_20090608
  • converted-lsh-2.0.4-branch-to-git
  • lsh_2.0.4_release_20070905
  • lsh_2.9_exp_release_20070404
  • nettle_1.15_release_20061128
  • after_experimental_merge_20060516
  • branch_before_experimental_merge_20060516
  • converted-experimental-branch-to-git
  • head_before_experimental_merge_20060516
  • lsh_2.0.3_release_20060509
  • lsh_2.0.2_release_20060127
  • nettle_1.14_release_20051205
  • nettle_1.13_release_20051006
28 results

lsh

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Magnus Holmgren authored and Niels Möller committed
    aa7ce0e2
    History
    LSH - a GNU implementation of the Secure Shell protocols.
    
    
    COPYRIGHT
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation. See the file COPYING for details.
    
    
    INSTALLATION
    
    If you have downloaded a release, you should be able to compile it
    with
    
       ./configure
       make
       make install
    
    You need GNU make. Some shells have had bugs preventing them from
    executing the configure script; if you experience problems, try
    running
    
      bash configure
    
    If you want to hack lsh, you need some more tools:
    
     * autoconf (version 2.59 or later is recommended),
    
     * automake (version 1.8.2 or later),
    
     * bash,
    
     * gcc,
    
     * gperf (at least version 2.7)
    
     * a scheme implementation. The currently supported schemes are guile
       and scsh (at least version 0.6).
    
    All but scsh can be found at your local GNU mirror site. scsh,
    Olin Shiver's Scheme Shell, can be downloaded from <URL:
    http://www.scsh.net>. If you use guile, you also need the slib
    library, which is usually distributed separately. It's also available
    at the GNU mirrors.
    
    Optional programs that are needed to get the most out
    of the lsh testsuite:
    
     * tcputils, available at ftp://ftp.lysator.liu.se/pub/unix/tcputils.
    
     * tsocks (plus the supplied patch misc/tsocks-forcelocal.patch). It
       can be downloaded from http://tsocks.sourceforge.net/.
    
    If you have checked out lsh from git, things are a little more
    complicated. Run the ./.bootstrap script, which will run aclocal,
    autoconf, autoheader and automake for you. This creates the configure
    script and several Makefile.in. Now run ./configure, to create
    Makefile. Next run make bootstap. This will create various
    automatically generated files. Then you are ready to run make, to
    build the programs.
    
    
    NEEDED LIBRARIES
    
    GMP (version 3.1 or better) can be found at ftp.gnu.org, or some of
    its mirrors.
    
    ZLIB can be found at http://www.zlib.org. Older versions zlib have a
    known security problems, so make sure you get the latest one.
    
    liboop (version 0.8 or better) can be found at www.liboop.org.
    
    
    GETTING STARTED
    
    After install, the first thing you need to do is creating a seed-file
    for the randomness generator. Use
    
      lsh-make-seed
    
    to create a personal seed file. If you want to run the lshd server,
    you also need to run
    
      lsh-make-seed --server
    
    as root.
    
    Some examples...
    
    Create a new RSA key pair, and save it in ~/.lsh/identity and
    ~/.lsh/identity.pub: 
    
      lsh-keygen | lsh-writekey
    
    To create a key for the server, using the server's seed-file and
    storing the result as /etc/lsh_host_key and /etc/lsh_host_key.pub, run
    
      lsh-keygen --server | lsh-writekey --server
    
    Start an lshd server in the background, on the default port, using the
    key at /etc/lsh_host_key, created above:
    
      lshd --daemonic
    
    Connect to an lshd server running on port 4711 on HOST, and attempt to
    log in as USER:
    
      lsh -p 4711 -l USER HOST
    
    
    MORE INFORMATION
    
    For more information on using LSH, read the LSH manual, doc/lsh.info
    or doc/lsh.html.
    
    For an introduction to the inner workings of LSH, see the file
    doc/HACKING.
    
    Several people have contributed to LSH, see the AUTHORS file for
    details.
    
    If you are interested in lsh, you may want to subscribe to the
    psst-list. Subscription address is psst-request@net.lut.ac.uk.
    
    LSH releases are available at
    <http://www.lysator.liu.se/~nisse/archive/> and
    <ftp://ftp.lysator.liu.se/pub/security/lsh>.
    
    Happy hacking,
    /Niels Möller <nisse@lysator.liu.se>