Troubleshooting Commands : slogin

slogin
Description
Use the slogin command to securely log into another system using Secure Shell (SSH).
Syntax
slogin <slogin options> [user@] <hostname> [command]
Arguments
 
-a: Disables forwarding of the authentication agent connection.
-A: Enables forwarding of the authentication agent connection. This can also be specified on a per-host basis in a configuration file. Agent forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the agent’s Unix-domain socket) can access the local agent through the forwarded connection. An attacker cannot obtain key material from the agent, however they can perform operations on the keys that enable them to authenticate using the identities loaded into the agent.
-b bind_address: Specify the interface to transmit from on machines with multiple interfaces or aliased addresses.
-c cipher_spec: Additionally, for protocol version 2 a comma-separated list of ciphers can be specified in order of preference.
-e ch | ^ch | none: Sets the escape character for sessions with a pty (default: ~). The escape character is only recognized at the beginning of a line. The escape character followed by a dot (.) closes the connection, followed by control-Z suspends the connection, and followed by itself sends the escape character once. Setting the character to none fully transparent.
-f: Requests ssh to go to background just before command execution. This is useful if ssh is going to ask for passwords or passphrases, but the user wants it in the background. This implies -n. The recommended way to start X11 programs at a remote site is with something like ssh -f host xterm.
-g: Allows remote hosts to connect to local forwarded ports.
-k: Disables forwarding of Kerberos tickets and AFS tokens. This may also be specified on a per-host basis in the configuration file.
-l login_name: Specifies the user to log in as on the remote machine. This also may be specified on a per-host basis in the configuration file.
-m mac_spec: Additionally, for protocol version 2 a comma-separated list of MAC (message authentication code) algorithms can be specified in order of preference.
-n: Redirects stdin from /dev/null (actually, prevents reading from stdin). This must be used when ssh is run in the background. A common trick is to use this to run X11 programs on a remote machine. For example, ssh -n shadows.cs.hut.fi emacs and will start an emacs on shadows.cs.hut.fi, and the X11 connection will be automatically forwarded over an encrypted channel. The ssh program will be put in the background. (This does not work if ssh needs to ask for a password or passphrase; see also the -f option.)
-N: Do not execute a remote command. This is useful for just forwarding ports (protocol version 2 only).
-o option: Can be used to give options in the format used in the configuration file. This is useful for specifying options for which there is no separate command-line flag.
-p port: Port to connect to on the remote host. This can be specified on a per-host basis in the configuration file.
-q: Quiet mode. Causes all warning and diagnostic messages to be suppressed.
-s: May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use of SSH as a secure transport for other applications (for example, sftp). The subsystem is specified as the remote command.
-t: Force pseudo-tty allocation. This can be used to execute arbitrary screen-based programs on a remote machine, which can be very useful, for example, when implementing menu services. Multiple -t options force tty allocation, even if ssh has no local tty.
-T: Disable pseudo-tty allocation.
-v: Verbose mode. Causes ssh to print debugging messages about its progress. This is helpful in debugging connection, authentication, and configuration problems. Multiple -v options increases the verbosity. Maximum is 3.
-V: Display the version number and exit.
-x: Disables X11 forwarding.
-X: Enables X11 forwarding. This can also be specified on a per-host basis in a configuration file. X11 forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the user’s X authorization database) can access the local X11 display through the forwarded connection. An attacker may then be able to perform activities such as keystroke monitoring.
-Y: Enables trusted X11 forwarding. Trusted X11 forwardings are not subjected to the X11 SECURITY extension controls.
-C: Requests compression of all data (including stdin, stdout, stderr, and data for forwarded X11 and TCP/IP connections). The compression algorithm is the same used by gzip(1), and the level CompressionLevel option for protocol version 1. Compression is desirable on modem lines and other slow connections, but will only slow down things on fast networks. The default value can be set on a host-by-host basis in the configuration files.
-F configfile: Specifies an alternative per-user configuration file. If a configuration file is given on the command line, the system-wide configuration file (/etc/ssh/ssh_config) will be ignored. The default for the per-user configuration file is $HOME/.ssh/config.
-L port:host:hostport: Specifies that the given port on the local (client) host is to be forwarded to the given host and port on the remote side. This works by allocating a socket to listen to port on the local side, and whenever a connection is made to this port, the connection is forwarded over the secure channel, and a connection is made to host port hostport from the remote machine. Port forwardings can also be specified in the configuration file. Only root can forward privileged ports. IPv6 addresses can be specified with an alternative syntax: port/host/hostport
-R port:host:hostport: Specifies that the given port on the remote (server) host is to be forwarded to the given host and port on the local side. This works by allocating a socket to listen to port on the remote side, and whenever a connection is made to this port, the connection is forwarded over the secure channel, and a connection is made to host port hostport from the local machine. Port forwardings can also be specified in the configuration file. Privileged ports can be forwarded only when logging in as root on the remote machine. IPv6 addresses can be specified with an alternative syntax: port/host/hostport
-D port: Specifies a local dynamic This works by allocating a socket to listen to port on the local side, and whenever a connection is made to this port, the connection is forwarded over the secure channel, and the application protocol is then used to determine where to connect to from the remote machine. Currently the SOCKS4 protocol is supported, and ssh will act as a SOCKS4 server. Only root can forward privileged ports. Dynamic port forwardings can also be specified in the configuration file.
-1: Forces ssh to try protocol version 1 only.
-2: Forces ssh to try protocol version 2 only.
-4: Forces ssh to use IPv4 addresses only.
-6: Forces ssh to use IPv6 addresses only.
Defaults
None.
Command Mode
User EXEC Mode
Privileged EXEC Mode
Global Configuration Mode
See Also
None.
Usage Guidelines
None.
Examples
None.

Please send comments or suggestions regarding user documentation to techpubs@silver-peak.com.