1
.TH CONCH "1" "October 2002" "" ""
3
tkconch \- connect to SSH servers graphically
5
.B conch [-l \fIuser\fR] [-i \fIidentity\fR [ -i \fIidentity\fR ... ]] [-c \fIcipher\fR] [-m \fIMAC\fR] [-p \fIport\fR] [-n] [-t] [-T] [-V] [-C] [-N] [-s] [arg [...]]
10
The \fB\--help\fR prints out a usage message to standard output.
12
\fB-l\fR, \fB--user\fR <user>
13
Log in using this user name.
15
\fB-e\fR, \fB--escape\fR <escape character>
16
Set escape character; 'none' = disable (default: ~)
18
\fB-i\fR, \fB--identity\fR <identity>
19
Add an identity file for public key authentication (default: ~/.ssh/identity)
21
\fB-c\fR, \fB--cipher\fR <cipher>
22
Cipher algorithm to use.
24
\fB-m\fR, \fB--macs\fR <mac>
25
Specify MAC algorithms for protocol version 2.
27
\fB-p\fR, \fB--port\fR <port>
30
\fB-L\fR, \fB--localforward\fR <listen-port:host:port>
31
Forward local port to remote address.
33
\fB-R\fR, \fB--remoteforward\fR <listen-port:host:port>
34
Forward remote port to local address.
37
Allocate a tty even if command is given.
39
\fB-n\fR, \fB--notty\fR
40
Do not allocate a tty.
42
\fB-V\fR, \fB--version\fR
43
Display version number only.
45
\fB-C\fR, \fB--compress\fR
48
\fB-a\fR, \fB--ansilog\fR
49
Print the received data to stdout.
51
\fB-N\fR, \fB--noshell\fR
52
Do not execute a shell or command.
54
\fB-s\fR, \fB--subsystem\fR
55
Invoke command (mandatory) as SSH2 subsystem.
58
Print the receieved data to stderr.
60
Open an SSH connection to specified server, and either run the command
61
given there or open a remote interactive shell.
63
Written by Moshe Zadka, based on conch's help messages
65
To report a bug, visit \fIhttp://twistedmatrix.com/bugs/\fR
67
Copyright \(co 2002-2008 Twisted Matrix Laboratories.
69
This is free software; see the source for copying conditions. There is NO
70
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.