News for the 1.1.1 release:

        First try for the gateway mode. New option -G for lsh, and a
        new program lshg for talking to the gateway.

        lshd forks of a new process and changes its uid for reading
        user files. The only file read in this way, so far, is
        ~/.lsh/srp-verifier.

        Improved randomness framework.

The gateway mode doesn't do anything really interesting yet, but you
can try

  $ lsh -G some-host

to set up a gateway located under /tmp/x-lsh-user/some-host:user.
Next, in a different window, try

  $ lshg -D foo some-host

That will connect to the gateway, send a debug message containing the
string "foo". The local lsh process picks up that, and passes it on to
the remote server. You will see a "Received debug: foo" in the
server's log.

The plan is that lshg should support most actions supported by lsh.
Next targets are -S (shell), -E (execute), -L (forward local port).
Reverse forwarding with -R will be a little trickier.

Currently, the lshg binary is quite big, about 2/3 of the size of lsh.
For some reason most crypto code is linked into it. I'll try to find
out why and get rid of that, the communication with the gateway is
unencrypted, so lshg ought to be quite small.

  http://www.lysator.liu.se/~nisse/archive/lsh-1.1.1.tar.gz
  ftp://ftp.lysator.liu.se/pub/security/lsh/lsh-1.1.1.tar.gz

Happy hacking,
/Niels

Reply via email to