News for the 1.1.1 release: First try for the gateway mode. New option -G for lsh, and a new program lshg for talking to the gateway. lshd forks of a new process and changes its uid for reading user files. The only file read in this way, so far, is ~/.lsh/srp-verifier. Improved randomness framework. The gateway mode doesn't do anything really interesting yet, but you can try $ lsh -G some-host to set up a gateway located under /tmp/x-lsh-user/some-host:user. Next, in a different window, try $ lshg -D foo some-host That will connect to the gateway, send a debug message containing the string "foo". The local lsh process picks up that, and passes it on to the remote server. You will see a "Received debug: foo" in the server's log. The plan is that lshg should support most actions supported by lsh. Next targets are -S (shell), -E (execute), -L (forward local port). Reverse forwarding with -R will be a little trickier. Currently, the lshg binary is quite big, about 2/3 of the size of lsh. For some reason most crypto code is linked into it. I'll try to find out why and get rid of that, the communication with the gateway is unencrypted, so lshg ought to be quite small. http://www.lysator.liu.se/~nisse/archive/lsh-1.1.1.tar.gz ftp://ftp.lysator.liu.se/pub/security/lsh/lsh-1.1.1.tar.gz Happy hacking, /Niels