News for the 1.1.3 release:

        Support for encrypted private keys (not tested).

        The lshg gateway client works.

To use encrypted private keys, use the -c 3des option to lsh-writekey.
The lsh client should ask you for your passphrase when needed.
Decryption of host keys is not currently supported (and I don't think
that is terribly useful).

The lshg client supports most features of the ordinary lsh client,
except for remote forwarding with -R. To use lshg, first start an lsh
client with

  lsh -G remote

or

  lsh -G -N remote

That will create a unix domain socket in a directory in /tmp.

You can start new sessions and local (-L) forwardings by connecting
with lshg instead of lsh:

  lshg remote

lshg will reuse the existing connection, so there's no need for key
exchange or user authentication. I expect lshg to be useful in many
(but not all) circumstances when you would otherwise have used
ssh-agent or fsh. For instance for remote CVS access.

This release is fairly untested. I think it has enough new features
over lsh-1.0.x that I think it's soon time for a feature freeze. So
please test it report the bugs you find.

There are two known problems:

  * Data is sometimes lost when using lsh with cvs diff.
  * Building in a separate directory doesn't quite work.

   http://www.lysator.liu.se/~nisse/archive/lsh-1.1.3.tar.gz
   ftp://ftp.lysator.liu.se/pub/security/lsh/lsh/1.1.3.tar.gz

Best regards,
/Niels

Reply via email to