Difference between revisions of "Ssh -t"
Jump to navigation
Jump to search
(3 intermediate revisions by one other user not shown) | |||
Line 8: | Line 8: | ||
* <code>[[-tt]]</code> | * <code>[[-tt]]</code> | ||
+ | |||
+ | |||
+ | -t Force [[pseudo-tty]] allocation. This can be used to execute arbitrary screen-based programs on a remote machine, which can be very useful, e.g. when implementing menu services. Multiple -t options force tty allocation, even if ssh has no local tty. | ||
== Relate terms == | == Relate terms == | ||
+ | * <code>[[RequestTTY]]</code> | ||
* <code>[[tty]]</code> | * <code>[[tty]]</code> | ||
* <code>[[ssh -T]]</code> | * <code>[[ssh -T]]</code> | ||
− | + | * <code>[[ssh --login -i]]</code> | |
== See also == | == See also == |
Latest revision as of 12:22, 14 March 2023
ssh -t your_remote_hostname uptime
ssh -t your_remote_hostname /bin/sh
-t Force pseudo-tty allocation. This can be used to execute arbitrary screen-based programs on a remote machine, which can be very useful, e.g. when implementing menu services. Multiple -t options force tty allocation, even if ssh has no local tty.
Relate terms[edit]
See also[edit]
- OpenSSH:
ssh
,ssh -O
,-i, -t
,-T, -N, -V
,/etc/ssh/ssh_config
,ssh --help
- SSH:
ssh
, TLS,.ppk, .pem, .crt, .pub
, ED25519, Key exchange method (KEX), public key, private key,ssh -Q kex
,IAMUserSSHKeys
,known_hosts
, ssh tunnel, Dropbear
Advertising: