1dbclient(1)                 General Commands Manual                dbclient(1)
2
3
4

NAME

6       dbclient - lightweight SSH client
7

SYNOPSIS

9       dbclient  [flag  arguments] [-p port] [-i id] [-L l:h:p] [-R l:h:p] [-l
10       user] host [more flags] [command]
11
12       dbclient [args] [user1]@host1[^port1],[user2]@host2[^port2],...
13
14

DESCRIPTION

16       dbclient is the client part of Dropbear SSH
17

OPTIONS

19       command
20              A command to run on the remote host. This will normally  be  run
21              by the remote host using the user's shell. The command begins at
22              the first hyphen argument after the host argument. If no command
23              is  specified an interactive terminal will be opened (see -t and
24              -T).
25
26       -p port
27              Connect to port on the remote host. Alternatively a port can  be
28              specified as hostname^port.  Default is 22.
29
30       -i idfile
31              Identity file.  Read the identity key from file idfile (multiple
32              allowed). This file is created with dropbearkey(1) or  converted
33              from   OpenSSH   with   dropbearconvert(1).   The  default  path
34              ~/.ssh/id_dropbear is used
35
36       -L [listenaddress]:listenport:host:port
37              Local port forwarding.  Forward listenport  on  the  local  host
38              through the SSH connection to port on host.
39
40       -R [listenaddress]:listenport:host:port
41              Remote  port  forwarding.  Forward listenport on the remote host
42              through the SSH connection to port on host.
43
44       -l user
45              Username.  Login as user on the remote host. An  alternative  is
46              to specify user@host.
47
48       -t     Allocate a PTY. This is the default when no command is given, it
49              gives a full interactive remote session. The main effect is that
50              keystrokes  are  sent  remotely  immediately as opposed to local
51              line-based editing.
52
53       -T     Don't allocate a PTY. This is the  default  when  a  command  is
54              given. See -t.
55
56       -N     Don't  request  a  remote shell or run any commands. Any command
57              arguments are ignored.
58
59       -f     Fork into the background after authentication. A  command  argu‐
60              ment  (or  -N)  is required.  This is useful when using password
61              authentication.
62
63       -g     Allow non-local hosts to connect to forwarded ports. Applies  to
64              -L  and -R forwarded ports, though remote connections to -R for‐
65              warded ports may be limited by the ssh server.
66
67       -y     Always accept hostkeys if they are unknown. If  a  hostkey  mis‐
68              match occurs the connection will abort as normal. If specified a
69              second time no host key checking is performed at  all,  this  is
70              usually undesirable.
71
72       -A     Forward  agent connections to the remote host. dbclient will use
73              any OpenSSH-style agent  program  if  available  ($SSH_AUTH_SOCK
74              will  be set) for public key authentication.  Forwarding is only
75              enabled if -A is specified.
76
77       -W windowsize
78              Specify the per-channel receive window buffer  size.  Increasing
79              this  may  improve  network performance at the expense of memory
80              use. Use -h to see the default buffer size.
81
82       -K timeout_seconds
83              Ensure that traffic is transmitted at a certain interval in sec‐
84              onds.  This  is  useful  for working around firewalls or routers
85              that drop connections after a certain period of inactivity.  The
86              trade-off  is  that a session may be closed if there is a tempo‐
87              rary lapse of network connectivity.  A  setting  if  0  disables
88              keepalives.  If  no  response  is  received  for  3  consecutive
89              keepalives the connection will be closed.
90
91       -I idle_timeout
92              Disconnect the session if no traffic is transmitted or  received
93              for idle_timeout seconds.
94
95
96       -J proxy_command
97
98       -J &fd
99              Use  the  standard  input/output  of  the  program proxy_command
100              rather than using a normal TCP connection. A hostname should  be
101              still be provided, as this is used for comparing saved hostkeys.
102              This command will be executed as "exec proxy_command  ..."  with
103              the default shell.
104
105              The  second form &fd will make dbclient use the numeric file de‐
106              scriptor as a socket. This can be used  for  more  complex  tun‐
107              nelling scenarios. Example usage with socat is
108
109              socat EXEC:'dbclient -J &38 ev',fdin=38,fdout=38 TCP4:host.exam‐
110              ple.com:22
111
112
113       -B endhost:endport
114              "Netcat-alike" mode, where Dropbear will connect  to  the  given
115              host,  then  create a forwarded connection to endhost. This will
116              then be presented as dbclient's standard input/output.
117
118       -c cipherlist
119              Specify a comma separated list of ciphers to enable. Use -c help
120              to list possibilities.
121
122       -m MAClist
123              Specify a comma separated list of authentication MACs to enable.
124              Use -m help to list possibilities.
125
126       -o option
127              Can be used to give options in the format used by OpenSSH config
128              file.  This  is useful for specifying options for which there is
129              no separate command-line flag.  For full details of the  options
130              listed below, and their possible values, see ssh_config(5).  The
131              following options have currently been implemented:
132
133
134              ExitOnForwardFailure
135                     Specifies whether dbclient should terminate  the  connec‐
136                     tion  if  it cannot set up all requested local and remote
137                     port forwardings. The argument must  be  "yes"  or  "no".
138                     The default is "no".
139
140              UseSyslog
141                     Send  dbclient  log  messages  to  syslog  in addition to
142                     stderr.
143
144              Port   Specify a listening port, like the -p argument.
145
146       -s     The specified command will be requested as a subsystem, used for
147              sftp.  Dropbear  doesn't  implement  sftp itself but the OpenSSH
148              sftp client can be used eg sftp -S dbclient user@host
149
150       -b [address][:port]
151              Bind to a specific local address when connecting to  the  remote
152              host.  This  can be used to choose from multiple outgoing inter‐
153              faces. Either address or port (or both) can be given.
154
155       -V     Print the version
156
157

MULTI-HOP

159       Dropbear will also allow multiple "hops" to be specified, separated  by
160       commas.  In this case a connection will be made to the first host, then
161       a TCP forwarded connection will be made  through  that  to  the  second
162       host,  and  so  on. Hosts other than the final destination will not see
163       anything other than the encrypted SSH stream.  A port for a host can be
164       specified with a caret (eg matt@martello^44 ).  This syntax can also be
165       used with scp or rsync (specifying dbclient as the ssh/rsh command).  A
166       file can be "bounced" through multiple SSH hops, eg
167
168       scp -S dbclient matt@martello,root@wrt,canyons:/tmp/dump .
169
170       Note  that  hostnames are resolved by the prior hop (so "canyons" would
171       be resolved by the host "wrt") in the example above, the  same  way  as
172       other  -L  TCP forwarded hosts are. Host keys are checked locally based
173       on the given hostname.
174
175

ESCAPE CHARACTERS

177       Typing a newline followed by the  key sequence  ~.  (tilde,  dot)  will
178       terminate  a  connection.   The sequence ~^Z (tilde, ctrl-z) will back‐
179       ground the connection. This behaviour only applies when a PTY is used.
180
181

ENVIRONMENT

183       DROPBEAR_PASSWORD
184              A password to use for remote authentication can be specified  in
185              the environment variable DROPBEAR_PASSWORD. Care should be taken
186              that the password is not exposed to other users on a  multi-user
187              system, or stored in accessible files.
188
189       SSH_ASKPASS
190              dbclient  can use an external program to request a password from
191              a user.  SSH_ASKPASS should be set to the path of a program that
192              will  return  a  password  on standard output. This program will
193              only be used if either DISPLAY is set and standard input is  not
194              a TTY, or the environment variable SSH_ASKPASS_ALWAYS is set.
195

NOTES

197       If  compiled  with zlib support and if the server supports it, dbclient
198       will always use compression.
199
200

AUTHOR

202       Matt Johnston (matt@ucc.asn.au).
203       Mihnea Stoenescu wrote initial Dropbear client support
204       Gerrit Pape (pape@smarden.org) wrote this manual page.
205

SEE ALSO

207       dropbear(8), dropbearkey(1)
208
209       https://matt.ucc.asn.au/dropbear/dropbear.html
210
211
212
213                                                                   dbclient(1)
Impressum