ISO8859-1J 0E {* 2 L @ l6 % 0 1; Qm $ <%!;G/+099JEB= FKBBFI_@"1 @?!("(#$%N&<]' ()* +-,?- Y.*z/ 081K2<K384<58677S8No9=:&;#< 8=3B><v?@%A.B8(C)aD E3F8G&H)IDJ YK3cL>M6N( O66P,mQ5RS:T-!U4OV#W&X&Y5Z/,[1\\5]6^._G*`8ra3bIc? )d& ieB f0 g1!h(!6i?!_j3!k5!l" m="!n<"_o*"p0"q"r#s#.t#Eu##Tv#xw(#xs#y3$,z7$`{ $|$}$~$$%% %2)%@%j%r(%%%%%&&&:&S!&q&&:&''-'4'b!' ' '6''( ((1+(B(n(('((&())!)='))#**4*O*`*}***+*.*+) += +I+U+g+|+"++"++%, ",2*,U,, ,-,&,- u-".0h0w00 0t0@8U?8C8J9C9e59,9>: 2:K5:~<:?:9;16;k*;?;(< (<61<_6<1<2<0=-?=^4=/=> >!1>+->])>&>;>??6?T?X?[?w? ?????@@@+'@A@i<@@@%@AA' AB AW Al "A AA*AGBBL$Bf*BB?BYC_Cb&CCDD,D(DUDi<D~ 4D!YD"#EJ#/En$?E%9E&PF'*Fi(2F)NF*#G+G:,$GP-3Gu.G//G02G1'H$2CHL3$H4OH5"I6I(7 I?8IK9IZ: Ix; I<#I=3I>/I?J@J2A(JGB(JpCFJD-JEKFK+G#KFHKjIKJ,KKKLKMLNLO)L2PL\QLxR%LSLT!LULV LW MXMY&M0Z/MW[M\&M]M^M_M` N aNbN+cNAdNWeNufNgNhNiNjENkO4l^OmP$nR o Rp!Rq$Rr:Ss S>t!SKu0SmvSwSxSy*SzT {T)|:TH};T~*T9T.U$'US3U{usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-R [bind_address:]port:host:hostport] [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] [user@]hostname [command] -X Enable X11 connection forwarding. -x Disable X11 connection forwarding. -i file Identity for public key authentication (default: ~/.ssh/identity). -I reader Set smartcard reader. -t Tty; allocate a tty even if command is given. -T Do not allocate a tty. -v Verbose; display verbose debugging messages. Multiple -v increases verbosity. -V Display version number only. -P Don't allocate a privileged port. -q Quiet; don't display any warning messages. -f Fork into background after authentication. -e char Set escape character; ``none'' = disable (default: ~). -c cipher Select encryption algorithm: ``3des'', ``blowfish'' -m macs Specify MAC algorithms for protocol version 2. -p port Connect to this port. Server must be on the same port. -L listen-port:host:port Forward local port to remote address -R listen-port:host:port Forward remote port to local address These cause %s to listen for connections on a port, and forward them to the other side by connecting to host:port. -D port Enable dynamic application-level port forwarding. -C Enable compression. -N Do not execute a shell or command. -g Allow remote hosts to connect to forwarded ports. -1 Force protocol version 1. -2 Force protocol version 2. -4 Use IPv4 only. -6 Use IPv6 only. -o 'option' Process the option as if it was read from a configuration file. -s Invoke command (mandatory) as SSH2 subsystem. -b addr Local IP address. sshd version %s Usage: %s [options] Options: -f file Configuration file (default %s) -d Debugging mode (multiple -d means more debugging) -i Started from inetd -D Do not fork into daemon mode -q Quiet (no logging) -p port Listen on the specified port (default: 22) -k seconds Regenerate server key every this many seconds (default: 3600) -g seconds Grace period for authentication (default: 600) -b bits Size of server RSA key (default: 768 bits) -h file File from which to read host key (default: %s) -u len Maximum hostname length for utmp recording -4 Use IPv4 only -6 Use IPv6 only usage: %s [-1246Cpqrv] [-B buffer_size] [-b batchfile] [-c cipher] -D sftp_server_path] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-R num_requests] [-S program] [-s subsystem | sftp_server] host %s [user@]host[:file ...] %s [user@]host[:dir[/]] %s -b batchfile [user@]host [-F config] [-P direct server path] [-S program] [user@]host[:file [file]] Usage: %s [options] Options: -l List fingerprints of all identities. -L List public key parameters of all identities. -d Delete identity. -D Delete all identities. -s pkcs11 Add keys from PKCS#11 provider. -e pkcs11 Remove keys provided by PKCS#11 provider. Usage: %s [options] [command [args ...]] Options: -c Generate C-shell commands on stdout. -s Generate Bourne shell commands on stdout. -k Kill the current agent. -d Debug mode. Usage: %s [options] Options: -b bits Number of bits in the key to create. -c Change comment in private and public key files. -e Convert OpenSSH to IETF SECSH key file. -f filename Filename of the key file. -i Convert IETF SECSH to OpenSSH key file. -l Show fingerprint of key file. -p Change passphrase of private key file. -q Quiet. -y Read private key file and print public key. -t type Specify type of key to create. -B Show bubblebabble digest of key file. -C comment Provide new comment. -N phrase Provide new passphrase. -P phrase Provide old passphrase. -D pkcs11 Download public key from pkcs11 token. -U reader Upload private key to smartcard. -F hostname Find hostname in known hosts file. -G file Generate candidates for DH-GEX moduli. -g Use generic DNS resource record format. -H Hash names in known_hosts file. -h Generate host certificate instead of a user certificate. -I key_id Key identifier to include in certificate. -L Print the contents of a certificate. -M memory Amount of memory (MB) to use for generating DH-GEX moduli. -m key_fmt Conversion format for -e/-i (PEM|PKCS8|RFC4716). -N phrase Provide new passphrase. -n name,... User/host principal names to include in certificate -O cnstr Specify a certificate constraint. -R hostname Remove host from known_hosts file. -s ca_key Certify keys with CA key. -S start Start point (hex) for generating DH- GEX moduli. -T file Screen candidates for DH-GEX moduli. -V from:to Specify certificate validity interval. -v Verbose. -W gen Generator to use for generating DH-GEX moduli. -a trials Number of trials for screening DH-GEX moduli. Warning: Identity file %s does not exist. %s, SSH protocols %d.%d/%d.%d, OpenSSL 0x%8.8lx Bad escape character '%s'. Unknown cipher type '%s' Unknown mac type '%s' Bad port '%s' Bad forwarding specification '%s'. Bad dynamic port '%s' You must specify a subsystem to invoke. usage: scp [-pqrvBC46] [-S ssh] [-P port] [-c cipher] [-i identity] f1 f2 or: scp [options] f1 ... fn directory Executing: program %s host %s, user %s, command %s Executing: 2nd program %s host %s, user %s, command %s Executing: Sending file timestamps: %sSending file modes: %sEntering directory: %s%s: invalid user name lost connection Bad line in %.100s: %.200s Environment: Could not chdir to home directory %s: %s RunningCould not run %s Running %.100s add %.100s %.100s %.100s Adding %.*s/unix%s %s %s Missing username Missing hostname Connecting to %s... Identity removed: %s (%s) Could not remove identity: %s All identities removed. Enter passphrase for %.200s: Failed to remove all identities. Identity added: %s (%s) Could not add identity: %s Could not open a connection to your authentication agent. No user found with uid %u ssh-agent version %s Usage: %s [-c | -s] [-k] [command {args...]] %s not set, cannot kill agent %s="%s", which is not a good PID bad key typeload failed Comment: "%d-bit %s, converted from OpenSSH by %s@%s" input line too long. uudecode failed. decode blob failed. key write failedComments are only supported for RSA1 keys. write key failedfdopen %s failedunknown key type %s Generating public/private %s key pair. key_generate failedYour public key has been saved in %s. The key fingerprint is: Please type 'yes' or 'no'. The authenticity of host '%.200s (%s)' can't be established. %s key fingerprint is %s. Are you sure you want to continue connecting (yes/no)? Enter passphrase for RSA key '%.100s': %.30s@%.128s's password: Enter passphrase for key '%.100s': Too high debugging level. too many ports. too many host certificates. Bad port number. too many host keys. Extra argument %s. Bad server key size. Unrecognized internal syslog level code %d Unrecognized internal syslog facility code %d packet_send plain: encrypted: plain: read_poll plain: read_poll enc/full: read/plain[%d]: realpath %s failed: %sbad ownership or modes for file %sdirname() failedbad ownership or modes for file %sbad-auth-msg-%dThe following connections are open: X11 connection from %.200s port %d%s: listening port %d for %.100s port %d, connect from %.200s port %dsizeof strportselect: %s Connection to %.300s closed by remote host. Read from remote host %.300s: %.100s %c^Z [suspend ssh] %c? Supported escape sequences: ~. - terminate connection ~R - Request rekey (SSH protocol 2 only) ~^Z - suspend ssh ~# - list forwarded connections ~& - background ssh (when waiting for connections to terminate) ~? - this message ~~ - send the escape character by typing it twice (Note that escapes are only recognized immediately after newline.) %c? Supported escape sequences: ~.terminate connection (and any multiplexed sessions) ~B - send a BREAK to the remote system ~C - open a command line ~R - Request rekey (SSH protocol 2 only) ~^Z - suspend ssh ~# - list forwarded connections ~& - background ssh (when waiting for connections to terminate) ~? - this message ~~ - send the escape character by typing it twice (Note that escapes are only recognized immediately after newline.) read: %.100s write stdout: %.50s Connection to %.64s closed. %s request failed %s request failed on channel %d Available commands: bye Quit sftp cd path Change remote directory to 'path' chgrp grp path Change group of file 'path' to 'grp' chmod mode path Change permissions of file 'path' to 'mode' chown own path Change owner of file 'path' to 'own' df [-hi] [path] Display statistics for current directory or filesystem containing 'path' exit Quit sftp get [-Ppr] remote [local] Download file help Display this help text lcd path Change local directory to 'path' lls [ls-options [path]] Display local directory listing lmkdir path Create local directory ln [-s] oldpath newpath Link remote file (-s for symlink) lpwd Print local working directory ls [-1afhlnrSt] [path] Display remote directory listing lumask umask Set local umask to 'umask' mkdir path Create remote directory progress Toggle display of progress meter put [-Ppr] local [remote] Upload file pwd Display remote working directory quit Quit sftp rename oldpath newpath Rename remote file rm path Delete remote file rmdir path Remove remote directory symlink oldpath newpath Symlink remote file version Show SFTP version !command Execute 'command' in local shell ! Escape to local shell ? Synonym for help cd path Change remote directory to 'path' lcd path Change local directory to 'path' chgrp grp path Change group of file 'path' to 'grp' chmod mode path Change permissions of file 'path' to 'mode' chown own path Change owner of file 'path' to 'own' help Display this help text get remote-path [local-path] Download file lls [ls-options [path]] Display local directory listing ln oldpath newpath Symlink remote file lmkdir path Create local directory lpwd Print local working directory ls [path] Display remote directory listing lumask umask Set local umask to 'umask' mkdir path Create remote directory put local-path [remote-path] Upload file pwd Display remote working directory exit Quit sftp quit Quit sftp rename oldpath newpath Rename remote file rmdir path Remove remote directory rm path Delete remote file symlink oldpath newpath Symlink remote file version Show SFTP version !command Execute 'command' in local shell ! Escape to local shell ? Synonym for help Usage: %s [options] host ... Options: -f file Read hosts or addresses from file. -p port Connect to the specified port. -t keytype Specify the host key type. -T timeout Set connection timeout. -v Verbose; display verbose debugging messages. -4 Use IPv4 only. -6 Use IPv6 only. yesnoPlease type 'yes' or 'no': Attaching to %s... Bad key file %s Card %s: %s Could not %s card: %s key_write failedThe agent has no identities. Passwords do not match. Invalid lifetime Bad passphrase. Key has comment '%s' Pass phrases do not match. Try again. Saving the key failed: %s. Your identification has been saved with the new passphrase. Key now has comment '%s' Enter new comment: Could not save your public key in %s fdopen %s failedYou don't exist, go away! Bits has bad value. Too many arguments. Can only have one of -p and -c. You must specify a key type (-t). %s already exists. Overwrite (yes/no)? Your identification has been saved in %s. These cause ssh to listen for connections on a port, and %s: illegal option -- %c no address associated with hostname.%.200s line %d: unsupported log level '%s'Connection closed%s host key for IP address '%.128s' not in list of known hosts.Failed to add the %s host key for IP address '%.128s' to the list of known hosts (%.30s).Warning: Permanently added the %s host key for IP address '%. 128s' to the list of known hosts.%s: option requires an argument -- %c memory allocation failure.unknown error.%c& [backgrounded] progress Toggle display of progress meter -x Lock agent. -X Unlock agent. -t life Set lifetime (in seconds) when adding identities. -c Require confirmation to sign using identities usage: %s [-v46] [-p port] [-T timeout] [-f file] [host | addrlist namelist] [...] Usage: %s [options] host [command] -n Redirect input from _PATH_DEVNULL. -a Disable authentication agent forwarding (default). -x Disable X11 connection forwarding (default). -i file Identity for public key authentication (default: ~/.ssh/identity) -c cipher Select encryption algorithm -t Only test configuration file and keys -o option Process the option as if it was read from a configuration file. Invalid test mode specification %s Invalid utmp length. WARNING: Your password has expired. You must change your password now and login again! Permission denied (%s). -a socket Bind agent socket to given name. -t life Default identity lifetime (second). ssh: connect to host %s port %s: %.100sWARNING: %s key found for host %s in %s:%d %s key fingerprint %s.Permission denied, please try again. [-F config] [-P direct server path] [-R num_requests] [-S program] %s, SSH protocols %d.%d/%d.%d, %s Bad line %u in %.100s Running %s Running %s %s Running %.500s remove %.100s remove %s add %s %s %s You must change your password now. Your password has expired, you must change it now. Password change required but no TTY available. no support for PKCS#11. Bad tun device '%s' Bad stdio forwarding specification '%s' Bad local forwarding specification '%s' Pseudo-terminal will not be allocated because stdin is not a terminal.Allocated port %u for remote forward to %s:%dBad forwarding port(s) '%s' Invalid login grace time. Invalid key regeneration interval. Enter passphrase for %.200s: Lifetime set to %d seconds The user has to confirm each use of the key Identity added: %s (%s) The agent has no identities. Agent %slocked. Failed to %slock agent. Allow use of key %s? Key fingerprint %s.echo Agent pid %ld killed; echo Agent pid %ld; Impossible! dispatch_run() returned! Bad timeout '%s' version 1 keys are not supported key_to_blob failed ignore: %sescaped: %s%s is not a public key file. failed to read v2 public key from %s. The comment in your key file has been changed. Created directory '%s'. Passphrases do not match. Try again. Couldn't execute "%s": %s Fetching %s to %s Uploading %s to %s Removing %s Changing mode on %s Changing owner on %s Changing group on %s Remote working directory: %s Local working directory: %s SFTP protocol version %u Progress meter enabled Progress meter disabled Changing to: %s %s: listening port %d for %.100s port %d, connect from %.200s port %dThe authenticity of host '%.200s (%s)' can't be established%s %s key fingerprint is %s. Are you sure you want to continue connecting (yes/no)?Warning: Permanently added the %s host key for IP address '%.128s' to the list of known hosts.usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-R [bind_address:]port:host:hostport] [-S ctl_path] [-w local_tun[:remote_tun]] [user@]hostname [command] usage: sshd [-46Ddeiqt] [-b bits] [-f config_file] [-g login_grace_time] [-h host_key_file] [-k key_gen_time] [-o option] [-p port] [-u len] load failed version 1 keys are not supported %s is not a valid known_hosts file. Not replacing existing known_hosts file because of errors %s updated. Original contents retained as %s Delete this file to ensure privacy of hostnames unknown key type %s key bits exceeds maximum %d Invalid lifetime The user must confirm each use of the key Certificate added: %s (%s) Certificate %s (%s) add failedCould not open a connection to your authentication agent. Failed to add the host to the list of known hosts (%.500s).Agent forwarding disabled for protocol 1.3 -A Generate non-existent host keys for all key types. -K checkpt Write checkpoints to this file. -z serial Specify a serial number. -k Load only keys and not certificates.