Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
        ssh-socks-proxy >>
        ssh-socks-proxy-config >>
        ssh-socks-proxy-ctl >>
        ssh-certview >>
        ssh-cmpclient >>
        ssh-keydist2 >>
        ssh-scepclient >>
    Log Messages >>


SSH-DUMMY-SHELL(1)             SSH2            SSH-DUMMY-SHELL(1)

       ssh-dummy-shell - Ultimately restricted shell

       ssh-dummy-shell [-c sftp-shell]

       ssh-dummy-shell is used to provide access to systems where
       only file transfer functionality is permitted.  Users with
       file-transfer-only  access  can  have  ssh-dummy-shell  as
       their user shell.  When executed without  any  parameters,
       the  program waits for the user to press any key and exit.
       The only way to execute programs with  ssh-dummy-shell  is
       to  give  them  as  command-line  parameters  with  the -c
       option.  Even then, sftp-server is the only  allowed  com-

       -c command
            The  parameter  is executed as a shell command.  Only
            the sftp-server command is allowed.  Any  other  com-
            mand causes ssh-dummy-shell to exit immediately.

       ssh-dummy-shell returns the return value of the given com-
       mand.  If no command is given, 0 will be returned on exit.

              Contains the message that is shown to the user when
              ssh-dummy-shell is executed without any parameters.

       SSH Communications Security Corp.

       For more information, see

       sftp2(1), ssh2(1), sshd2(8)

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now