Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Authentication >>
    System Administration >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Man Pages and Default Configuration Files >>
        Default sshd2_config Configuration File
        Default ssh_certd_config Configuration File
    Log Messages >>


SSH-DUMMY-SHELL(1)             SSH2            SSH-DUMMY-SHELL(1)

       ssh-dummy-shell - Ultimately restricted shell

       ssh-dummy-shell [-c sftp-shell]

       ssh-dummy-shell is used to provide access to systems where
       only file transfer functionality is permitted.  Users with
       file-transfer-only  access  can  have  ssh-dummy-shell  as
       their user shell.  When executed without  any  parameters,
       the  program waits for the user to press any key and exit.
       The only way to execute programs with  ssh-dummy-shell  is
       to  give  them  as  command-line  parameters  with  the -c
       option.  Even then, sft-server-g3 is the only allowed com-

       -c command
            The  parameter  is executed as a shell command.  Only
            the sftp-server command is allowed.  Any  other  com-
            mand causes ssh-dummy-shell to exit immediately.

       ssh-dummy-shell returns the return value of the given com-
       mand.  If no command is given, 0 will be returned on exit.

              Contains the message that is shown to the user when
              ssh-dummy-shell is executed without any parameters.

       SSH Communications Security Corp.

       For more information, see

       sftpg3(1), sshg3(1), sshd2(8)

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more