cpu – connection to CPU server
cmd args ...
This tool is deprecated and has been replaced by
running on the
machine, or the machine named in the
environment variable if there is no
standard input, output, and error files will be
in the name space where the
command was invoked.
is run in an
window on a terminal, so
output goes to that window, and input comes from the keyboard
when that window is current.
current directory is
the working directory of the
The name space for the new
is an analogue of the name space where the
command was invoked:
it is the same except for architecture-dependent bindings such as
and the use of fast paths to file servers, if available.
argument is present,
uses the argument as the remote user id.
argument is present, the remainder of the command line is executed by
on the server, and then
argument is present, the
is passed to
to control how much of the local name space will be exported to
the remote system.
command allows the user to specify the authentication mechanism used
when connecting to the remote system. The two possibilities for
This is the default. Authentication is done using the standard Plan 9
No user interaction is required.
Authentication is done using challenge/response and a hand held
authenticator or the
The user must encrypt the challenge and type the encryption
This is used if the local host is in a different protection domain than
the server or if the user wants to log into the server as a different
This skips authentication. This requires the
flag to be specified on the remote side.
option specifies an encryption and/or hash algorithm to
use for the connection. If both are specified, they must
be space separated and comprise a single argument, so they
must be quoted if in a shell command. The default is
for details on possible algorithms. The argument
specifies no encryption algorithm and can be used to talk
to older versions of the
flag specifies a key pattern to use to restrict the keys
selected by the
call used for authentication.
The name space is built by running
with the root of the invoking name space bound to
environment variable is set to
environment variables reflect the server’s architecture.
to run the server (remote) side of the protocol.
It is run from service files such as
option allows using the
authentication method for incoming connections and must be
specified before the
flag pushes the
filter onto the connection to protect against temporary
flag sets the announce-string
to use for
connections, if requested by the initial protocol.
The name space of the terminal side of the
command is mounted, via
on the CPU side on directory
The files such as
are bound to their standard locations from there.
Binds and mounts done after the terminal
is run are not reflected in the new name space.
By default, the entire namespace of the local system is
exported to the remote system. Use of the
option in conjunction with a customized patternfile can
limit this exposure, but also limits the usefulness of