source: heimdal/trunk/appl/kx/kx.1@ 4

Last change on this file since 4 was 1, checked in by Paul Smedley, 10 years ago

Initial commit of Heimdal 1.5.3

File size: 2.8 KB
Line 
1.\" Copyright (c) 1996 - 1997 Kungliga Tekniska Högskolan
2.\" (Royal Institute of Technology, Stockholm, Sweden).
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\"
9.\" 1. Redistributions of source code must retain the above copyright
10.\" notice, this list of conditions and the following disclaimer.
11.\"
12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\" notice, this list of conditions and the following disclaimer in the
14.\" documentation and/or other materials provided with the distribution.
15.\"
16.\" 3. Neither the name of the Institute nor the names of its contributors
17.\" may be used to endorse or promote products derived from this software
18.\" without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" $Id$
33.\"
34.Dd September 27, 1996
35.Dt KX 1
36.Os KTH-KRB
37.Sh NAME
38.Nm kx
39.Nd securely forward X conections
40.Sh SYNOPSIS
41.Ar kx
42.Op Fl l Ar username
43.Op Fl k
44.Op Fl d
45.Op Fl t
46.Op Fl p Ar port
47.Op Fl P
48.Ar host
49.Sh DESCRIPTION
50The
51.Nm
52program forwards an X connection from a remote client to a local screen
53through an authenticated and encrypted stream. Options supported by
54.Nm kx :
55.Bl -tag -width Ds
56.It Fl l
57Log in on the remote the host as user
58.Ar username .
59.It Fl k
60Do not enable keep-alives on the TCP connections.
61.It Fl d
62Do not fork. This is mainly useful for debugging.
63.It Fl t
64Listen not only on a UNIX-domain socket but on a TCP socket as well.
65.It Fl p
66Use the port
67.Ar port .
68.It Fl P
69Force passive mode.
70.El
71.Pp
72This program is used by
73.Nm rxtelnet
74and
75.Nm rxterm
76and you should not need to run it directly.
77.Pp
78It connects to a
79.Nm kxd
80on the host
81.Ar host
82and then will relay the traffic from the remote X clients to the local
83server. When started, it prints the display and Xauthority-file to be
84used on host
85.Ar host
86and then goes to the background, waiting for connections from the
87remote
88.Nm kxd .
89.Sh SEE ALSO
90.Xr rxtelnet 1 ,
91.Xr rxterm 1 ,
92.Xr kxd 8
Note: See TracBrowser for help on using the repository browser.