@@ -47,7 +47,7 @@ entire subnet to the VPN.
4747 not from outside machines. If you want to accept
4848 connections from other machines on your network (ie. to
4949 run sshuttle on a router) try enabling IP Forwarding in
50- your kernel, then using ` --listen 0.0.0.0:0 ` .
50+ your kernel, then using ` --listen 0.0.0.0:0 ` .
5151
5252-H, --auto-hosts
5353: scan for remote hostnames and update the local /etc/hosts
@@ -63,26 +63,26 @@ entire subnet to the VPN.
6363 all running copies. Third, if you're only routing a
6464 few subnets over the VPN, you probably would prefer to
6565 keep using your local DNS server for everything else.
66-
66+
6767-N, --auto-nets
6868: in addition to the subnets provided on the command
6969 line, ask the server which subnets it thinks we should
7070 route, and route those automatically. The suggestions
7171 are taken automatically from the server's routing
7272 table.
73-
73+
7474--dns
7575: capture local DNS requests and forward to the remote DNS
7676 server.
77-
77+
7878--python
79- : specify the name/path of the remote python interpreter.
79+ : specify the name/path of the remote python interpreter.
8080 The default is just ` python ` , which means to use the
8181 default python interpreter on the remote system's PATH.
8282
8383-r, --remote=* [ username@] sshserver[ : port ] *
8484: the remote hostname and optional username and ssh
85- port number to use for connecting to the remote server.
85+ port number to use for connecting to the remote server.
8686 For example, example.com,
[email protected] ,
8787 [email protected] :2222, or example.com:2244.
8888
@@ -102,7 +102,7 @@ entire subnet to the VPN.
102102: print more information about the session. This option
103103 can be used more than once for increased verbosity. By
104104 default, sshuttle prints only error messages.
105-
105+
106106-e, --ssh-cmd
107107: the command to use to connect to the remote server. The
108108 default is just ` ssh ` . Use this if your ssh client is
@@ -111,12 +111,12 @@ entire subnet to the VPN.
111111
112112--seed-hosts
113113: a comma-separated list of hostnames to use to
114- initialize the ` --auto-hosts ` scan algorithm.
114+ initialize the ` --auto-hosts ` scan algorithm.
115115 ` --auto-hosts ` does things like poll local SMB servers
116116 for lists of local hostnames, but can speed things up
117117 if you use this option to give it a few names to start
118118 from.
119-
119+
120120--no-latency-control
121121: sacrifice latency to improve bandwidth benchmarks. ssh
122122 uses really big socket buffers, which can overload the
@@ -132,16 +132,16 @@ entire subnet to the VPN.
132132 trying to control). This option disables the latency
133133 control feature, maximizing bandwidth usage. Use at
134134 your own risk.
135-
135+
136136-D, --daemon
137137: automatically fork into the background after connecting
138138 to the remote server. Implies ` --syslog ` .
139-
139+
140140--syslog
141141: after connecting, send all log messages to the
142142 ` syslog ` (3) service instead of stderr. This is
143143 implicit if you use ` --daemon ` .
144-
144+
145145--pidfile=* pidfilename*
146146: when using ` --daemon ` , save sshuttle's pid to
147147 * pidfilename* . The default is ` sshuttle.pid ` in the
@@ -159,7 +159,7 @@ entire subnet to the VPN.
159159 automatically run ` sudo ` or ` su ` to start the firewall
160160 manager, but the core of sshuttle still runs as a
161161 normal user.
162-
162+
163163--hostwatch
164164: (internal use only) run the hostwatch daemon. This
165165 process runs on the server side and collects hostnames for
@@ -176,7 +176,7 @@ Test locally by proxying all local connections, without using ssh:
176176
177177 Starting sshuttle proxy.
178178 Listening on ('0.0.0.0', 12300).
179- [local sudo] Password:
179+ [local sudo] Password:
180180 firewall manager ready.
181181 c : connecting to server...
182182 s: available routes:
@@ -230,7 +230,7 @@ there. Thus, you don't need to install sshuttle on the
230230remote server, and there are never sshuttle version
231231conflicts between client and server.
232232
233- Unlike most VPNs, sshuttle forwards sessions, not packets.
233+ Unlike most VPNs, sshuttle forwards sessions, not packets.
234234That is, it uses kernel transparent proxying (`iptables
235235REDIRECT` rules on Linux, or ` ipfw fwd` rules on BSD) to
236236capture outgoing TCP sessions, then creates entirely
@@ -282,4 +282,3 @@ and reboot.
282282# SEE ALSO
283283
284284` ssh ` (1), ` python ` (1)
285-
0 commit comments