2004-02-24 05:14:41 +00:00
|
|
|
This file contains notes about OpenSSH on specific platforms.
|
|
|
|
|
|
|
|
AIX
|
|
|
|
---
|
|
|
|
As of OpenSSH 3.8p1, sshd will now honour an accounts password expiry
|
|
|
|
settings, where previously it did not. Because of this, it's possible for
|
|
|
|
sites that have used OpenSSH's sshd exclusively to have accounts which
|
|
|
|
have passwords expired longer than the inactive time (ie the "Weeks between
|
|
|
|
password EXPIRATION and LOCKOUT" setting in SMIT or the maxexpired
|
|
|
|
chuser attribute).
|
|
|
|
|
|
|
|
Accounts in this state must have their passwords reset manually by the
|
|
|
|
administrator. As a precaution, it is recommended that the administrative
|
|
|
|
passwords be reset before upgrading from OpenSSH <3.8.
|
|
|
|
|
2005-02-15 10:45:57 +00:00
|
|
|
As of OpenSSH 4.0, configure will attempt to detect if your version
|
|
|
|
and maintenance level of AIX has a working getaddrinfo, and will use it
|
|
|
|
if found. This will enable IPv6 support. If for some reason configure
|
|
|
|
gets it wrong, or if you want to build binaries to work on earlier MLs
|
|
|
|
than the build host then you can add "-DBROKEN_GETADDRINFO" to CFLAGS
|
|
|
|
to force the previous IPv4-only behaviour.
|
|
|
|
|
2005-02-15 11:44:05 +00:00
|
|
|
IPv6 known to work: 5.1ML7 5.2ML2 5.2ML5
|
2005-02-15 10:45:57 +00:00
|
|
|
IPv6 known broken: 4.3.3ML11 5.1ML4
|
2004-04-23 08:57:13 +00:00
|
|
|
|
|
|
|
Cygwin
|
|
|
|
------
|
|
|
|
To build on Cygwin, OpenSSH requires the following packages:
|
|
|
|
gcc, gcc-mingw-core, mingw-runtime, binutils, make, openssl,
|
|
|
|
openssl-devel, zlib, minres, minires-devel.
|
|
|
|
|
|
|
|
|
2004-02-24 05:14:41 +00:00
|
|
|
Solaris
|
|
|
|
-------
|
2005-02-20 10:01:48 +00:00
|
|
|
If you enable BSM auditing on Solaris, you need to update audit_event(4)
|
|
|
|
for praudit(1m) to give sensible output. The following line needs to be
|
|
|
|
added to /etc/security/audit_event:
|
2004-02-24 05:14:41 +00:00
|
|
|
|
2005-02-20 10:01:48 +00:00
|
|
|
32800:AUE_openssh:OpenSSH login:lo
|
|
|
|
|
|
|
|
The BSM audit event range available for third party TCB applications is
|
|
|
|
32768 - 65535. Event number 32800 has been choosen for AUE_openssh.
|
|
|
|
There is no official registry of 3rd party event numbers, so if this
|
|
|
|
number is already in use on your system, you may change it at build time
|
|
|
|
by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding.
|
|
|
|
|
|
|
|
|
2005-11-05 05:28:35 +00:00
|
|
|
Platforms using PAM
|
|
|
|
-------------------
|
|
|
|
As of OpenSSH 4.3p1, sshd will no longer check /etc/nologin itself when
|
|
|
|
PAM is enabled. To maintain existing behaviour, pam_nologin should be
|
|
|
|
added to sshd's session stack which will prevent users from starting shell
|
|
|
|
sessions. Alternatively, pam_nologin can be added to either the auth or
|
|
|
|
account stacks which will prevent authentication entirely, but will still
|
|
|
|
return the output from pam_nologin to the client.
|
|
|
|
|
|
|
|
|
|
|
|
$Id: README.platform,v 1.6 2005/11/05 05:28:35 dtucker Exp $
|