]> andersk Git - gssapi-openssh.git/blame - openssh/README.platform
Initial revision
[gssapi-openssh.git] / openssh / README.platform
CommitLineData
bbf3a7a8 1This file contains notes about OpenSSH on specific platforms.
2
3AIX
4---
5As of OpenSSH 3.8p1, sshd will now honour an accounts password expiry
6settings, where previously it did not. Because of this, it's possible for
7sites that have used OpenSSH's sshd exclusively to have accounts which
8have passwords expired longer than the inactive time (ie the "Weeks between
9password EXPIRATION and LOCKOUT" setting in SMIT or the maxexpired
10chuser attribute).
11
12Accounts in this state must have their passwords reset manually by the
13administrator. As a precaution, it is recommended that the administrative
14passwords be reset before upgrading from OpenSSH <3.8.
15
dfddba3d 16As of OpenSSH 4.0, configure will attempt to detect if your version
17and maintenance level of AIX has a working getaddrinfo, and will use it
18if found. This will enable IPv6 support. If for some reason configure
19gets it wrong, or if you want to build binaries to work on earlier MLs
20than the build host then you can add "-DBROKEN_GETADDRINFO" to CFLAGS
21to force the previous IPv4-only behaviour.
22
23IPv6 known to work: 5.1ML7 5.2ML2 5.2ML5
24IPv6 known broken: 4.3.3ML11 5.1ML4
7e82606e 25
26Cygwin
27------
28To build on Cygwin, OpenSSH requires the following packages:
29gcc, gcc-mingw-core, mingw-runtime, binutils, make, openssl,
30openssl-devel, zlib, minres, minires-devel.
31
32
bbf3a7a8 33Solaris
34-------
dfddba3d 35If you enable BSM auditing on Solaris, you need to update audit_event(4)
36for praudit(1m) to give sensible output. The following line needs to be
37added to /etc/security/audit_event:
38
39 32800:AUE_openssh:OpenSSH login:lo
40
41The BSM audit event range available for third party TCB applications is
4232768 - 65535. Event number 32800 has been choosen for AUE_openssh.
43There is no official registry of 3rd party event numbers, so if this
44number is already in use on your system, you may change it at build time
45by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding.
46
bbf3a7a8 47
08822d99 48Platforms using PAM
49-------------------
50As of OpenSSH 4.3p1, sshd will no longer check /etc/nologin itself when
51PAM is enabled. To maintain existing behaviour, pam_nologin should be
52added to sshd's session stack which will prevent users from starting shell
53sessions. Alternatively, pam_nologin can be added to either the auth or
54account stacks which will prevent authentication entirely, but will still
55return the output from pam_nologin to the client.
56
57
bbf3a7a8 58$Id$
This page took 0.272625 seconds and 5 git commands to generate.