diff options
author | Darren Tucker <dtucker@zip.com.au> | 2004-02-24 16:14:41 +1100 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2004-02-24 16:14:41 +1100 |
commit | 149543e56d3c07de83bb13b5afea4ceb89bf7af1 (patch) | |
tree | da104abf8d8201326421e6344b5e14e18b671508 | |
parent | 5ce131f2b6f714bba1fa3214cc15a0b2b90d68e8 (diff) |
- (dtucker) {README.platform] Add platform-specific notes.
-rw-r--r-- | ChangeLog | 3 | ||||
-rw-r--r-- | README.platform | 22 |
2 files changed, 24 insertions, 1 deletions
@@ -23,6 +23,7 @@ | |||
23 | - (tim) [openbsd-compat/getrrsetbyname.c] Make gcc 2.7.2.3 happy. ok djm@ | 23 | - (tim) [openbsd-compat/getrrsetbyname.c] Make gcc 2.7.2.3 happy. ok djm@ |
24 | - (djm) Crank RPM spec versions | 24 | - (djm) Crank RPM spec versions |
25 | - (dtucker) [README] Add pointer to release notes. ok djm@ | 25 | - (dtucker) [README] Add pointer to release notes. ok djm@ |
26 | - (dtucker) {README.platform] Add platform-specific notes. | ||
26 | 27 | ||
27 | 20040223 | 28 | 20040223 |
28 | - (dtucker) [session.c] Bug #789: Only make setcred call for !privsep in the | 29 | - (dtucker) [session.c] Bug #789: Only make setcred call for !privsep in the |
@@ -1926,4 +1927,4 @@ | |||
1926 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. | 1927 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. |
1927 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au | 1928 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au |
1928 | 1929 | ||
1929 | $Id: ChangeLog,v 1.3254 2004/02/24 05:13:24 dtucker Exp $ | 1930 | $Id: ChangeLog,v 1.3255 2004/02/24 05:14:41 dtucker Exp $ |
diff --git a/README.platform b/README.platform new file mode 100644 index 000000000..c4d0c74f8 --- /dev/null +++ b/README.platform | |||
@@ -0,0 +1,22 @@ | |||
1 | This file contains notes about OpenSSH on specific platforms. | ||
2 | |||
3 | AIX | ||
4 | --- | ||
5 | As of OpenSSH 3.8p1, sshd will now honour an accounts password expiry | ||
6 | settings, where previously it did not. Because of this, it's possible for | ||
7 | sites that have used OpenSSH's sshd exclusively to have accounts which | ||
8 | have passwords expired longer than the inactive time (ie the "Weeks between | ||
9 | password EXPIRATION and LOCKOUT" setting in SMIT or the maxexpired | ||
10 | chuser attribute). | ||
11 | |||
12 | Accounts in this state must have their passwords reset manually by the | ||
13 | administrator. As a precaution, it is recommended that the administrative | ||
14 | passwords be reset before upgrading from OpenSSH <3.8. | ||
15 | |||
16 | Solaris | ||
17 | ------- | ||
18 | Currently, sshd does not support BSM auditting. This can show up as errors | ||
19 | when editting cron entries via crontab. See. | ||
20 | http://bugzilla.mindrot.org/show_bug.cgi?id=125 | ||
21 | |||
22 | $Id: README.platform,v 1.1 2004/02/24 05:14:41 dtucker Exp $ | ||