summaryrefslogtreecommitdiff
path: root/debian/faq.html
diff options
context:
space:
mode:
Diffstat (limited to 'debian/faq.html')
-rw-r--r--debian/faq.html1182
1 files changed, 1182 insertions, 0 deletions
diff --git a/debian/faq.html b/debian/faq.html
new file mode 100644
index 000000000..812234d2f
--- /dev/null
+++ b/debian/faq.html
@@ -0,0 +1,1182 @@
1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2<html>
3<head>
4<title>OpenSSH FAQ</title>
5<link rev= "made" href= "mailto:www@openbsd.org">
6<meta name= "resource-type" content= "document">
7<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
8<meta name= "description" content= "the OpenSSH FAQ page">
9<meta name= "keywords" content= "OpenSSH,SSH,Secure Shell,faq">
10<meta name= "distribution" content= "global">
11<meta name= "copyright" content= "This document copyright 1999-2005 OpenBSD.">
12</head>
13
14<body bgcolor= "#ffffff" text= "#000000" link= "#23238E">
15<a href="http://www.openssh.org/index.html"><img alt="[OpenSSH]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
16<p>
17
18<h1>OpenSSH FAQ (Frequently asked questions)</h1>
19
20<strong>Date: 2005/09/20</strong>
21
22<hr>
23
24<blockquote>
25<h3><a href= "#1.0">1.0 - What Is OpenSSH and Where Can I Get It?</a></h3>
26<ul>
27<li><a href= "#1.1">1.1 - What is OpenSSH and where can I download it?</a>
28<li><a href= "#1.2">1.2 - Why should it be used?</a>
29<li><a href= "#1.3">1.3 - What Operating Systems are supported?</a>
30<li><a href= "#1.4">1.4 - What about copyright, usage and patents?</a>
31<li><a href= "#1.5">1.5 - Where should I ask for help?</a>
32<li><a href= "#1.6">1.6 - I have found a bug. Where do I report it?</a>
33</ul>
34
35<h3><a href= "#2.0">2.0 - General Questions</a></h3>
36<ul>
37<li><a href= "#2.1">2.1 - Why does ssh/scp make connections from low-numbered ports. My firewall blocks these.</a>
38<li><a href= "#2.2">2.2 - Why is the ssh client setuid root?</a>
39<li><a href= "#2.3">2.3 - Why does SSH 2.3 have problems interoperating with OpenSSH 2.1.1?</a>
40<li><a href= "#2.4">2.4 - Why does OpenSSH print: Dispatch protocol error: type 20</a>
41<li><a href= "#2.5">2.5 - Old versions of commercial SSH encrypt host keys with IDEA.</a>
42<li><a href= "#2.6">2.6 - What are these warning messages about key lengths?</a>
43<li><a href= "#2.7">2.7 - X11 and/or agent forwarding does not work.</a>
44<li><a href= "#2.8">2.8 - After upgrading OpenSSH I lost SSH2 support.</a>
45<li><a href= "#2.9">2.9 - sftp/scp fails at connection, but ssh is OK.</a>
46<li><a href= "#2.10">2.10 - Will you add [foo] to scp?</a>
47<li><a href= "#2.11">2.11 - How do I use port forwarding?</a>
48<li><a href= "#2.12">2.12 - My ssh connection freezes or drops out after N minutes of inactivity.</a>
49<li><a href= "#2.13">2.13 - How do I use scp to copy a file with a colon in it?</a>
50<li><a href= "#2.14">2.14 - Why does OpenSSH report its version to clients?</a>
51</ul>
52
53<h3><a href= "#3.0">3.0 - Portable OpenSSH Questions</a></h3>
54<ul>
55<li><a href= "#3.1">3.1 - Spurious PAM authentication messages in logfiles.</a>
56<li><a href= "#3.2">3.2 - Empty passwords not allowed with PAM authentication.</a>
57<li><a href= "#3.3">3.3 - ssh(1) takes a long time to connect or log in</a>
58<li><a href= "#3.4">3.4 - "Can't locate module net-pf-10" messages in log under Linux.</a>
59<li><a href= "#3.5">3.5 - Password authentication doesn't work (eg on Slackware 7.0 or Red Hat Linux 6.x)</a>
60<li><a href= "#3.6">3.6 - Configure or sshd(8) complain about lack of RSA support</a>
61<li><a href= "#3.7">3.7 - "scp: command not found" errors</a>
62<li><a href= "#3.8">3.8 - Unable to read passphrase</a>
63<li><a href= "#3.9">3.9 - 'configure' missing or make fails</a>
64<li><a href= "#3.10">3.10 - Hangs when exiting ssh</a>
65<li><a href= "#3.11">3.11 - Why does ssh hang on exit?</a>
66<li><a href= "#3.12">3.12 - I upgraded to OpenSSH 3.1 and X11 forwarding stopped working.</a>
67<li><a href= "#3.13">3.13 - I upgraded to OpenSSH 3.8 and some X11 programs stopped working.</a>
68<li><a href= "#3.14">3.14 - I copied my public key to authorized_keys but public-key authentication still doesn't work.</a>
69<li><a href= "#3.15">3.15 - OpenSSH versions and PAM behaviour.</a>
70<li><a href= "#3.16">3.16 - Why doesn't "w" or "who" on AIX 5.x show users logged in via ssh?</a>
71</ul>
72
73</blockquote>
74
75<hr>
76
77<h2><u><a name= "1.0">1.0 - What Is OpenSSH and Where Can I Get It?</a></u></h2>
78
79<h2><a name= "1.1">1.1 - What is OpenSSH and where can I download it?</a></h2>
80
81<p>
82OpenSSH is a <b>FREE</b> version of the SSH suite of network connectivity
83tools that increasing numbers of people on the Internet are coming to
84rely on. Many users of telnet, rlogin, ftp, and other such programs might
85not realize that their password is transmitted across the Internet
86unencrypted, but it is. OpenSSH encrypts all traffic (including passwords)
87to effectively eliminate eavesdropping, connection hijacking,
88and other network-level attacks.
89
90<p>
91The OpenSSH suite includes the
92<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh&amp;sektion=1">ssh(1)</a>
93program which replaces rlogin and telnet, and
94<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a>
95which replaces
96<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=rcp&amp;sektion=1">rcp(1)</a> and
97<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ftp&amp;sektion=1">ftp(1)</a>.
98OpenSSH has also added
99<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sftp&amp;sektion=1">sftp(1)</a> and
100<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sftp-server&amp;sektion=8">sftp-server(8)</a>
101which implement an easier solution for file-transfer. This is based upon the
102<a href="http://www.openssh.org/txt/draft-ietf-secsh-filexfer-02.txt">secsh-filexfer</a> IETF draft.
103
104
105<p><strong>OpenSSH consists of a number of programs.</strong>
106
107<ul>
108<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&amp;sektion=8">sshd(8)</a> - Server program run on the server machine. This listens for connections from client machines, and whenever it receives a connection, it performs authentication and starts serving the client.
109Its behaviour is controlled by the config file <i><a
110href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd_config&amp;sektion=5">
111sshd_config(5)</a></i>.
112<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh&amp;sektion=1">ssh(1)</a> - This is the client program used to log into another machine or to execute commands on the other machine. <i>slogin</i> is another name for this program.
113Its behaviour is controlled by the global config file <i><a
114href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh_config&amp;sektion=5">
115ssh_config(5)</a></i> and individual users' <i>$HOME/.ssh/config</i> files.
116<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a> - Securely copies files from one machine to another.
117<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keygen&amp;sektion=1">ssh-keygen(1)</a> - Used to create Pubkey Authentication (RSA or DSA) keys (host keys and user authentication keys).
118<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-agent&amp;sektion=1">ssh-agent(1)</a> - Authentication agent. This can be used to hold RSA keys for authentication.
119<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-add&amp;sektion=1">ssh-add(1)</a> - Used to register new keys with the agent.
120<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sftp-server&amp;sektion=8">sftp-server(8)</a> - SFTP server subsystem.
121<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sftp&amp;sektion=1">sftp(1)</a> - Secure file transfer program.
122<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keyscan&amp;sektion=1">ssh-keyscan(1)</a> - gather ssh public keys.
123<li><a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keysign&amp;sektion=8">ssh-keysign(8)</a> - ssh helper program for hostbased authentication.
124</ul>
125
126<h3>Downloading</h3>
127
128<p>
129OpenSSH comes in two downloadable distributions: the native <a
130href="http://www.openssh.org/openbsd.html">OpenBSD</a> distribution and the multi-platform
131<a href="http://www.openssh.org/portable.html">Portable</a> distribution. If you want
132OpenSSH for a recent OpenBSD or integration into a product, you
133probably want the <a href="http://www.openssh.org/openbsd.html">OpenBSD</a> distribution.
134If you want OpenSSH for another platform, or an older OpenBSD, you
135probably want the <a href="http://www.openssh.org/portable.html">Portable</a> distribution.
136
137<p>
138When downloading, please use a <a href="http://www.openssh.org/portable.html#mirrors">mirror</a>
139near you.
140
141<h2><a name= "1.2">1.2 - Why should it be used?</a></h2>
142
143<p>
144OpenSSH is a suite of tools to help secure your network
145connections. Here is a list of features:
146
147
148<ul>
149 <li>Strong authentication. Closes several security holes (e.g., IP, routing, and DNS spoofing).
150 <li>Improved privacy. All communications are automatically and transparently encrypted.
151 <li>Secure X11 sessions. The program automatically sets DISPLAY on the server machine, and forwards any X11 connections over the secure channel.
152 <li>Arbitrary TCP/IP ports can be redirected through the encrypted channel in both directions (e.g., for e-cash transactions).
153 <li>No retraining needed for normal users.
154 <li>Never trusts the network. Minimal trust on the remote side of the connection. Minimal trust on domain name servers. Pure RSA authentication never trusts anything but the private key.
155 <li>Client RSA-authenticates the server machine in the beginning of every connection to prevent trojan horses (by routing or DNS spoofing) and man-in-the-middle attacks, and the server RSA-authenticates the client machine before accepting <i>.rhosts</i> or <i>/etc/hosts.equiv</i> authentication (to prevent DNS, routing, or IP-spoofing).
156 <li>Host authentication key distribution can be centrally by the administration, automatically when the first connection is made to a machine.
157 <li>Any user can create any number of user authentication RSA keys for his/her own use.
158 <li>The server program has its own server RSA key which is automatically regenerated every hour.
159 <li>An authentication agent, running in the user's laptop or local workstation, can be used to hold the user's RSA authentication keys.
160 <li>The software can be installed and used (with restricted functionality) even without root privileges.
161 <li>The client is customizable in system-wide and per-user configuration files.
162 <li>Optional compression of all data with gzip (including forwarded X11 and TCP/IP port data), which may result in significant speedups on slow connections.
163 <li>Complete replacement for rlogin, rsh, and rcp.
164</ul>
165
166<p>
167Currently, almost all communications in computer networks are done
168without encryption. As a consequence, anyone who has access to any
169machine connected to the network can listen in on any communication.
170This is being done by hackers, curious administrators, employers,
171criminals, industrial spies, and governments. Some networks leak off
172enough electromagnetic radiation that data may be captured even from a
173distance.
174
175
176<p>
177When you log in, your password goes in the network in plain
178text. Thus, any listener can then use your account to do any evil he
179likes. Many incidents have been encountered worldwide where crackers
180have started programs on workstations without the owner's knowledge
181just to listen to the network and collect passwords. Programs for
182doing this are available on the Internet, or can be built by a
183competent programmer in a few hours.
184
185
186<p>
187Businesses have trade secrets, patent applications in preparation,
188pricing information, subcontractor information, client data, personnel
189data, financial information, etc. Currently, anyone with access to
190the network (any machine on the network) can listen to anything that
191goes in the network, without any regard to normal access restrictions.
192
193
194<p>
195Many companies are not aware that information can so easily be
196recovered from the network. They trust that their data is safe
197since nobody is supposed to know that there is sensitive information
198in the network, or because so much other data is transferred in the
199network. This is not a safe policy.
200
201
202<h2><a name= "1.3">1.3 - What operating systems are supported?</a></h2>
203
204<p>
205Even though OpenSSH is developed on
206<a href="http://www.openbsd.org/">OpenBSD</a> a wide variety of
207ports to other operating systems exist. The portable version of OpenSSH
208is headed by <a href="mailto:djm@openbsd.org">Damien Miller</a>.
209For a quick overview of the portable version of OpenSSH see
210<a href="http://www.openssh.org/portable.html">OpenSSH Portable Release</a>.
211Currently, the supported operating systems are:
212
213
214<ul>
215 <li>OpenBSD
216 <li>NetBSD
217 <li>FreeBSD
218 <li>AIX
219 <li>HP-UX
220 <li>IRIX
221 <li>Linux
222 <li>NeXT
223 <li>SCO
224 <li>SNI/Reliant Unix
225 <li>Solaris
226 <li>Digital Unix/Tru64/OSF
227 <li>Mac OS X
228 <li>Cygwin
229</ul>
230
231<p>
232A list of vendors that include OpenSSH in their distributions
233is located in the <a href="http://www.openssh.org/users.html">OpenSSH Users page</a>.
234
235<h2><a name= "1.4">1.4 - What about copyrights, usage and patents?</a></h2>
236<p>
237The OpenSSH developers have tried very hard to keep OpenSSH free of any
238patent or copyright problems. To do this, some options had to be
239stripped from OpenSSH. Namely support for patented algorithms.
240
241<p>
242OpenSSH does not support any patented transport algorithms. In SSH1 mode,
243only 3DES and Blowfish are available options. In SSH2 mode, only 3DES,
244Blowfish, CAST128, Arcfour and AES can be selected.
245The patented IDEA algorithm is not supported.
246
247<p>
248OpenSSH provides support for both SSH1 and SSH2 protocols.
249
250<p>
251Since the RSA patent has expired, there are no restrictions on the use
252of RSA algorithm using software, including OpenBSD.
253
254<h2><a name= "1.5">1.5 - Where should I ask for help?</a></h2>
255<p>
256There are many places to turn to for help. In addition to the main
257<a href="http://www.openssh.org/index.html">OpenSSH website</a>,
258there are many mailing lists to try. Before trying any mailing lists,
259please search through all mailing list archives to see if your question
260has already been answered. The OpenSSH Mailing List has been archived and
261put in searchable form and can be found at
262<a href="http://marc.info/?l=openssh-unix-dev&amp;r=1&amp;w=2">marc.info</a>.
263
264<p>
265For more information on subscribing to OpenSSH related mailing lists,
266please see <a href="http://www.openssh.org/list.html">OpenSSH Mailing lists</a>.
267
268<h2><a name= "1.6">1.6 - I have found a bug. Where do I report it?</a></h2>
269<p>
270Information about submitting bug reports can be found at the OpenSSH
271<a href="http://www.openssh.org/report.html">Reporting bugs</a> page.
272<p>
273If you wish to report a security bug, please contact the private developers
274list &lt;<a href="mailto:openssh@openssh.com">openssh@openssh.com</a>&gt;.
275
276<h2><u><a name= "2.0">2.0 - General Questions</a></u></h2>
277
278<h2><a name= "2.1">2.1 - Why does ssh/scp make connections from low-numbered ports.</a></h2>
279<p>
280The OpenSSH client uses low numbered ports for rhosts and rhosts-rsa
281authentication because the server needs to trust the username provided by
282the client. To get around this, you can add the below example to your
283<i>ssh_config</i> or <i>~/.ssh/config</i> file.
284
285
286<blockquote>
287<table border=0 width="800">
288 <tr>
289 <td nowrap bgcolor="#EEEEEE">
290<b>UsePrivilegedPort no</b>
291 </td>
292 </tr>
293</table>
294</blockquote>
295
296<p>
297Or you can specify this option on the command line, using the <b>-o</b>
298option to
299<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh&amp;sektion=1">ssh(1)</a> command.
300
301<blockquote>
302<table border=0 width="800">
303 <tr>
304 <td nowrap bgcolor="#EEEEEE">
305$ <b>ssh -o "UsePrivilegedPort no" host.com</b>
306 </td>
307 </tr>
308</table>
309</blockquote>
310
311<h2><a name= "2.2">2.2 - Why is the ssh client setuid root?</a></h2>
312
313<p>
314In conjunction with the previous question, (<a href="#2.1">2.1</a>)
315OpenSSH needs root authority to be able to bind to low-numbered ports to
316facilitate <i>rhosts authentication</i>.
317A privileged port is also required for rhosts-rsa authentication to older
318SSH releases.
319
320<p>
321Additionally, for both <i>rhosts-rsa authentication</i> (in protocol
322version 1) and <i>hostbased authentication</i> (in protocol version 2)
323the ssh client needs to access the <i>private host key</i> in order to
324authenticate the client machine to the server.
325OpenSSH versions prior to 3.3 required the <code>ssh</code> binary to be
326setuid root to enable this, and you may safely remove it if you don't
327want to use these authentication methods.
328
329<p>
330Starting in OpenSSH 3.3, <code>ssh</code> is not setuid by default. <a
331href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keysign">ssh-keysign</a>,
332is used for access to the private hosts keys, and ssh does not use privileged
333source ports by default. If you wish to use a privileged source port, you must
334manually set the setuid bit on <code>ssh</code>.
335
336<h2><a name= "2.3">2.3 - Why does SSH 2.3 have problems interoperating with OpenSSH 2.1.1?</a></h2>
337
338<p>
339SSH 2.3 and earlier versions contain a flaw in their HMAC implementation.
340Their code was not supplying the full data block output from the digest,
341and instead always provided 128 bits. For longer digests, this caused
342SSH 2.3 to not interoperate with OpenSSH.
343
344<p>
345OpenSSH 2.2.0 detects that SSH 2.3 has this flaw. Recent versions of SSH
346will have this bug fixed. Or you can add the following to
347SSH 2.3 <i>sshd2_config</i>.
348
349
350<blockquote>
351<table border=0 width="800">
352 <tr>
353 <td nowrap bgcolor="#EEEEEE">
354<b>Mac hmac-md5</b>
355 </td>
356 </tr>
357</table>
358</blockquote>
359
360<h2><a name= "2.4">2.4 - Why does OpenSSH print: Dispatch protocol error: type 20</a></h2>
361
362<p>
363Problems in interoperation have been seen because older versions of
364OpenSSH did not support session rekeying. However the commercial SSH 2.3
365tries to negotiate this feature, and you might experience connection
366freezes or see the error message &quot;<b>Dispatch protocol error:
367type 20 </b>&quot;.
368To solve this problem, either upgrade to a recent OpenSSH release or
369disable rekeying by adding the following to your commercial SSH 2.3's
370<i>ssh2_config</i> or <i>sshd2_config</i>.
371
372
373<blockquote>
374<table border=0 width="800">
375 <tr>
376 <td nowrap bgcolor="#EEEEEE">
377<b>RekeyIntervalSeconds 0</b>
378 </td>
379 </tr>
380</table>
381</blockquote>
382
383<h2><a name= "2.5">2.5 - Old versions of commercial SSH encrypt host keys with IDEA.</a></h2>
384
385<p>
386The old versions of SSH used a patented algorithm to encrypt their
387<i>/etc/ssh/ssh_host_key</i>. This problem will manifest as
388<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&amp;sektion=8">sshd(8)</a>
389not being able to read its host key. To solve this, use the command below
390to convert your ssh_host_key to use 3DES.
391<b>NOTE:</b> Use the
392<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keygen&amp;sektion=1">ssh-keygen(1)</a>
393program from the Commercial SSH product, *NOT* OpenSSH for the example
394below.
395
396
397<blockquote>
398<table border=0 width="800">
399 <tr>
400 <td nowrap bgcolor="#EEEEEE">
401# <b>ssh-keygen -u -f /etc/ssh/ssh_host_key</b>
402 </td>
403 </tr>
404</table>
405</blockquote>
406
407<h2><a name= "2.6">2.6 - What are these warning messages about key lengths</a></h2>
408
409<p>
410Commercial SSH's
411<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keygen&amp;sektion=1">ssh-keygen(1)</a>
412program contained a bug which caused it to occasionally generate Pubkey
413Authentication (RSA or DSA) keys which had their Most Significant Bit
414(MSB) unset. Such keys were advertised as being full-length, but are
415actually, half the time, smaller than advertised.
416
417<p>
418OpenSSH will print warning messages when it encounters such keys. To rid
419yourself of these message, edit your <i>known_hosts</i> files and replace the
420incorrect key length (usually "1024") with the correct key length
421(usually "1023").
422
423<h2><a name= "2.7">2.7 - X11 and/or agent forwarding does not work.</a></h2>
424
425<p>
426Check your <i>ssh_config</i> and <i>sshd_config</i>. The default
427configuration files disable authentication agent and X11 forwarding. To
428enable it, put the line below in <i>sshd_config</i>:
429
430<blockquote>
431<table border=0 width="800">
432 <tr>
433 <td nowrap bgcolor="#EEEEEE">
434<b>X11Forwarding yes</b>
435 </td>
436 </tr>
437</table>
438</blockquote>
439
440<p>
441and put the following lines in <i>ssh_config</i>:
442
443<blockquote>
444<table border=0 width="800">
445 <tr>
446 <td nowrap bgcolor="#EEEEEE">
447<b>ForwardAgent yes</b><br>
448<b>ForwardX11 yes</b>
449 </td>
450 </tr>
451</table>
452</blockquote>
453
454<p>
455X11 forwarding requires a working <a
456href="http://www.openbsd.org/cgi-bin/man.cgi?query=xauth&amp;sektion=1"
457>xauth(1)</a> binary. On OpenBSD this is in the <i>xbase</i> file
458set but will probably be different on other platforms. For OpenSSH
459Portable, xauth must be either found at configure time or specified
460via <b>XAuthLocation</b> in sshd_config(5) and ssh_config(5).
461
462<p>
463Note on agent interoperability: There are two different and
464incompatible agent forwarding mechanisms within the SSH2 protocol.
465OpenSSH has always used an extension of the original SSH1 agent
466requests, however some commercial products use a different, non-free
467agent forwarding protocol. This means that agent forwarding cannot
468be used between OpenSSH and those products.
469
470<p>
471<b>NOTE:</b> For users of Linux Mandrake 7.2, Mandrake modifies the
472<i>XAUTHORITY</i> environment variable in <i>/etc/skel/.bashrc</i>,
473and thus any bash user's home directory. This variable is set by OpenSSH
474and for either of the above options to work, you need to comment out
475the line:
476
477
478<blockquote>
479<table border=0 width="800">
480 <tr>
481 <td nowrap bgcolor="#EEEEEE">
482<b># export XAUTHORITY=$HOME/.Xauthority</b>
483 </td>
484 </tr>
485</table>
486</blockquote>
487
488<h2><a name= "2.8">2.8 - After upgrading OpenSSH I lost SSH2 support.</a></h2>
489
490<p>
491Between versions changes can be made to <i>sshd_config</i> or
492<i>ssh_config</i>. You should always check on these changes when upgrading
493versions of OpenSSH. After OpenSSH Version 2.3.0 you need to add the
494following to your <i>sshd_config</i>:
495
496
497<blockquote>
498<table border=0 width="800">
499 <tr>
500 <td nowrap bgcolor="#EEEEEE">
501<b>HostKey /etc/ssh_host_dsa_key</b><br>
502<b>HostKey /etc/ssh_host_rsa_key</b>
503 </td>
504 </tr>
505</table>
506</blockquote>
507
508<h2><a name= "2.9">2.9 - sftp/scp fails at connection, but ssh is OK.</a></h2>
509
510<p>
511sftp and/or scp may fail at connection time if you have shell
512initialization (.profile, .bashrc, .cshrc, etc) which produces output
513for non-interactive sessions. This output confuses the sftp/scp client.
514You can verify if your shell is doing this by executing:
515
516<blockquote>
517<table border=0 width="800">
518 <tr>
519 <td nowrap bgcolor="#EEEEEE">
520<b>ssh yourhost /usr/bin/true</b>
521 </td>
522 </tr>
523</table>
524</blockquote>
525
526<p>
527If the above command produces any output, then you need to modify your
528shell initialization.
529
530<h2><a name= "2.10">2.10 - Will you add [foo] to scp?</a></h2>
531
532<p>
533Short Answer: no.
534
535<p>
536Long Answer: scp is not standardized. The closest thing it has to a
537specification is "what rcp does". Since the same command is used on both ends
538of the connection, adding features or options risks breaking interoperability with other
539implementations.
540
541<p>
542New features are more likely in sftp, since the protocol is standardized
543(well, a <a href="http://www.ietf.org/html.charters/OLD/secsh-charter.html">
544draft standard</a>), extensible, and the client and server are decoupled.
545
546<h2><a name= "2.11">2.11 - How do I use port forwarding?</a></h2>
547
548<p>
549If the remote server is running sshd(8), it may be possible to
550``tunnel'' certain services via ssh. This may be desirable, for
551example, to encrypt POP or SMTP connections, even though the software
552does not directly support encrypted communications. Tunnelling uses
553port forwarding to create a connection between the client and server.
554The client software must be able to specify a non-standard port to
555connect to for this to work.
556
557<p>
558The idea is that the user connects to the remote host using ssh,
559and specifies which port on the client's machine should be used to
560forward connections to the remote server. After that it is possible
561to start the service which is to be encrypted (e.g. fetchmail, irc)
562on the client machine, specifying the same local port passed to
563ssh, and the connection will be tunnelled through ssh. By default,
564the system running the forward will only accept connections from
565itself.
566
567<p>
568The options most relevant to tunnelling are the -L and -R options,
569which allow the user to forward connections, the -D option, which
570permits dynamic port forwarding, the -g option, which permits other
571hosts to use port forwards, and the -f option, which instructs ssh
572to put itself in the background after authentication. See the <a
573href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh&amp;sektion=1"
574>ssh(1)</a> man page for further details.
575
576<p>
577This is an example of tunnelling an IRC session from client machine
578``127.0.0.1'' (localhost) to remote server ``server.example.com'':
579
580<blockquote>
581<table border=0 width="800">
582 <tr>
583 <td nowrap bgcolor="#EEEEEE">
584<b>ssh -f -L 1234:server.example.com:6667 server.example.com sleep 10<br>
585irc -c '#users' -p 1234 pinky 127.0.0.1</b>
586 </td>
587 </tr>
588</table>
589</blockquote>
590
591<p>
592This tunnels a connection to IRC server server.example.com, joining
593channel ``#users'', using the nickname ``pinky''. The local port used
594in this example is 1234. It does not matter which port is used, as
595long as it's greater than 1023 (remember, only root can open sockets on
596privileged ports) and doesn't conflict with any ports already in use.
597The connection is forwarded to port 6667 on the remote server, since
598that's the standard port for IRC services.
599
600<p>
601The remote command ``sleep 10'' was specified to allow an amount
602of time (10 seconds, in the example) to start the service which is to
603be tunnelled. If no connections are made within the time specified,
604ssh will exit. If more time is required, the sleep(1) value can be
605increased appropriately or, alternatively, the example above could
606be added as a function to the user's shell. See ksh(1) and csh(1)
607for more details about user-defined functions.
608
609<p>
610ssh also has an -N option, convenient for use with port forwarding:
611if -N is specified, it is not necessary to specify a remote command
612(``sleep 10'' in the example above). However, use of this option
613causes ssh to wait around for ever (as opposed to exiting after a
614remote command has completed), and the user must take care to manually
615kill(1) the process afterwards.
616
617<h2><a name= "2.12">2.12 - My ssh connection freezes or drops out after N minutes of inactivity.</a></h2>
618
619<p>
620This is usually the result of a packet filter or NAT device
621timing out your TCP connection due to inactivity. You can enable
622<b>ClientAliveInterval</b> in the server's <i><a
623href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd_config&amp;sektion=5">
624sshd_config</a></i>, or enable <b>ServerAliveInterval</b> in the
625client's <i><a
626href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssh_config&amp;sektion=5">
627ssh_config</a></i> (the latter is available in OpenSSH 3.8 and newer).
628
629<p>
630Enabling either option and setting the interval for less than the time
631it takes to time out your session will ensure that the connection is
632kept "fresh" in the device's connection table.
633
634<h2><a name= "2.13">2.13 - How do I use scp to copy a file with a colon in it?</a></h2>
635
636<b><a
637href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">
638scp</a></b> will interpret the component before the colon to be a remote
639server name and attempt to connect to it. To prevent this, refer to
640the file by a relative or absolute path, eg:
641
642<blockquote>
643<table border=0 width="800">
644 <tr>
645 <td nowrap bgcolor="#EEEEEE">
646$ scp ./source:file sshserver:
647 </td>
648 </tr>
649</table>
650</blockquote>
651
652<h2><a name= "2.14">2.14 - Why does OpenSSH report its version to clients?</a></h2>
653
654<p>
655OpenSSH, like most SSH implementations, reports its name and version to clients
656when they connect, e.g.
657</p>
658
659<blockquote>
660SSH-2.0-OpenSSH_3.9
661</blockquote>
662
663<p>
664This information is used by clients and servers to enable protocol
665compatibility tweaks to work around changed, buggy or missing features in
666the implementation they are talking to. This protocol feature checking is
667still required at present because versions with incompatibilities are still
668in wide use.
669</p>
670
671<h2><u><a name= "3.0">3.0 - Portable OpenSSH Questions</a></u></h2>
672
673<h2><a name= "3.1">3.1 - Spurious PAM authentication messages in logfiles.</a></h2>
674
675<p>
676The portable version of OpenSSH will generate spurious authentication
677failures at every login, similar to:
678
679
680<blockquote>
681<table border=0 width="800">
682 <tr>
683 <td nowrap bgcolor="#EEEEEE">
684&quot;<b>authentication failure; (uid=0) -&gt; root for sshd service</b>&quot;
685 </td>
686 </tr>
687</table>
688</blockquote>
689
690<p>
691These are generated because OpenSSH first tries to determine whether a
692user needs authentication to login (e.g. empty password). Unfortunately
693PAM likes to log all authentication events, this one included.
694
695<p>
696If it annoys you too much, set &quot;<b>PermitEmptyPasswords no</b>&quot;
697in <i>sshd_config</i>. This will quiet the error message at the expense
698of disabling logins to accounts with no password set.
699This is the default if you use the supplied <i>sshd_config</i> file.
700
701<h2><a name= "3.2">3.2 - Empty passwords not allowed with PAM authentication.</a></h2>
702
703<p>
704To enable empty passwords with a version of OpenSSH built with PAM you
705must add the flag nullok to the end of the password checking module
706in the <i>/etc/pam.d/sshd</i> file. For example:
707
708<blockquote>
709<table border=0 width="800">
710 <tr>
711 <td nowrap bgcolor="#EEEEEE">
712auth required/lib/security/pam_unix.so shadow nodelay nullok
713 </td>
714 </tr>
715</table>
716</blockquote>
717
718<p>
719This must be done in addition to setting &quot;<b>PermitEmptyPasswords
720yes</b>&quot; in the <i>sshd_config</i> file.
721
722<p>
723There is one caveat when using empty passwords with PAM authentication:
724PAM will allow any password when authenticating an account with an empty
725password. This breaks the check that
726<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&amp;sektion=8">sshd(8)</a>
727uses to determine whether an account has no password set and grant
728users access to the account regardless of the policy specified by
729<b>PermitEmptyPasswords</b>. For this reason, it is recommended that you
730do not add the <b>nullok</b> directive to your PAM configuration file
731unless you specifically wish to allow empty passwords.
732
733
734<h2><a name= "3.3">3.3 - ssh(1) takes a long time to connect or log
735in</a></h2>
736
737<p>
738Large delays (more that 10 seconds) are typically caused a problem with
739name resolution:
740<ul>
741<li>Some versions of glibc (notably glibc 2.1 shipped with Red Hat 6.1)
742can take a long time to resolve "IPv6 or IPv4" addresses from domain
743names. This can be worked around with by specifying <b>AddressFamily
744inet</b> option in <i>ssh_config</i>.</li>
745
746<li>There may be a DNS lookup problem, either at the client or server.
747You can use the <code>nslookup</code> command to check this on both client
748and server by looking up the other end's name and IP address. In
749addition, on the server look up the name returned by the client's
750IP-name lookup. You can disable most of the server-side lookups by
751setting <b>UseDNS no</b> in <i>sshd_config</i>.</li>
752</ul>
753
754<p>
755Delays less than 10 seconds can have other causes.
756
757<ul>
758
759<li>OpenSSH releases prior to 3.8 had an <i>moduli</i> file with
760moduli that were just smaller than what sshd would look for, and
761as a result, sshd would end up using moduli significantly larger
762than requested, which resulted in a speed penalty. Replacing the
763<i>moduli</i> file will resolve this (note that in most cases this
764file will not be replaced during an upgrade and must be replaced
765manually).</li>
766
767<li>OpenSSH releases prior to 3.8 had a flaw in <code>ssh</code> that
768would cause it to request moduli larger than intended (which when
769combined with the above resulted in significant slowdowns).
770Upgrading the client to 3.8 or higher will resolve this issue.</li>
771
772<li>If either the client or server lack a kernel-based random number
773device (eg Solaris &lt; 9, AIX &lt; 5.2, HP-UX &lt; 11.11) and no
774substitute is available (eg <a href=
775"ftp://ftp.ayamura.org/pub/prngd/">prngd</a>) it's possible that
776one of the programs called by <code>ssh-rand-helper</code> to
777generate entropy is hanging. This can be investigated by running
778it in debug mode:
779
780<blockquote>
781<table border=0 width="800">
782 <tr>
783 <td nowrap bgcolor="#EEEEEE">
784/usr/local/libexec/ssh-rand-helper -vvv
785 </td>
786 </tr>
787</table>
788</blockquote>
789
790Any significant delays should be investigated and rectified, or the
791corresponding commands should be removed from <i>ssh_prng_cmds</i>.
792</li>
793
794</ul>
795
796<h3>How slow is "slow"?</h3>
797Under normal conditions, the speed of SSH logins is dependant on
798CPU speed of client and server. For comparison the following are
799typical connect times for <code>time ssh localhost true</code>
800with a 1024-bit RSA key on otherwise unloaded hosts. OpenSSH and
801OpenSSL were compiled with gcc 3.3.x.
802
803<p>
804<table>
805<tr><th>CPU</th><th>Time (SSHv1)<a href="#3.3fn1">[1]</a></th>
806 <th>Time (SSHv2)</th></tr>
807<tr><td>170MHz SPARC/sun4m</td><td>0.74 sec</td><td>1.25 sec</td></tr>
808<tr><td>236MHz HPPA/8200<a href="#3.3fn2">[2]</a></td><td>0.44 sec</td>
809 <td>0.79 sec</td></tr>
810<tr><td>375MHz PowerPC/604e</td><td>0.38 sec</td><td>0.51 sec</td></tr>
811<tr><td>933MHz VIA Ezra</td><td>0.34 sec</td><td>0.44 sec</td></tr>
812<tr><td>2.1GHz Athlon XP 2600+</td><td>0.14 sec</td><td>0.22 sec</td></tr>
813</table>
814
815<br>
816
817<a name="3.3fn1">[1]</a> The SSHv1 protocol is faster but is
818cryptographically weaker than SSHv2.<br>
819
820<a name="3.3fn2">[2]</a> At the time of writing, gcc generates
821relatively slow code on HPPA for RSA and Diffie-Hellman operations
822(see <a href= "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=7625">gcc
823bug #7625</a> and <a
824href="http://marc.info/?l=openssh-unix-dev&amp;m=102646106016694">
825discussion on openssh-unix-dev</a>).
826
827<h2><a name= "3.4">3.4 - "Can't locate module net-pf-10" messages in log under Linux.</a></h2>
828
829<p>
830The Linux kernel is looking (via modprobe) for protocol family 10 (IPv6).
831Either load the appropriate kernel module, enter the correct alias in
832<i>/etc/modules.conf</i> or disable IPv6 in <i>/etc/modules.conf</i>.
833
834
835<p>
836For some silly reason <i>/etc/modules.conf</i> may also be named
837<i>/etc/conf.modules</i>.
838
839
840<h2><a name= "3.5">3.5 - Password authentication doesn't work (eg on Slackware 7.0 or Red Hat 6.x)</a></h2>
841
842<p>
843If the password is correct password the login is still denied, the
844usual cause is that the system is configured to use MD5-type passwords
845but the
846<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&amp;sektion=3"
847>crypt(3)</a> function used by sshd doesn't understand them.
848
849<p>
850Affected accounts will have password strings in <i>/etc/passwd</i>
851or <i>/etc/shadow</i> that start with <b>$1$</b>.
852If password authentication fails for new accounts or accounts with
853recently changed passwords, but works for old accounts, this is the
854likely culprit.
855
856<p>
857The underlying cause is that some versions of OpenSSL have a crypt(3)
858function that does not understand MD5 passwords, and the link order of
859sshd means that OpenSSL's crypt(3) is used instead of the system's.
860OpensSSH's configure attempts to correct for this but is not always
861successful.
862
863<p>
864There are several possible solutions:
865
866<ul>
867<li>
868<p>
869Enable sshd's built-in support for MD5 passwords at build time.
870
871<blockquote>
872<table border=0 width="800">
873 <tr>
874 <td nowrap bgcolor="#EEEEEE">
875./configure --with-md5-passwords [options]
876 </td>
877 </tr>
878</table>
879</blockquote>
880
881This is safe even if you have both types of encryption as sshd will
882select the correct algorithm for each account automatically.
883
884<li>
885<p>
886If your system has a separate libcrypt library (eg Slackware 7) then you
887can manually add -lcrypt to the LIBS list so it's used instead of
888OpenSSL's:
889
890<blockquote>
891<table border=0 width="800">
892 <tr>
893 <td nowrap bgcolor="#EEEEEE">
894LIBS=-lcrypt ./configure [options]
895 </td>
896 </tr>
897</table>
898</blockquote>
899
900<li>
901<p>
902If your platforms supports PAM, you may configure sshd to use it
903(see <a href= "#3.15" >section 3.15</a>). This will mean that sshd will
904not verify passwords itself but will defer to the configured PAM modules.
905</ul>
906
907<h2><a name= "3.6">3.6 - Configure or sshd(8) complain about lack of RSA or DSA support</a></h2>
908
909<p>
910Ensure that your OpenSSL libraries have been built to include RSA or DSA
911support either internally or through RSAref.
912
913
914<h2><a name= "3.7">3.7 - "scp: command not found" errors</a></h2>
915
916<p>
917<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a>
918must be in the default PATH on both the client and the server. You may
919need to use the <b>--with-default-path</b> option to specify a custom
920path to search on the server. This option replaces the default path,
921so you need to specify all the current directories on your path as well
922as where you have installed scp. For example:
923
924<blockquote>
925<table border=0 width="800">
926 <tr>
927 <td nowrap bgcolor="#EEEEEE">
928$ <b>./configure --with-default-path=/bin:/usr/bin:/usr/local/bin:/path/to/scp</b>
929 </td>
930 </tr>
931</table>
932</blockquote>
933
934<p>
935Note that configuration by the server's admin will take precedence over the
936setting of <b>--with-default-path</b>. This includes resetting PATH in
937<i>/etc/profile</i>, PATH in <i>/etc/environment</i> on AIX, or (for 3.7p1 and
938above) setting PATH or SUPATH in <i>/etc/default/login</i> on Solaris or
939Reliant Unix.
940
941<h2><a name= "3.8">3.8 - Unable to read passphrase</a></h2>
942
943<p>
944Some operating systems set <i>/dev/tty</i> with incorrect modes, causing
945the reading of passwords to fail with the following error:
946
947<blockquote>
948<table border=0 width="800">
949 <tr>
950 <td nowrap bgcolor="#EEEEEE">
951You have no controlling tty. Cannot read passphrase.
952 </td>
953 </tr>
954</table>
955</blockquote>
956
957<p>
958The solution to this is to reset the permissions on <i>/dev/tty</i>
959to mode 0666 and report the error as a bug to your OS vendor.
960
961
962<h2><a name= "3.9">3.9 - 'configure' missing or make fails</a></h2>
963
964<p>
965If there is no 'configure' file in the tar.gz file that you downloaded
966or make fails with "missing separator" errors, you have probably
967downloaded the OpenBSD distribution of OpenSSH and are attempting to
968compile it on another platform. Please refer to the information on the
969<a href="http://www.openssh.org/portable.html">portable version</a>.
970
971
972<h2><a name= "3.10">3.10 - Hangs when exiting ssh</a></h2>
973
974<p>
975OpenSSH may hang when exiting. This can occur when there is an active
976background process. This is known to occur on Linux and HP-UX.
977The problem can be verified by doing the following:
978
979<blockquote>
980<table border=0 width="800">
981 <tr>
982 <td nowrap bgcolor="#EEEEEE">
983$ <b>sleep 20 &amp; exit</b>
984 </td>
985 </tr>
986</table>
987</blockquote>
988
989Try to use this instead:
990<blockquote>
991<table border=0 width="800">
992 <tr>
993 <td nowrap bgcolor="#EEEEEE">
994$ <b>sleep 20 &lt; /dev/null &gt; /dev/null 2&gt;&amp;1 &amp;</b>
995 </td>
996 </tr>
997</table>
998</blockquote>
999
1000<p>
1001A work around for bash users is to place <b>"shopt -s huponexit"</b>
1002in either /etc/bashrc or ~/.bashrc. Otherwise, consult your shell's
1003man page for an option to enable it to send a HUP signal to active
1004jobs when exiting. See <a
1005href="http://bugzilla.mindrot.org/show_bug.cgi?id=52">bug #52</a>
1006for other workarounds.
1007
1008<h2><a name= "3.11">3.11 - Why does ssh hang on exit?</a></h2>
1009
1010<p>
1011When executing
1012<blockquote>
1013<table border=0 width="800">
1014 <tr>
1015 <td nowrap bgcolor="#EEEEEE">
1016$ <b>ssh host command</b>
1017 </td>
1018 </tr>
1019</table>
1020</blockquote>
1021ssh <b>needs</b> to hang, because it needs to wait:
1022<ul>
1023<li>
1024until it can be sure that <code>command</code> does not need
1025more input.
1026<li>
1027until it can be sure that <code>command</code> does not produce
1028more output.
1029<li>
1030until <code>command</code> exits because sshd needs to tell
1031the exit status from <code>command</code> to ssh.
1032</ul>
1033<p>
1034
1035<h2><a name= "3.12">3.12 - I upgraded to OpenSSH 3.1 and X11
1036forwarding stopped working.</a></h2>
1037
1038Starting with OpenSSH 3.1, the sshd x11 forwarding server listens on
1039localhost by default; see the sshd <b>X11UseLocalhost</b> option to
1040revert to prior behaviour if your older X11 clients do not function
1041with this configuration.<p>
1042
1043In general, X11 clients using X11 R6 should work with the default
1044setting. Some vendors, including HP, ship X11 clients with R6
1045and R5 libs, so some clients will work, and others will not work.
1046This is true for HP-UX 11.X.<p>
1047
1048<h2><a name= "3.13">3.13 - I upgraded to OpenSSH 3.8 and some
1049X11 programs stopped working.</a></h2>
1050
1051<p>
1052As documented in the <a href="http://www.openssh.org/txt/release-3.8">3.8 release notes</a>,
1053<code>ssh</code> will now use untrusted X11 cookies by
1054default. The previous behaviour can be restored by setting
1055<b>ForwardX11Trusted yes</b> in <i>ssh_config</i>.
1056
1057<p>
1058Possible symptoms include:<br>
1059<code>BadWindow (invalid Window parameter)<br>
1060BadAccess (attempt to access private resource denied)<br>
1061X Error of failed request: BadAtom (invalid Atom parameter)<br>
1062Major opcode of failed request: 20 (X_GetProperty)<br></code>
1063
1064<h2><a name= "3.14">3.14 - I copied my public key to authorized_keys
1065but public-key authentication still doesn't work.</a></h2>
1066
1067<p>
1068Typically this is caused by the file permissions on $HOME, $HOME/.ssh or
1069$HOME/.ssh/authorized_keys being more permissive than sshd allows by default.
1070
1071<p>
1072In this case, it can be solved by executing the following on the server.
1073<blockquote>
1074<table border=0 width="800">
1075<tr>
1076 <td nowrap bgcolor="#EEEEEE">
1077$ <b>chmod go-w $HOME $HOME/.ssh</b><br>
1078$ <b>chmod 600 $HOME/.ssh/authorized_keys</b>
1079$ <b>chown `whoami` $HOME/.ssh/authorized_keys</b><br>
1080 </td>
1081</tr>
1082</table>
1083</blockquote>
1084
1085<p>
1086If this is not possible for some reason, an alternative is to set
1087<b>StrictModes no</b> in <i>sshd_config</i>, however this is not
1088recommended.
1089
1090<h2><a name= "3.15">3.15 - OpenSSH versions and PAM behaviour.</a></h2>
1091
1092Portable OpenSSH has a configure-time option to enable sshd's use of the
1093<a href="http://www.opengroup.org/onlinepubs/008329799/">PAM</a>
1094(Pluggable Authentication Modules) interface.
1095
1096<blockquote>
1097<table border=0 width="800">
1098 <tr>
1099 <td nowrap bgcolor="#EEEEEE">
1100./configure --with-pam [options]
1101 </td>
1102 </tr>
1103</table>
1104</blockquote>
1105
1106To use PAM at all, this option must be provided at build time.
1107The run-time behaviour when PAM is built in varies with the version of
1108Portable OpenSSH, and on later versions it must also be enabled by setting
1109<b>UsePAM</b> to <b>yes</b> in <i>sshd_config</i>.
1110
1111<p>
1112The behaviour of the relevant authentications options when PAM support is built
1113in is summarised by the following table.
1114
1115<p>
1116<table border="1">
1117 <tr> <th>Version</th> <th>UsePAM</th> <th>PasswordAuthentication</th> <th>ChallengeResponseAuthentication</th> </tr>
1118 <tr>
1119 <td>&lt;=3.6.1p2</td>
1120 <td>Not applicable</td>
1121 <td>Uses PAM</td>
1122 <td>Uses PAM if <b>PAMAuthenticationViaKbdInt</b> is enabled</td>
1123 </tr>
1124 <tr>
1125 <td>3.7p1 - 3.7.1p1</td>
1126 <td>Defaults to <b>yes</b></td>
1127 <td>Does not use PAM</td>
1128 <td>Uses PAM if <b>UsePAM</b> is enabled</td>
1129 </tr>
1130 <tr>
1131 <td>3.7.1p2 - 3.8.1p1</td>
1132 <td>Defaults to <b>no</b></td>
1133 <td>Does not use PAM <a href="#3.15fn1">[1]</a></td>
1134 <td>Uses PAM if <b>UsePAM</b> is enabled</td>
1135 </tr>
1136 <tr>
1137 <td>3.9p1</td>
1138 <td>Defaults to <b>no</b></td>
1139 <td>Uses PAM if <b>UsePAM</b> is enabled</td>
1140 <td>Uses PAM if <b>UsePAM</b> is enabled</td>
1141 </tr>
1142</table>
1143<p>
1144
1145<a name= "3.15fn1">[1]</a> Some vendors, notably Redhat/Fedora, have
1146backported the PasswordAuthentication from 3.9p1 to their 3.8x based
1147packages. If you're using a vendor-supplied package then consult their
1148documentation.
1149
1150<p>
1151OpenSSH Portable's PAM interface still has problems with a few modules,
1152however we hope that this number will reduce in the future. As at the
11533.9p1 release, the known problems are:
1154
1155<ul>
1156 <li>Modules relying on module-private data (eg pam_dhkeys, pam_krb5, AFS)
1157 may fail to correctly establish credentials (bug <a
1158 href="http://bugzilla.mindrot.org/show_bug.cgi?id=688">#688</a>) when
1159 authenticating via <b>ChallengeResponseAuthentication</b>.
1160 <b>PasswordAuthentication</b> with 3.9p1 and above should work.
1161</ul>
1162
1163You can also check <a
1164href="http://bugzilla.mindrot.org/buglist.cgi?product=Portable+OpenSSH&amp;bug_status=RESOLVED&amp;bug_status=NEW&amp;bug_status=ACCEPTED&amp;component=PAM+support"
1165>bugzilla for current PAM issues</a>.
1166
1167<h2><a name= "3.16">3.16 - Why doesn't "w" or "who" on AIX 5.x show users
1168logged in via ssh?</a></h2>
1169
1170Between AIX 4.3.3 and AIX 5.x, the format of the wtmp struct changed. This
1171means that sshd binaries built on AIX 4.x will not correctly write wtmp
1172entries when run on AIX 5.x. This can be fixed by simply recompiling
1173sshd on an AIX 5.x system and using that.
1174
1175<hr>
1176<a href="http://www.openssh.org/index.html"><img height=24 width=24 src="back.gif" border=0 alt=OpenSSH></a>
1177<a href="mailto:www@openbsd.org">www@openbsd.org</a>
1178<br>
1179<small>$OpenBSD: faq.html,v 1.110 2009/11/23 23:38:17 dtucker Exp $</small>
1180
1181</body>
1182</html>