HP-UX Secure Shell A.05.10.006,A.05.10.007, and A.05.10.008 Release Notes HP-UX 11i v1, 11i v2, and 11i v3

Defects Fixed in HP-UX Secure Shell A.05.10
HP-UX Secure Shell versions A.05.10.006, A.05.10.007, and A.05.10.008 include the following
defect fixes:
QXCR1000828125 Enhancement to include a global umask setting. Default umask value for
sshd can be set via changing SSHD_UMASK variable in
/etc/rc.config.d/sshd.
No QXCR Enhancement to add TcpRcvBuf directive in sshd_config. Default
TcpRcvBuf for sshd is 128K bytes.
No QXCR
Cannot get IP address for X11 DISPLAY because gethostbyname() in
sshd fails. libwrap.a static library overrides the
"yp_get_default_domain" API of libnsl.so. Built a new libwrap.a
which use the "yp_get_default_domain" of libnsl.so.
Known Problems and Workarounds
Following are the known problems and workarounds in HP-UX Secure Shell A.05.10:
Do NOT specify user specific information during configuration of host-based authentication.
Host-based authentication supports only authentication of hosts. It does not allow
user-specific authentication. When, user configures the host-based authentication with the
following, # cat /etc/hosts.equiv myhost.mydomain.com specificuser, it
allows the specificuser@myhost.mydomain.com to login into any local account on the
remote machine.
The base code of OpenSSH 5.1p1 and above supports logging of sftp transactions.
LogFacility and LogLevel options are added to sftp-server as command-line options
to log these transactions. As a result, the following directives are not supported in this release
of HP-UX Secure Shell:
#LogSftp no
#SftpLogFacility AUTH
#SftpLogLevel INFO
The following SMSE behavior is seen in this version of HP-UX Secure Shell:
Audit log messages show repeated entries for a user. This occurs because bad login attempts
are logged in the audit file. For example, a user trying Public key authentication with bad
RSA and DSA keys results in a bad login attempt for each key type. In such a scenario, the
audit log has the following entries:
SELF-AUDITING TEXT: User= root uid=0 ssh authentication method PUBKEY - failed
SELF-AUDITING TEXT: User= root uid=0 ssh authentication success - user logged in
SELF-AUDITING TEXT: User= root uid=0 ssh session open
For more information on HP-UX SMSE, see http://www.docs.hp.com/en/
internet.html#Security%20Containment
HP-UX Secure Shell user authentication using public-key fails in a server environment if
UsePAM is set to YES and pam.conf is set to PAM_LDAP.
Workaround: HP recommends the PAM_AUTHZ mechanism for HP-UX Secure Shell
environments that use public-key authentication with PAM_LDAP-based account
management.
On some systems, the following messages appears in the syslog.log file, when a user
logs out of a Secure Shell session:
pam_setcred: error Authentication failed
pam_setcred: error Permission denied
These messages appears only when the daemon is running in debug mode. These messages
are not relevant to (and does not affect) HP-UX Secure Shell operations. The PAM function
Defects Fixed in HP-UX Secure Shell A.05.10 9