HP-UX Secure Shell A.05.30.008 and A.05.30.009 Release Notes

#SftpUmask
#SftpPermitChmod yes
#SftpPermitChown yes
This patch supersedes the sftplogging patch for HP-UX Secure Shell versions A.04.50 and
higher.
Defects Fixed in OpenSSH5.3p1
The HP-UX Secure Shell version A.05.30 is based on OpenSSH5.3p1 and include the defect fixes
mentioned in Table 1-2.
Table 1-2 Defects Fixed in OpenSSH5.3p1
Defect FixDefect Identifier
Background Information: SSHFS causes link() to return ENOSYS, if someone writes
the necessary code to interface the sshfs userspace program(s) with HP-UX kernel,
SSHFS works on HP-UX.
Accept ENOSYS as a fallback error when attempting atomic rename().
Bugzilla #1535
Background Information: Search the path for the krb5-config file if the prefix was
not specified.
Fix detection of krb5-config.
Bugzilla #1639
Fix test for server-assigned remote forwarding port for non-root users.Bugzilla #1578
Documentation errors are fixed.
OpenSSH 5.3p1 also includes fixes for some security vulnerabilities.
For more information on these defect fixes, see the Bugzilla Website at: http://bugzilla.mindrot.org.
Defects Fixed in HP-UX Secure Shell A.05.30
HP-UX Secure Shell versions A.05.30. include defect fixes and new features.
For more information on these defect fixes, see the Bugzilla Website at: http://bugzilla.mindrot.org.
Known Problems and Workarounds
Following are the known problems and workarounds in HP-UX Secure Shell A.05.30:
Do NOT specify user specific information during configuration of host-based authentication.
Host-based authentication supports only authentication of hosts. It does not allow
user-specific authentication. When, user configures the host-based authentication with the
following, # cat /etc/hosts.equivmyhost.mydomain.com specificuser, it
allows the specificuser@myhost.mydomain.com to login into any local account on the
remote machine.
The base code of OpenSSH 5.3p1 and above supports logging of sftp transactions.
LogFacility and LogLevel options are added to sftp-server as command-line options
to log these transactions. As a result, the following directives are not supported in this release
of HP-UX Secure Shell:
#LogSftp no
#SftpLogFacility AUTH
#SftpLogLevel INFO
The following SMSE behavior is seen in this version of HP-UX Secure Shell:
Audit log messages show repeated entries for a user. This occurs because bad login attempts
are logged in the audit file. For example, a user trying Public key authentication with bad
6 HP-UX Secure Shell A.05.30