HP-UX Secure Shell A.05.90.009, A.05.90.010, and A.05.90.011 Release Notes

Defects fixed in HP-UX Secure Shell A.05.90.009, A.05.90.010, and
A.05.90.011
Fixed a bug to avoid possible sshd failure when the ndd parameter tcp_recv_hiwater_def is
set to 2GB. This is applicable on 11.31 only.
Fixed a bug to avoid hang during tunnelling while using AES ciphers when client process is
forked using ssh -f option.
Added a compiler option to set the -D flags to enable multithreading.
Removed deprecated ssh_prng_cmds file in install script to avoid file not found error in SW
logs for new SecureShell installations.
Known problems and workarounds
The following are the known problems and workarounds in HP-UX Secure Shell A.05.90:
WARNING! Do not specify user specific information during configuration of host-based
authentication. Host-based authentication supports only authentication of hosts. It does not
allow user-specific authentication. When the user configures the host-based authentication
with the following, # cat /etc/hosts.equivmyhost.mydomain.com specificuser,
it allows the specificuser@myhost.mydomain.com to login to any local account on the
remote machine.
The base code of OpenSSH 5.9p1 supports logging of sftp transactions. LogFacility
and LogLevel options are added to sftp-server as command-line options to log these
transactions. As a result, the following directives are not supported in this release of HP-UX
Secure Shell:
#LogSftp no
#SftpLogFacility AUTH
#SftpLogLevel INFO
The following SMSE behavior is seen in this version of HP-UX Secure Shell:
Audit log messages show repeated entries for a user. This occurs because bad login attempts
are logged in the audit file.
6 HP-UX Secure Shell A.05.90