diff options
author | Damien Miller <djm@mindrot.org> | 2000-02-02 20:56:20 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-02-02 20:56:20 +1100 |
commit | 17872527893e68ecab20cd75efab00dcea2b29ea (patch) | |
tree | e8a8980071c2c2b8ba0db827eb5056654c336633 | |
parent | 6552758baeaeaf241a0a6c67e2e0a035d31bdf79 (diff) | |
download | openssh-git-17872527893e68ecab20cd75efab00dcea2b29ea.tar.gz |
- Documentation fixes from HARUYAMA Seigo <haruyama@nt.phys.s.u-tokyo.ac.jp>
- Added URLs to Japanese translations of documents by HARUYAMA Seigo
<haruyama@nt.phys.s.u-tokyo.ac.jp>
-rw-r--r-- | CREDITS | 1 | ||||
-rw-r--r-- | ChangeLog | 3 | ||||
-rw-r--r-- | README | 4 | ||||
-rw-r--r-- | UPGRADING | 17 |
4 files changed, 16 insertions, 9 deletions
@@ -17,6 +17,7 @@ Darren Hall <dhall@virage.org> - AIX patches David Agraz <dagraz@jahoopa.com> - Build fixes David Rankin <drankin@bohemians.lexington.ky.us> - libwrap, AIX, NetBSD fixes Gary E. Miller <gem@rellim.com> - SCO support +HARUYAMA Seigo <haruyama@nt.phys.s.u-tokyo.ac.jp> - Translations & doc fixes Holger Trapp <Holger.Trapp@Informatik.TU-Chemnitz.DE> - KRB4/AFS config patch Jani Hakala <jahakala@cc.jyu.fi> - Patches Jarno Huuskonen <jhuuskon@hytti.uku.fi> - Bugfixes @@ -1,6 +1,9 @@ 20000202 - Fix lastlog code for directory based lastlogs. Fix from Josh Durham <jmd@aoe.vt.edu> + - Documentation fixes from HARUYAMA Seigo <haruyama@nt.phys.s.u-tokyo.ac.jp> + - Added URLs to Japanese translations of documents by HARUYAMA Seigo + <haruyama@nt.phys.s.u-tokyo.ac.jp> 20000201 - Use socket pairs by default (instead of pipes). Prevents race condition @@ -1,3 +1,7 @@ +[ A Japanese translation of this document is available at +[ http://www.unixuser.org/%7Eharuyama/security/openssh/index.html +[ Thanks to HARUYAMA Seigo <haruyama@nt.phys.s.u-tokyo.ac.jp> + This is the port of OpenBSD's excellent OpenSSH to Linux and other Unices. @@ -1,3 +1,7 @@ +[ A Japanese translation of this document is available at +[ http://www.unixuser.org/%7Eharuyama/security/openssh/index.html +[ Thanks to HARUYAMA Seigo <haruyama@nt.phys.s.u-tokyo.ac.jp> + OpenSSH is almost completely compatible with the commercial SSH 1.2.x. There are, however, a few exceptions that you will need to bear in mind while upgrading: @@ -21,7 +25,7 @@ key. Solution: You will need to run the *commercial* version of ssh-keygen on the host's private key: -ssh-keygen -u /etc/ssh/ssh_host_key +ssh-keygen -u -f /etc/ssh/ssh_host_key 3. Incompatible changes to sshd_config format. @@ -78,17 +82,12 @@ users access to the account regardless of the policy specified by not add the "nullok" directive to your PAM configuration file unless you specifically wish to allow empty passwords. -7. Rhosts authentication does not work - -Make sure that ssh is installed with the setuid bit set. Note that the -Makefile does not do this by default. - -8. X11 and/or agent forwarding does not work +7. X11 and/or agent forwarding does not work Check your ssh_config and sshd_config. The default configuration files disable authentication agent and X11 forwarding. -9. ssh takes a long time to connect with Linux/glibc 2.1 +8. ssh takes a long time to connect with Linux/glibc 2.1 The glibc shipped with Redhat 6.1 appears to take a long time to resolve "IPv6 or IPv4" addresses from domain names. This can be kludged around @@ -96,7 +95,7 @@ with the --with-ipv4-default configure option. This instructs OpenSSH to use IPv4-only address resolution. (IPv6 lookups may still be made by specifying the -6 option). -10. Logins from commercial ssh generate the error "Selected cipher type +9. Logins from commercial ssh generate the error "Selected cipher type idea not supported by server" This error is generated when a commercial ssh which has been configured to |