<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to support-requests</title><link>https://sourceforge.net/p/openssh-aix/support-requests/</link><description>Recent changes to support-requests</description><atom:link href="https://sourceforge.net/p/openssh-aix/support-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Thu, 29 Jan 2009 21:40:57 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/openssh-aix/support-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>chroot() in 5.0_r1</title><link>https://sourceforge.net/p/openssh-aix/support-requests/24/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Trying to jail user(s) into their home directories.  Seem to have everything set up properly, and can manually chroot from command line.  In sshd_config I've got&lt;/p&gt;
&lt;p&gt;Match user dj999999&lt;br /&gt;
ChrootDirectory /home/chroot&lt;/p&gt;
&lt;p&gt;But when the user (dj999999) attempts an ssh login, 'sshd -dd' shows the following before the conenction is torn down:&lt;/p&gt;
&lt;p&gt;debug2: User child is on pid 196688&lt;br /&gt;
debug1: PAM: establishing credentials&lt;br /&gt;
debug1: TMP*****************:/home/chroot&lt;br /&gt;
debug1: CHROOT_PATH*********:/home/chroot&lt;br /&gt;
debug1: pw-&amp;gt;pw_name:dj999999::pw-&amp;gt;pw_dir:/home/chroot/./home/dj999999/&lt;br /&gt;
chroot("/home/chroot"): Operation not permitted.&lt;br /&gt;
debug1: do_cleanup&lt;br /&gt;
debug1: do_cleanup&lt;br /&gt;
debug1: PAM: cleanup&lt;br /&gt;
debug1: PAM: deleting credentials&lt;br /&gt;
debug1: PAM: closing session&lt;br /&gt;
debug1: audit event euid 0 user dj999999 event 12 (SSH_connabndn)&lt;br /&gt;
debug1: Return Val-1 for auditproc:0&lt;/p&gt;
&lt;p&gt;Is chroot not implemented (yet)?  If not, when?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Doug Eckert</dc:creator><pubDate>Thu, 29 Jan 2009 21:40:57 -0000</pubDate><guid>https://sourceforge.netaa752215886b6336e40450fef5912b8387bb9eef</guid></item><item><title>PAM support</title><link>https://sourceforge.net/p/openssh-aix/support-requests/23/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Is that possible to have PAM support enabled when build the package?&lt;/p&gt;
&lt;p&gt;Thanks!!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Patrick Beaudoin</dc:creator><pubDate>Mon, 08 Sep 2008 14:32:11 -0000</pubDate><guid>https://sourceforge.netcb4d458b74a754ec4520890acc9cab5aeb53f877</guid></item><item><title>LDAP support</title><link>https://sourceforge.net/p/openssh-aix/support-requests/22/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Could you provide package OpenSSH with patch LPK (Ldap Public Key).&lt;/p&gt;
&lt;p&gt;I need to store ssh key on a container in the directory ldap.&lt;/p&gt;
&lt;p&gt;Thanks in advance for your help.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Karim Ben</dc:creator><pubDate>Mon, 30 Jun 2008 15:15:58 -0000</pubDate><guid>https://sourceforge.nete5ca92a248e619fa0c1b013f94396e06666a1d20</guid></item><item><title>Session closed from 'root' even success authenticated</title><link>https://sourceforge.net/p/openssh-aix/support-requests/21/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I have installed openssh 4.7 and openssl 0.9.8f as suggested by IBM on both AIX5.2ML8 and AIX5.3TL5.&lt;/p&gt;
&lt;p&gt;Installation for both OS release has no issue.&lt;/p&gt;
&lt;p&gt;However, for for AIX 5.2, when I directly open a session using 'root' account, the session closes even after successful authenticated, using password or public key.&lt;/p&gt;
&lt;p&gt;Pls see below debug output.&lt;/p&gt;
&lt;p&gt;OpenSSH_4.7p1, OpenSSL 0.9.8f 11 Oct 2007&lt;br /&gt;
debug1: Reading configuration data /etc/ssh/ssh_config&lt;br /&gt;
debug1: Failed dlopen: /usr/krb5/lib/libkrb5.a(libkrb5.a.so):   0509-022 Cannot load module /usr/krb5/lib/libkrb5.a(libkrb5.a.so).&lt;br /&gt;
0509-026 System error: A file or directory in the path name does not exist.&lt;/p&gt;
&lt;p&gt;debug1: Error loading Kerberos, disabling Kerberos auth.&lt;br /&gt;
debug2: ssh_connect: needpriv 0&lt;br /&gt;
debug1: Connecting to tla2 [10.30.14.102] port 22.&lt;br /&gt;
debug1: Connection established.&lt;br /&gt;
debug1: permanently_set_uid: 0/0&lt;br /&gt;
debug1: identity file /.ssh/identity type -1&lt;br /&gt;
debug3: Not a RSA1 key file /.ssh/id_rsa.&lt;br /&gt;
debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;br /&gt;
debug3: key_read: missing keytype&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug2: key_type_from_name: unknown key type '-----END'&lt;br /&gt;
debug3: key_read: missing keytype&lt;br /&gt;
debug1: identity file /.ssh/id_rsa type 1&lt;br /&gt;
debug3: Not a RSA1 key file /.ssh/id_dsa.&lt;br /&gt;
debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;br /&gt;
debug3: key_read: missing keytype&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug3: key_read: missing whitespace&lt;br /&gt;
debug2: key_type_from_name: unknown key type '-----END'&lt;br /&gt;
debug3: key_read: missing keytype&lt;br /&gt;
debug1: identity file /.ssh/id_dsa type 2&lt;br /&gt;
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7&lt;br /&gt;
debug1: match: OpenSSH_4.7 pat OpenSSH*&lt;br /&gt;
debug1: Enabling compatibility mode for protocol 2.0&lt;br /&gt;
debug1: Local version string SSH-2.0-OpenSSH_4.7&lt;br /&gt;
debug2: fd 4 setting O_NONBLOCK&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT sent&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT received&lt;br /&gt;
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;br /&gt;
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;br /&gt;
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;br /&gt;
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;br /&gt;
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;br /&gt;
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;br /&gt;
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;br /&gt;
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;br /&gt;
debug2: kex_parse_kexinit:&lt;br /&gt;
debug2: kex_parse_kexinit:&lt;br /&gt;
debug2: kex_parse_kexinit: first_kex_follows 0&lt;br /&gt;
debug2: kex_parse_kexinit: reserved 0&lt;br /&gt;
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;br /&gt;
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;br /&gt;
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;br /&gt;
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;br /&gt;
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;br /&gt;
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;br /&gt;
debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;br /&gt;
debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;br /&gt;
debug2: kex_parse_kexinit:&lt;br /&gt;
debug2: kex_parse_kexinit:&lt;br /&gt;
debug2: kex_parse_kexinit: first_kex_follows 0&lt;br /&gt;
debug2: kex_parse_kexinit: reserved 0&lt;br /&gt;
debug2: mac_setup: found hmac-md5&lt;br /&gt;
debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;br /&gt;
debug2: mac_setup: found hmac-md5&lt;br /&gt;
debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;br /&gt;
debug2: dh_gen_key: priv key bits set: 141/256&lt;br /&gt;
debug2: bits set: 503/1024&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;br /&gt;
debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;br /&gt;
debug3: check_host_in_hostfile: match line 116&lt;br /&gt;
debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;br /&gt;
debug3: check_host_in_hostfile: match line 116&lt;br /&gt;
debug1: Host 'tla2' is known and matches the RSA host key.&lt;br /&gt;
debug1: Found key in /.ssh/known_hosts:116&lt;br /&gt;
debug2: bits set: 525/1024&lt;br /&gt;
debug1: ssh_rsa_verify: signature correct&lt;br /&gt;
debug2: set_newkeys: mode 1&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS sent&lt;br /&gt;
debug1: expecting SSH2_MSG_NEWKEYS&lt;br /&gt;
debug2: set_newkeys: mode 0&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS received&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;br /&gt;
debug2: service_accept: ssh-userauth&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;br /&gt;
debug2: key: /.ssh/identity (0)&lt;br /&gt;
debug2: key: /.ssh/id_rsa (20044d38)&lt;br /&gt;
debug2: key: /.ssh/id_dsa (20044d58)&lt;br /&gt;
debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;br /&gt;
debug3: start over, passed a different list publickey,password,keyboard-interactive&lt;br /&gt;
debug3: preferred publickey,keyboard-interactive,password&lt;br /&gt;
debug3: authmethod_lookup publickey&lt;br /&gt;
debug3: remaining preferred: keyboard-interactive,password&lt;br /&gt;
debug3: authmethod_is_enabled publickey&lt;br /&gt;
debug1: Next authentication method: publickey&lt;br /&gt;
debug1: Trying private key: /.ssh/identity&lt;br /&gt;
debug3: no such identity: /.ssh/identity&lt;br /&gt;
debug1: Offering public key: /.ssh/id_rsa&lt;br /&gt;
debug3: send_pubkey_test&lt;br /&gt;
debug2: we sent a publickey packet, wait for reply&lt;br /&gt;
debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;br /&gt;
debug1: Offering public key: /.ssh/id_dsa&lt;br /&gt;
debug3: send_pubkey_test&lt;br /&gt;
debug2: we sent a publickey packet, wait for reply&lt;br /&gt;
debug1: Server accepts key: pkalg ssh-dss blen 434&lt;br /&gt;
debug2: input_userauth_pk_ok: fp 65:bb:84:06:53:eb:57:6a:85:e2:a3:b8:d4:38:b2:a7&lt;br /&gt;
debug3: sign_and_send_pubkey&lt;br /&gt;
debug1: read PEM private key done: type DSA&lt;br /&gt;
debug1: Authentication succeeded (publickey).&lt;br /&gt;
debug1: channel 0: new [client-session]&lt;br /&gt;
debug3: ssh_session2_open: channel_new: 0&lt;br /&gt;
debug2: channel 0: send open&lt;br /&gt;
debug1: Entering interactive session.&lt;br /&gt;
debug1: channel 0: free: client-session, nchannels 1&lt;br /&gt;
debug3: channel 0: status: The following connections are open:&lt;br /&gt;
#0 client-session (t3 r-1 i0/0 o0/0 fd 5/6 cfd -1)&lt;/p&gt;
&lt;p&gt;debug3: channel 0: close_fds r 5 w 6 e 7 c -1&lt;br /&gt;
Connection to tla2 closed by remote host.&lt;br /&gt;
Connection to tla2 closed.&lt;br /&gt;
debug1: Transferred: stdin 0, stdout 0, stderr 71 bytes in 0.0 seconds&lt;br /&gt;
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 11957.3&lt;br /&gt;
debug1: Exit status -1&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Wed, 28 May 2008 13:55:10 -0000</pubDate><guid>https://sourceforge.nete697a747e1fc3e8c45b6ffe84cf6e0112d50cc26</guid></item><item><title>Security vulnerability - X11 forwarding</title><link>https://sourceforge.net/p/openssh-aix/support-requests/20/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;A CVE for OpenSSH was released last week forcing the OpenSSH community to release version 5.0 to address this vulnerability.  There are many organizations taking this vulnerability seriously.  What is the plan for releasing the new version to fix this vulnerability?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ken Robinson</dc:creator><pubDate>Thu, 03 Apr 2008 23:18:54 -0000</pubDate><guid>https://sourceforge.net0e06c887a958b62cba16df2fab76c9f12f3a1293</guid></item><item><title>Installation problem around openssl</title><link>https://sourceforge.net/p/openssh-aix/support-requests/19/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I'm trying to install the instllp 4.5 openssh package, but I'm getting a failure on the installed version of openssl.&lt;/p&gt;
&lt;p&gt;I have openssl v0.9.7 installed:&lt;/p&gt;
&lt;p&gt;rpm -qa | grep -i open&lt;br /&gt;
openssl-0.9.7l-2&lt;/p&gt;
&lt;p&gt;# oslevel -r&lt;br /&gt;
5300-06&lt;/p&gt;
&lt;p&gt;But the installp fails:&lt;/p&gt;
&lt;p&gt;FAILURES&lt;br /&gt;
--------&lt;br /&gt;
Filesets listed in this section failed pre-installation verification&lt;br /&gt;
and will not be installed.&lt;/p&gt;
&lt;p&gt;Requisite Failures&lt;br /&gt;
------------------&lt;br /&gt;
SELECTED FILESETS:  The following is a list of filesets that you asked to&lt;br /&gt;
install.  They cannot be installed until all of their requisite filesets&lt;br /&gt;
are also installed.  See subsequent lists for details of requisites.&lt;/p&gt;
&lt;p&gt;openssh.base.server 4.5.0.5301            # Open Secure Shell Server&lt;/p&gt;
&lt;p&gt;MISSING REQUISITES:  The following filesets are required by one or more&lt;br /&gt;
of the selected filesets listed above.  They are not currently installed&lt;br /&gt;
and could not be found on the installation media.&lt;/p&gt;
&lt;p&gt;openssl.base 0.9.8.4                      # Fileset Update&lt;/p&gt;
&lt;p&gt;&amp;lt;&amp;lt; End of Failure Section &amp;gt;&amp;gt;&lt;/p&gt;
&lt;p&gt;SUCCESSES&lt;br /&gt;
---------&lt;br /&gt;
Filesets listed in this section passed pre-installation verification&lt;br /&gt;
and will be installed.&lt;/p&gt;
&lt;p&gt;Selected Filesets&lt;br /&gt;
-----------------&lt;br /&gt;
openssh.base.client 4.5.0.5301              # Open Secure Shell Commands&lt;br /&gt;
openssh.license 4.5.0.5301                  # Open Secure Shell License&lt;br /&gt;
openssh.man.en_US 4.5.0.5301                # Open Secure Shell Documentat...&lt;br /&gt;
openssh.msg.en_US 4.5.0.5301                # Open Secure Shell Messages -...&lt;/p&gt;
&lt;p&gt;&amp;lt;&amp;lt; End of Success Section &amp;gt;&amp;gt;&lt;/p&gt;
&lt;p&gt;FILESET STATISTICS&lt;br /&gt;
------------------&lt;br /&gt;
5  Selected to be installed, of which:&lt;br /&gt;
4  Passed pre-installation verification&lt;br /&gt;
1  FAILED pre-installation verification&lt;br /&gt;
----&lt;br /&gt;
4  Total to be installed&lt;/p&gt;
&lt;p&gt;I think I don't want to change the ssl version installed, because it will break some other dependencies (python, for one).&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">ewertman</dc:creator><pubDate>Mon, 17 Dec 2007 16:20:38 -0000</pubDate><guid>https://sourceforge.netb044e33a03961284d9d845b00b2da8f5e2865311</guid></item><item><title>Need more than 100 LocalForward entries</title><link>https://sourceforge.net/p/openssh-aix/support-requests/18/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Received "too many local forwards (max 100)".  We have a large number of systems in an isolated network and need to have more than 100 LocalForward entries.  Please recompile to allow 500 LocalForward entries.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Richard Ross</dc:creator><pubDate>Thu, 27 Sep 2007 18:22:47 -0000</pubDate><guid>https://sourceforge.net0e2abf12563babbe878ba0d8e7d77260fcadf9d7</guid></item><item><title>Archive Naming</title><link>https://sourceforge.net/p/openssh-aix/support-requests/17/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Thanks for fixing the -A (agent forwarding) issue on 5.2.&lt;/p&gt;
&lt;p&gt;Anyway, I would appreciate very much if the openssh release archives were named according to some scheme.&lt;/p&gt;
&lt;p&gt;For now it is most confusing and releases cannot be told apart:&lt;/p&gt;
&lt;p&gt;current is openssh-4.3p2_r2_52.tar.Z&lt;br /&gt;
last was openssh-4.3p2-52-r2.tar.Z&lt;/p&gt;
&lt;p&gt;I see that the "4.3p2" part comes with the source but something like, say, adding 1 to the r-Part with every new Release would be extremely helpful. Likewise, adding 1 to the Fileset Level would allow the user to identify, which release he has got installed:&lt;/p&gt;
&lt;p&gt;Fileset                      Level  State  Type  Description (Uninstaller)&lt;br /&gt;
----------------------------------------------------------------------------&lt;br /&gt;
openssh.base.client     4.3.0.5201    C     F    Open Secure Shell Commands&lt;br /&gt;
openssh.base.server     4.3.0.5201    C     F    Open Secure Shell Server&lt;br /&gt;
openssh.license         4.3.0.5201    C     F    Open Secure Shell License&lt;br /&gt;
openssh.man.en_US       4.3.0.5201    C     F    Open Secure Shell&lt;br /&gt;
Documentation - U.S. English&lt;br /&gt;
openssh.msg.en_US       4.3.0.5201    C     F    Open Secure Shell Messages -&lt;br /&gt;
U.S. English&lt;/p&gt;
&lt;p&gt;Thanks and Best Regards,&lt;br /&gt;
jgann&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">jgann</dc:creator><pubDate>Thu, 21 Jun 2007 14:14:36 -0000</pubDate><guid>https://sourceforge.net03c59b130c99fc53f4e603e59b0c2324a9b92e52</guid></item><item><title>OpenSSH 4.6p1</title><link>https://sourceforge.net/p/openssh-aix/support-requests/16/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello, I work for IBM as an FTSS for System p. My customer, AT&amp;amp;T, is looking for the latest compiled version of OPENSSH (v4.6p1 or v4.6) for AIX v5.1, 5.2, &amp;amp; 5.3.  Can you please let me know when this will be provided?  It appears that you are several versions downlevel and there is quite a bit more functionality provided in the current version of OpenSSH. Please respond to this e-mail: acfowler@us.ibm.com&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Mon, 21 May 2007 18:54:40 -0000</pubDate><guid>https://sourceforge.net76317db0ab6bc37552eab4acf8a3d621200ac775</guid></item><item><title>ssh login freezes; sshd setsid error</title><link>https://sourceforge.net/p/openssh-aix/support-requests/15/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I have installed openssh-4.3p2_53.tar.Z on AIX 5.3 (no&lt;br /&gt;
ML). When connecting using SSH, I enter the&lt;br /&gt;
username/password, then the connection freezes. &lt;/p&gt;
&lt;p&gt;The last messages on the ssh debug are:&lt;/p&gt;
&lt;p&gt;debug1: Authentication succeeded (password).&lt;br /&gt;
debug1: channel 0: new [client-session]&lt;br /&gt;
debug1: Entering interactive session.&lt;br /&gt;
debug1: channel 0: request pty-req&lt;br /&gt;
debug1: channel 0: request shell&lt;br /&gt;
debug1: channel 0: open confirm rwindow 0 rmax 32768&lt;/p&gt;
&lt;p&gt;The last on sshd debug are:&lt;/p&gt;
&lt;p&gt;debug3: tty_parse_modes: 91 1&lt;br /&gt;
debug3: tty_parse_modes: 92 0&lt;br /&gt;
debug3: tty_parse_modes: 93 0&lt;br /&gt;
debug1: server_input_channel_req: channel 0 request&lt;br /&gt;
shell reply 0&lt;br /&gt;
debug1: session_by_channel: session 0 channel 0&lt;br /&gt;
debug1: session_input_channel_req: session 0 req shell&lt;br /&gt;
debug2: fd 3 setting TCP_NODELAY&lt;br /&gt;
debug2: channel 0: rfd 8 isatty&lt;br /&gt;
debug2: fd 8 setting O_NONBLOCK&lt;br /&gt;
debug3: fd 7 is O_NONBLOCK&lt;br /&gt;
setsid: Operation not permitted.&lt;/p&gt;
&lt;p&gt;I'd be grateful for any advice.&lt;/p&gt;
&lt;p&gt;Thank you&lt;br /&gt;
Dan.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Bryan</dc:creator><pubDate>Mon, 11 Sep 2006 16:20:24 -0000</pubDate><guid>https://sourceforge.net305f8a76806ed4cfd4c4193cd2ed7506f44506f8</guid></item></channel></rss>