123 lines
4.9 KiB
Plaintext
123 lines
4.9 KiB
Plaintext
[ A Japanese translation of this document is available at
|
|
[ http://www.unixuser.org/%7Eharuyama/security/openssh/index.html
|
|
[ Thanks to HARUYAMA Seigo <haruyama@nt.phys.s.u-tokyo.ac.jp>
|
|
|
|
OpenSSH is almost completely compatible with the commercial SSH 1.2.x.
|
|
There are, however, a few exceptions that you will need to bear in
|
|
mind while upgrading:
|
|
|
|
1. OpenSSH does not support any patented transport algorithms.
|
|
|
|
Only 3DES and Blowfish can be selected. This difference may manifest
|
|
itself in the ssh command refusing to read its config files.
|
|
|
|
Solution: Edit /etc/ssh/ssh_config and select a different "Cipher"
|
|
option ("3des" or "blowfish").
|
|
|
|
2. Old versions of commercial SSH encrypt host keys with IDEA
|
|
|
|
The old versions of SSH used a patented algorithm to encrypt their
|
|
/etc/ssh/ssh_host_key
|
|
|
|
This problem will manifest as sshd not being able to read its host
|
|
key.
|
|
|
|
Solution: You will need to run the *commercial* version of ssh-keygen
|
|
on the host's private key:
|
|
|
|
ssh-keygen -u -f /etc/ssh/ssh_host_key
|
|
|
|
3. Incompatible changes to sshd_config format.
|
|
|
|
OpenSSH extends the sshd_config file format in a number of ways. There
|
|
is currently one change which is incompatible with the old.
|
|
|
|
Commercial SSH controlled logging using the "QuietMode" and
|
|
"FascistLogging" directives. OpenSSH introduces a more general set of
|
|
logging options "SyslogFacility" and "LogLevel". See the sshd manual
|
|
page for details.
|
|
|
|
4. Warning messages about key lengths
|
|
|
|
Commercial SSH's ssh-keygen program contained a bug which caused it to
|
|
occasionally generate RSA keys which had their Most Significant Bit
|
|
(MSB) unset. Such keys were advertised as being full-length, but are
|
|
actually only half as secure.
|
|
|
|
OpenSSH will print warning messages when it encounters such keys. To
|
|
rid yourself of these message, edit you known_hosts files and replace
|
|
the incorrect key length (usually "1024") with the correct key length
|
|
(usually "1023").
|
|
|
|
5. Spurious PAM authentication messages in logfiles
|
|
|
|
OpenSSH will generate spurious authentication failures at every login,
|
|
similar to "authentication failure; (uid=0) -> root for sshd service".
|
|
These are generated because OpenSSH first tries to determine whether a
|
|
user needs authentication to login (e.g. empty password). Unfortunatly
|
|
PAM likes to log all authentication events, this one included.
|
|
|
|
If it annoys you too much, set "PermitEmptyPasswords no" in
|
|
sshd_config. This will quiet the error message at the expense of
|
|
disabling logins to accounts with no password set. This is the
|
|
default if you use the supplied sshd_config file.
|
|
|
|
6. Empty passwords not allowed with PAM authentication
|
|
|
|
To enable empty passwords with a version of OpenSSH built with PAM you
|
|
must add the flag "nullok" to the end of the password checking module
|
|
in the /etc/pam.d/sshd file. For example:
|
|
|
|
auth required/lib/security/pam_unix.so shadow nodelay nullok
|
|
|
|
This must be done in addtion to setting "PermitEmptyPasswords yes"
|
|
in the sshd_config file.
|
|
|
|
There is one caveat when using empty passwords with PAM
|
|
authentication: PAM will allow _any_ password when authenticating
|
|
an account with an empty password. This breaks the check that sshd
|
|
uses to determined whether an account has no password set and grant
|
|
users access to the account regardless of the policy specified by
|
|
"PermitEmptyPasswords". For this reason, it is recommended that you do
|
|
not add the "nullok" directive to your PAM configuration file unless
|
|
you specifically wish to allow empty passwords.
|
|
|
|
7. X11 and/or agent forwarding does not work
|
|
|
|
Check your ssh_config and sshd_config. The default configuration files
|
|
disable authentication agent and X11 forwarding.
|
|
|
|
8. ssh takes a long time to connect with Linux/glibc 2.1
|
|
|
|
The glibc shipped with Redhat 6.1 appears to take a long time to resolve
|
|
"IPv6 or IPv4" addresses from domain names. This can be kludged around
|
|
with the --with-ipv4-default configure option. This instructs OpenSSH to
|
|
use IPv4-only address resolution. (IPv6 lookups may still be made by
|
|
specifying the -6 option).
|
|
|
|
9. Logins from commercial ssh generate the error "Selected cipher type
|
|
idea not supported by server"
|
|
|
|
This error is generated when a commercial ssh which has been configured to
|
|
use the 'idea' cipher attempts to connect to an OpenSSH server. To rectify
|
|
this, select a different cipher in ssh_config or ~/.ssh/config (3des for
|
|
security or blowfish for speed).
|
|
|
|
10. "can't locate module net-pf-10" messages in log under Linux
|
|
|
|
The Linux kernel is looking (via modprobe) for protocol family 10 (IPv6).
|
|
Either 1. load the appropriate kernel module, 2. enter the correct alias
|
|
in /etc/modules.conf or 3. disable IPv6 in /etc/modules.conf.
|
|
|
|
For some silly reason /etc/modules.conf may also be named /etc/conf.modules
|
|
|
|
11. Password authentication doesn't work on Slackware 7.0
|
|
|
|
Configure OpenSSH with --with-md5-passwords
|
|
|
|
12. ./configure or sshd complain about lack of RSA support
|
|
|
|
Ensure that your OpenSSL libraries have been built to include RSA support
|
|
either internally or through RSAref.
|
|
|