PuTTY semi-bug ssh2-password-expiry
Home
|
FAQ
|
Feedback
|
Licence
|
Updates
|
Mirrors
|
Keys
|
Links
|
Team
Download:
Stable
·
Snapshot
|
Docs
|
Privacy
|
Changes
|
Wishlist
summary: Support for SSH-2 password expiry mechanisms
class: semi-bug: This might or might not be a bug, depending on your precise definition of what a bug is.
difficulty: fun: Just needs tuits, and not many of them.
priority: high: This should be fixed in the next release.
fixed-in: r6445 041e93f5089d563233e031b7624fad99ec9ba49d 2005-11-05 (0.59)
PuTTY doesn't currently support the password expiry mechanisms
represented in draft-ietf-secsh-userauth-16
by
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ
et al.
Originally we weren't aware of any SSH servers which sent this
message. The following have since come to light:
- Old versions of the
OpenSSH password
expiry patches used to use this mechanism, but I believe that
newer versions (including the version that was incorporated in OpenSSH
3.8) don't.
- VanDyke's Windows server, VShell (according to a message on IETF secsh)
- At least some versions of ssh.com on OpenVMS, e.g.,
SSH-2.0-3.2.0 SSH Secure Shell OpenVMS V5.5
Update, 2005-11-05: this is now implemented, and partially
tested.
Update, 2006-09-06: the UI has been slightly modified to
accommodate Cisco servers, which allow a password change to be requested
by entering a blank password.
If you want to comment on this web site, see the
Feedback page.
(last revision of this bug record was at 2016-12-27 11:40:21 +0000)