HP TCP/IP Services for OpenVMS
Release Notes


Previous Contents

3.10.7 SSH Sessions

This section includes restrictions pertaining to SSH sessions.

3.10.8 SSH Messages

This section includes notes and restrictions pertaining to SSH session messages.

3.10.9 SSH Remote Commands

This section includes notes and restrictions pertaining to SSH remote commands.

3.10.10 SSH Batch Mode

This section includes batch mode restrictions.

3.10.11 ls Fails After cd to a Logical Name from a Tru64 UNIX Client

ls can fail when using sftp cd to a logical name from a Tru64 UNIX client.

For a workaround, try the following:

  1. cd to the path for the directory in UNIX format, e.g., instead of: cd tcpip$ssh_home , use cd /sys$sysdence/tcpip$ssh .
  2. Perform the ls specifiying the logical name in the path, e.g., ls /tcpip$ssh_home .

3.10.12 SSH X11 Port Forwarding

This section includes X11 port forwarding restrictions and problems.

3.10.13 SSH File Transfer (All File Sizes)

This section includes SSH restrictions pertaining to file transfer operations.

3.10.14 SSH Transferring Large Files

This section includes restrictions pertaining to transferring large files:

3.10.15 SSH Server Signals Internal Credentials Cache Error

If an SSH client attempts to use gssapi-with-mic authentication to the TCP/IP Services for OpenVMS SSH server on a server host that is running Kerberos V2.1 and the SSH client user's TGT is forwardable (a kinit -f has been done) and the GssapiDelegateCredentials flag is set then the ssh server will signal the following error in the server log:


Internal credentials cache error 

This error text may appear on the SSH client user's screen, depending on configuration.

This can be worked around in either of the following ways:

  1. Upgrade to Kerberos V3.0 on the SSH server host.
  2. Use the kinit without the -f flag on the SSH client.
  3. Turn the GssapiDelegateCredentials configuration switch off on the SSH client.

Because forwarding of client credentials with gssapi-with-mic authentication to the OpenVMS SSH server is not supported setting GssapiDelegateCredentials is not necessary.

3.10.16 SFTP Generates Audit Warnings with Class Device

This restriction applies only to those using AUDIT with class device as in the following command:


$ SET AUDIT/ALARM/ENABLE=ACCESS=ALL/CLASS=DEVICE 

If the SFTP server generates audit warnings for a logical IO to a mailbox when the SFTP user exits SFTP, perform the following step to prevent this from occurring:


$ DEFINE/SYSTEM TCPIP$SSH_SERVER_WAIT_FOR_CHILD 1 

3.10.17 BIND Resolver Diagnostics Creates an SSH Packet Corruption

When you turn on BIND Resolver Diagnostics using either of the following methods, you can create an SSH packet corruption:

3.11 TCPDUMP Restrictions

TCPDUMP works the same way on OpenVMS as it does on UNIX systems, with the following restrictions:

3.12 TCP/IP Management Command Restrictions

The following restrictions apply to the TCP/IP management commands:

For more information on TCP/IP Services management commands, refer to the HP TCP/IP Services for OpenVMS Management Command Reference guide.


Previous Next Contents