|Skip Navigation Links|
|Exit Print View|
|System Administration Guide: Security Services Oracle Solaris 10 1/13 Information Library|
The Secure Shell in Oracle Solaris is a fork of the OpenSSH project. Security fixes for vulnerabilities that are discovered in later versions of OpenSSH are integrated into Secure Shell, as are individual bug fixes and features. Internal development continues on the Secure Shell fork.
While Oracle Solaris engineers provide bug fixes to the project, they have also integrated the following features into the Oracle Solaris fork of Secure Shell:
PAM - Secure Shell uses PAM. The OpenSSH UsePAM configuration option is not supported.
Privilege separation - Secure Shell does not use the privilege separation code from the OpenSSH project. Secure Shell separates the processing of auditing, record keeping and re-keying from the processing of the session protocols.
Secure Shell privilege separation code is always on and cannot be switched off. The OpenSSH UsePrivilegeSeparation option is not supported.
Locale - Secure Shell fully supports language negotiation as defined in RFC 4253, Secure Shell Transfer Protocol. After the user logs in, the user's login shell profile can override the Secure Shell negotiated locale settings.
Auditing - Secure Shell is fully integrated into the Oracle Solaris auditing subsystem. For information on auditing, see Part VII, Auditing in Oracle Solaris.
GSS-API support - GSS-API can be used for user authentication and for initial key exchange. The GSS-API is defined in RFC4462, Generic Security Service Application Program Interface.
Proxy commands - Secure Shell provides proxy commands for SOCKS5 and HTTP protocols. For an example, see How to Set Up Default Connections to Hosts Outside a Firewall.
Since the Solaris 9 release, the following specific changes have been introduced to Secure Shell:
Secure Shell is forked from OpenSSH 3.5p1.
The default value of X11Forwarding is yes in the /etc/ssh/sshd_config file.
The following keywords have been introduced:
The GSSAPI keywords enable Secure Shell to use GSS credentials for authentication. The KbdInteractiveAuthentication keyword supports arbitrary prompting and password changing in PAM. For a complete list of keywords and their default values, see Keywords in Secure Shell.
The ARCFOUR and AES128-CTR ciphers are now available. ARCFOUR is also known as RC4. The AES cipher is AES in counter mode.
The sshd daemon uses the variables in /etc/default/login and the login command. The /etc/default/login variables can be overridden by values in the sshd_config file. For more information, see Secure Shell and Login Environment Variables and the sshd_config(4) man page.
The ChrootDirectory option on the server enables the server, once the connection is authenticated, to chroot the connected clients to the directory that the option specifies. This option supports an in-process SFTP server , that is, internal SFTP, whose configurations are simplified by using the ChrootDirectory option.