PuTTY semi-bug ssh2-password-expiry
Home
 |
FAQ
 |
Feedback
 |
Licence
 |
Updates
 |
Mirrors
 |
Keys
 |
Links
 |
Team
Download:
Stable
 ·
Snapshot
 |
Docs
 |
Privacy
 |
Changes
 |
Wishlist
summary: Support for SSH-2 password expiry mechanisms
class: semi-bug: This might or might not be a bug, depending on your precise definition of what a bug is.
difficulty: fun: Just needs tuits, and not many of them.
priority: high: This should be fixed in the next release.
fixed-in: r6445 041e93f5089d563233e031b7624fad99ec9ba49d 2005-11-05 (0.59)
PuTTY doesn't currently support the password expiry mechanisms
represented in draft-ietf-secsh-userauth-16 by
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ et al.
Originally we weren't aware of any SSH servers which sent this
message. The following have since come to light:
- Old versions of the 
OpenSSH password
expiry patches used to use this mechanism, but I believe that
newer versions (including the version that was incorporated in OpenSSH
3.8) don't.
- VanDyke's Windows server, VShell (according to a message on IETF secsh)
- At least some versions of ssh.com on OpenVMS, e.g.,
 SSH-2.0-3.2.0 SSH Secure Shell OpenVMS V5.5
Update, 2005-11-05: this is now implemented, and partially
tested.
Update, 2006-09-06: the UI has been slightly modified to
accommodate Cisco servers, which allow a password change to be requested
by entering a blank password.
If you want to comment on this web site, see the
Feedback page.
(last revision of this bug record was at 2016-12-27 11:40:21 +0000)