.gitignore
README.sshd-and-gsisshd
gsi-openssh.spec
gsisshd-keygen
gsisshd-keygen.target
gsisshd-keygen@.service
gsisshd.pam
gsisshd.service
gsisshd.socket
gsisshd.sysconfig
gsisshd@.service
openssh-4.3p2-askpass-grab-info.patch
openssh-5.1p1-askpass-progress.patch
openssh-5.8p2-sigpipe.patch
openssh-5.9p1-ipv6man.patch
openssh-6.3p1-ctr-evp-fast.patch
openssh-6.4p1-fromto-remote.patch
openssh-6.6.1p1-log-in-chroot.patch
openssh-6.6.1p1-scp-non-existing-directory.patch
openssh-6.6.1p1-selinux-contexts.patch
openssh-6.6p1-GSSAPIEnablek5users.patch
openssh-6.6p1-allow-ip-opts.patch
openssh-6.6p1-force_krb.patch
openssh-6.6p1-keycat.patch
openssh-6.6p1-keyperm.patch
openssh-6.6p1-kuserok.patch
openssh-6.6p1-privsep-selinux.patch
openssh-6.7p1-coverity.patch
openssh-6.7p1-sftp-force-permission.patch
openssh-6.8p1-sshdT-output.patch
openssh-7.1p2-audit-race-condition.patch
openssh-7.2p2-k5login_directory.patch
openssh-7.2p2-s390-closefrom.patch
openssh-7.2p2-x11.patch
openssh-7.3p1-x11-max-displays.patch
openssh-7.4p1-systemd.patch
openssh-7.5p1-sandbox.patch
openssh-7.6p1-audit.patch
openssh-7.6p1-cleanup-selinux.patch
openssh-7.7p1-fips.patch
openssh-7.7p1-gssapi-new-unique.patch
openssh-7.7p1-redhat.patch
openssh-7.8p1-UsePAM-warning.patch
openssh-7.8p1-role-mls.patch
openssh-7.8p1-scp-ipv6.patch
openssh-8.0p1-crypto-policies.patch
openssh-8.0p1-gssapi-keyex.patch
openssh-8.0p1-keygen-strip-doseol.patch
openssh-8.0p1-openssl-evp.patch
openssh-8.0p1-openssl-kdf.patch
openssh-8.0p1-pkcs11-uri.patch
openssh-8.0p1-preserve-pam-errors.patch
openssh-8.0p1-sshbuf-readonly.patch
openssh-8.2p1-visibility.patch
openssh-8.2p1-x11-without-ipv6.patch
openssh-8.7p1-gsissh.patch
openssh-8.7p1-hpn-15.2-modified.patch
openssh-8.7p1-scp-kill-switch.patch
openssh-8.7p1-sftp-default-protocol.patch
openssh-8.7p1-upstream-cve-2021-41617.patch
sources
README.sshd-and-gsisshd
The regular sshd daemon and the gsi enabled gsisshd daemon can not both listen for connections on the same port. You can either deactivate the regular sshd before starting gsisshd or change the configuration of gsisshd to use a different port than the standard ssh port number 22. Common choices for an alternative port number are 23, 222 or 2222. If you configure gsisshd to only accept gsi connections and not accept other types of connections that require the existence of the ssh host keys, you can turn off the generation of these keys in /etc/sysconfig/gsisshd.