Bug 1270925 - Some sshd_config directives not dumped by sshd -T when not specifed explicitly
Some sshd_config directives not dumped by sshd -T when not specifed explicitly
Status: CLOSED WONTFIX
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: openssh (Show other bugs)
7.2
Unspecified Unspecified
unspecified Severity unspecified
: rc
: ---
Assigned To: Jakub Jelen
Stanislav Zidek
:
Depends On:
Blocks: 1270931
  Show dependency treegraph
 
Reported: 2015-10-12 13:10 EDT by Stanislav Zidek
Modified: 2016-04-28 09:15 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 1270931 (view as bug list)
Environment:
Last Closed: 2016-04-28 09:15:54 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Stanislav Zidek 2015-10-12 13:10:52 EDT
Description of problem:

I have just updated our options test and found out that there are still some options/directives not dumped by sshd -T, namely:
allowgroups
allowusers
authorizedkeyscommand
authorizedkeyscommanduser
authorizedprincipalsfile
chrootdirectory
denygroups
denyusers
forcecommand
hostcertificate
kerberosgetafstoken
match
revokedkeys
trustedusercakeys

("match" is probably not a problem)

Version-Release number of selected component (if applicable):
openssh-6.6.1p1-22.el7

How reproducible:
always

Steps to Reproduce:
1. install clean machine with openssh-server
2. sshd -T |grep DESIRED_OPTION

Actual results:
nothing

Expected results:
DESIRED_OPTION default_value
Comment 2 Petr Lautrbach 2016-04-28 08:42:29 EDT
https://bugzilla.redhat.com/show_bug.cgi?id=1270931#c1
Comment 3 RHEL Product and Program Management 2016-04-28 09:15:54 EDT
Development Management has reviewed and declined this request.
You may appeal this decision by reopening this request.

Note You need to log in before you can comment on or make changes to this bug.