commit | 1916246b0b2463261e5481f365fdfde1fc9a338c | [log] [tgz] |
---|---|---|
author | James Shewey <jdshewey@gmail.com> | Wed Jul 12 13:30:36 2017 -0600 |
committer | GitHub <noreply@github.com> | Wed Jul 12 13:30:36 2017 -0600 |
tree | 8176e3194cf8b79aa076cfab6c857e43ea89f09d | |
parent | 62ecc52708322147c3fd9ca16e26e72929471972 [diff] |
Fix issue w/ Cent/RHEL 6/7 causing sshd to fail startup CentOS/RHEL 7 require AuthorizedKeysCommandUser if AuthorizedKeysCommand is used. 6 however will fail if this value is present. I am unsure what debian, various version and variants will do, so adding server.authorized_keys_command.user is advantageous in that you will be able to have the option of this being present or not even if you can't span osmajorversions.