summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2010-05-10 11:58:03 +1000
committerDamien Miller <djm@mindrot.org>2010-05-10 11:58:03 +1000
commit30da3447d2ef3329cb0eb083cdddf84532659454 (patch)
tree02537d2355d77cc15d1bf9d266d474e660848012 /auth.h
parent099fc1634e1cc0f96b77a811e554bf9d796def8f (diff)
- djm@cvs.openbsd.org 2010/05/07 11:30:30
[auth-options.c auth-options.h auth.c auth.h auth2-pubkey.c] [key.c servconf.c servconf.h sshd.8 sshd_config.5] add some optional indirection to matching of principal names listed in certificates. Currently, a certificate must include the a user's name to be accepted for authentication. This change adds the ability to specify a list of certificate principal names that are acceptable. When authenticating using a CA trusted through ~/.ssh/authorized_keys, this adds a new principals="name1[,name2,...]" key option. For CAs listed through sshd_config's TrustedCAKeys option, a new config option "AuthorizedPrincipalsFile" specifies a per-user file containing the list of acceptable names. If either option is absent, the current behaviour of requiring the username to appear in principals continues to apply. These options are useful for role accounts, disjoint account namespaces and "user@realm"-style naming policies in certificates. feedback and ok markus@
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h4
1 files changed, 3 insertions, 1 deletions
diff --git a/auth.h b/auth.h
index a65b87dd1..77317aee6 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth.h,v 1.65 2010/03/04 10:36:03 djm Exp $ */ 1/* $OpenBSD: auth.h,v 1.66 2010/05/07 11:30:29 djm Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -169,8 +169,10 @@ void abandon_challenge_response(Authctxt *);
169 169
170char *authorized_keys_file(struct passwd *); 170char *authorized_keys_file(struct passwd *);
171char *authorized_keys_file2(struct passwd *); 171char *authorized_keys_file2(struct passwd *);
172char *authorized_principals_file(struct passwd *);
172 173
173FILE *auth_openkeyfile(const char *, struct passwd *, int); 174FILE *auth_openkeyfile(const char *, struct passwd *, int);
175FILE *auth_openprincipals(const char *, struct passwd *, int);
174int auth_key_is_revoked(Key *); 176int auth_key_is_revoked(Key *);
175 177
176HostStatus 178HostStatus