summaryrefslogtreecommitdiff
path: root/configure
diff options
context:
space:
mode:
authorSimon Wilkinson <simon@sxw.org.uk>2014-02-09 16:09:48 +0000
committerColin Watson <cjwatson@debian.org>2014-10-07 14:26:43 +0100
commit1c1b6fa17982eb622e2c4e8f4a279f2113f57413 (patch)
treea67e7472f48242904e6a45732508822af63fd331 /configure
parent487bdb3a5ef6075887b830ccb8a0b14f6da78e93 (diff)
GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are in favour of adding this, and this situation has not changed for several years. This is not a slight on Simon's patch, which is of fine quality, but just that a) we don't trust GSSAPI implementations that much and b) we don't like adding new KEX since they are pre-auth attack surface. This one is particularly scary, since it requires hooks out to typically root-owned system resources." However, quite a lot of people rely on this in Debian, and it's better to have it merged into the main openssh package rather than having separate -krb5 packages (as we used to have). It seems to have a generally good security history. Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242 Last-Updated: 2014-10-07 Patch-Name: gssapi.patch
Diffstat (limited to 'configure')
-rwxr-xr-xconfigure57
1 files changed, 57 insertions, 0 deletions
diff --git a/configure b/configure
index 6815388cc..ea5f200e8 100755
--- a/configure
+++ b/configure
@@ -7168,6 +7168,63 @@ $as_echo "#define SSH_TUN_COMPAT_AF 1" >>confdefs.h
7168 7168
7169$as_echo "#define SSH_TUN_PREPEND_AF 1" >>confdefs.h 7169$as_echo "#define SSH_TUN_PREPEND_AF 1" >>confdefs.h
7170 7170
7171 { $as_echo "$as_me:${as_lineno-$LINENO}: checking if we have the Security Authorization Session API" >&5
7172$as_echo_n "checking if we have the Security Authorization Session API... " >&6; }
7173 cat confdefs.h - <<_ACEOF >conftest.$ac_ext
7174/* end confdefs.h. */
7175#include <Security/AuthSession.h>
7176int
7177main ()
7178{
7179SessionCreate(0, 0);
7180 ;
7181 return 0;
7182}
7183_ACEOF
7184if ac_fn_c_try_compile "$LINENO"; then :
7185 ac_cv_use_security_session_api="yes"
7186
7187$as_echo "#define USE_SECURITY_SESSION_API 1" >>confdefs.h
7188
7189 LIBS="$LIBS -framework Security"
7190 { $as_echo "$as_me:${as_lineno-$LINENO}: result: yes" >&5
7191$as_echo "yes" >&6; }
7192else
7193 ac_cv_use_security_session_api="no"
7194 { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
7195$as_echo "no" >&6; }
7196fi
7197rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext
7198 { $as_echo "$as_me:${as_lineno-$LINENO}: checking if we have an in-memory credentials cache" >&5
7199$as_echo_n "checking if we have an in-memory credentials cache... " >&6; }
7200 cat confdefs.h - <<_ACEOF >conftest.$ac_ext
7201/* end confdefs.h. */
7202#include <Kerberos/Kerberos.h>
7203int
7204main ()
7205{
7206cc_context_t c;
7207 (void) cc_initialize (&c, 0, NULL, NULL);
7208 ;
7209 return 0;
7210}
7211_ACEOF
7212if ac_fn_c_try_compile "$LINENO"; then :
7213
7214$as_echo "#define USE_CCAPI 1" >>confdefs.h
7215
7216 LIBS="$LIBS -framework Security"
7217 { $as_echo "$as_me:${as_lineno-$LINENO}: result: yes" >&5
7218$as_echo "yes" >&6; }
7219 if test "x$ac_cv_use_security_session_api" = "xno"; then
7220 as_fn_error $? "*** Need a security framework to use the credentials cache API ***" "$LINENO" 5
7221 fi
7222else
7223 { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
7224$as_echo "no" >&6; }
7225
7226fi
7227rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext
7171 7228
7172 ac_fn_c_check_decl "$LINENO" "AU_IPv4" "ac_cv_have_decl_AU_IPv4" "$ac_includes_default" 7229 ac_fn_c_check_decl "$LINENO" "AU_IPv4" "ac_cv_have_decl_AU_IPv4" "$ac_includes_default"
7173if test "x$ac_cv_have_decl_AU_IPv4" = xyes; then : 7230if test "x$ac_cv_have_decl_AU_IPv4" = xyes; then :