summaryrefslogtreecommitdiff
path: root/ssh.c
diff options
context:
space:
mode:
authorSimon Wilkinson <simon@sxw.org.uk>2014-02-09 16:09:48 +0000
committerColin Watson <cjwatson@debian.org>2020-06-07 10:24:45 +0100
commit79f9d21b406c172878896ef41cdc2502fc2f84a7 (patch)
tree71507aaefd925223b1543b10f4342f2df9ea0ee3 /ssh.c
parent202f5a676221c244cd450086c334c2b59f339e86 (diff)
GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are in favour of adding this, and this situation has not changed for several years. This is not a slight on Simon's patch, which is of fine quality, but just that a) we don't trust GSSAPI implementations that much and b) we don't like adding new KEX since they are pre-auth attack surface. This one is particularly scary, since it requires hooks out to typically root-owned system resources." However, quite a lot of people rely on this in Debian, and it's better to have it merged into the main openssh package rather than having separate -krb5 packages (as we used to have). It seems to have a generally good security history. Author: Simon Wilkinson <simon@sxw.org.uk> Author: Colin Watson <cjwatson@debian.org> Author: Jakub Jelen <jjelen@redhat.com> Origin: other, https://github.com/openssh-gsskex/openssh-gsskex/commits/debian/master Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242 Last-Updated: 2020-06-07 Patch-Name: gssapi.patch
Diffstat (limited to 'ssh.c')
-rw-r--r--ssh.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/ssh.c b/ssh.c
index 98b6ce788..4a81ef810 100644
--- a/ssh.c
+++ b/ssh.c
@@ -773,6 +773,8 @@ main(int ac, char **av)
773 else if (strcmp(optarg, "kex") == 0 || 773 else if (strcmp(optarg, "kex") == 0 ||
774 strcasecmp(optarg, "KexAlgorithms") == 0) 774 strcasecmp(optarg, "KexAlgorithms") == 0)
775 cp = kex_alg_list('\n'); 775 cp = kex_alg_list('\n');
776 else if (strcmp(optarg, "kex-gss") == 0)
777 cp = kex_gss_alg_list('\n');
776 else if (strcmp(optarg, "key") == 0) 778 else if (strcmp(optarg, "key") == 0)
777 cp = sshkey_alg_list(0, 0, 0, '\n'); 779 cp = sshkey_alg_list(0, 0, 0, '\n');
778 else if (strcmp(optarg, "key-cert") == 0) 780 else if (strcmp(optarg, "key-cert") == 0)
@@ -798,8 +800,8 @@ main(int ac, char **av)
798 } else if (strcmp(optarg, "help") == 0) { 800 } else if (strcmp(optarg, "help") == 0) {
799 cp = xstrdup( 801 cp = xstrdup(
800 "cipher\ncipher-auth\ncompression\nkex\n" 802 "cipher\ncipher-auth\ncompression\nkex\n"
801 "key\nkey-cert\nkey-plain\nkey-sig\nmac\n" 803 "kex-gss\nkey\nkey-cert\nkey-plain\n"
802 "protocol-version\nsig"); 804 "key-sig\nmac\nprotocol-version\nsig");
803 } 805 }
804 if (cp == NULL) 806 if (cp == NULL)
805 fatal("Unsupported query \"%s\"", optarg); 807 fatal("Unsupported query \"%s\"", optarg);