diff options
author | Simon Wilkinson <simon@sxw.org.uk> | 2014-02-09 16:09:48 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2017-03-29 01:38:38 +0100 |
commit | d51c7ac3328464dec21514fb398ab5c140a0664f (patch) | |
tree | 4f1a2aa08e99303f62c71cba0b38899f050d1b3d /ssh_config.5 | |
parent | 6fabaf6fd9b07cc8bc6a17c9c4a5b76849cfc874 (diff) |
GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are
in favour of adding this, and this situation has not changed for several
years. This is not a slight on Simon's patch, which is of fine quality, but
just that a) we don't trust GSSAPI implementations that much and b) we don't
like adding new KEX since they are pre-auth attack surface. This one is
particularly scary, since it requires hooks out to typically root-owned
system resources."
However, quite a lot of people rely on this in Debian, and it's better to
have it merged into the main openssh package rather than having separate
-krb5 packages (as we used to have). It seems to have a generally good
security history.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242
Last-Updated: 2017-01-16
Patch-Name: gssapi.patch
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index 532745b2f..ec60273ea 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -752,10 +752,42 @@ The default is | |||
752 | Specifies whether user authentication based on GSSAPI is allowed. | 752 | Specifies whether user authentication based on GSSAPI is allowed. |
753 | The default is | 753 | The default is |
754 | .Cm no . | 754 | .Cm no . |
755 | .It Cm GSSAPIKeyExchange | ||
756 | Specifies whether key exchange based on GSSAPI may be used. When using | ||
757 | GSSAPI key exchange the server need not have a host key. | ||
758 | The default is | ||
759 | .Cm no . | ||
760 | .It Cm GSSAPIClientIdentity | ||
761 | If set, specifies the GSSAPI client identity that ssh should use when | ||
762 | connecting to the server. The default is unset, which means that the default | ||
763 | identity will be used. | ||
764 | .It Cm GSSAPIServerIdentity | ||
765 | If set, specifies the GSSAPI server identity that ssh should expect when | ||
766 | connecting to the server. The default is unset, which means that the | ||
767 | expected GSSAPI server identity will be determined from the target | ||
768 | hostname. | ||
755 | .It Cm GSSAPIDelegateCredentials | 769 | .It Cm GSSAPIDelegateCredentials |
756 | Forward (delegate) credentials to the server. | 770 | Forward (delegate) credentials to the server. |
757 | The default is | 771 | The default is |
758 | .Cm no . | 772 | .Cm no . |
773 | .It Cm GSSAPIRenewalForcesRekey | ||
774 | If set to | ||
775 | .Cm yes | ||
776 | then renewal of the client's GSSAPI credentials will force the rekeying of the | ||
777 | ssh connection. With a compatible server, this can delegate the renewed | ||
778 | credentials to a session on the server. | ||
779 | The default is | ||
780 | .Cm no . | ||
781 | .It Cm GSSAPITrustDns | ||
782 | Set to | ||
783 | .Cm yes | ||
784 | to indicate that the DNS is trusted to securely canonicalize | ||
785 | the name of the host being connected to. If | ||
786 | .Cm no , | ||
787 | the hostname entered on the | ||
788 | command line will be passed untouched to the GSSAPI library. | ||
789 | The default is | ||
790 | .Cm no . | ||
759 | .It Cm HashKnownHosts | 791 | .It Cm HashKnownHosts |
760 | Indicates that | 792 | Indicates that |
761 | .Xr ssh 1 | 793 | .Xr ssh 1 |