diff options
author | Simon Wilkinson <simon@sxw.org.uk> | 2014-02-09 16:09:48 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-03-19 16:39:52 +0000 |
commit | 429c595dbaff7f7c2b3a53fe4235211f6d788025 (patch) | |
tree | 085cf7273c133b74238c968c9c9f591f8fb0308e /ssh_config.5 | |
parent | 9a975a9faed7c4f334e8c8490db3e77e102f2b21 (diff) |
GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are
in favour of adding this, and this situation has not changed for several
years. This is not a slight on Simon's patch, which is of fine quality, but
just that a) we don't trust GSSAPI implementations that much and b) we don't
like adding new KEX since they are pre-auth attack surface. This one is
particularly scary, since it requires hooks out to typically root-owned
system resources."
However, quite a lot of people rely on this in Debian, and it's better to
have it merged into the main openssh package rather than having separate
-krb5 packages (as we used to have). It seems to have a generally good
security history.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242
Last-Updated: 2014-03-19
Patch-Name: gssapi.patch
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 34 |
1 files changed, 33 insertions, 1 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index 3cadcd767..49505ae9c 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -676,11 +676,43 @@ Specifies whether user authentication based on GSSAPI is allowed. | |||
676 | The default is | 676 | The default is |
677 | .Dq no . | 677 | .Dq no . |
678 | Note that this option applies to protocol version 2 only. | 678 | Note that this option applies to protocol version 2 only. |
679 | .It Cm GSSAPIKeyExchange | ||
680 | Specifies whether key exchange based on GSSAPI may be used. When using | ||
681 | GSSAPI key exchange the server need not have a host key. | ||
682 | The default is | ||
683 | .Dq no . | ||
684 | Note that this option applies to protocol version 2 only. | ||
685 | .It Cm GSSAPIClientIdentity | ||
686 | If set, specifies the GSSAPI client identity that ssh should use when | ||
687 | connecting to the server. The default is unset, which means that the default | ||
688 | identity will be used. | ||
689 | .It Cm GSSAPIServerIdentity | ||
690 | If set, specifies the GSSAPI server identity that ssh should expect when | ||
691 | connecting to the server. The default is unset, which means that the | ||
692 | expected GSSAPI server identity will be determined from the target | ||
693 | hostname. | ||
679 | .It Cm GSSAPIDelegateCredentials | 694 | .It Cm GSSAPIDelegateCredentials |
680 | Forward (delegate) credentials to the server. | 695 | Forward (delegate) credentials to the server. |
681 | The default is | 696 | The default is |
682 | .Dq no . | 697 | .Dq no . |
683 | Note that this option applies to protocol version 2 only. | 698 | Note that this option applies to protocol version 2 connections using GSSAPI. |
699 | .It Cm GSSAPIRenewalForcesRekey | ||
700 | If set to | ||
701 | .Dq yes | ||
702 | then renewal of the client's GSSAPI credentials will force the rekeying of the | ||
703 | ssh connection. With a compatible server, this can delegate the renewed | ||
704 | credentials to a session on the server. | ||
705 | The default is | ||
706 | .Dq no . | ||
707 | .It Cm GSSAPITrustDns | ||
708 | Set to | ||
709 | .Dq yes to indicate that the DNS is trusted to securely canonicalize | ||
710 | the name of the host being connected to. If | ||
711 | .Dq no, the hostname entered on the | ||
712 | command line will be passed untouched to the GSSAPI library. | ||
713 | The default is | ||
714 | .Dq no . | ||
715 | This option only applies to protocol version 2 connections using GSSAPI. | ||
684 | .It Cm HashKnownHosts | 716 | .It Cm HashKnownHosts |
685 | Indicates that | 717 | Indicates that |
686 | .Xr ssh 1 | 718 | .Xr ssh 1 |