summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authorSimon Wilkinson <simon@sxw.org.uk>2014-02-09 16:09:48 +0000
committerColin Watson <cjwatson@debian.org>2019-10-09 23:06:20 +0100
commit9da806e67101afdc0d3a1d304659927acf18f5c5 (patch)
tree4cb56e13b3b3b14147366a04a7ff691f76908bf7 /sshd_config.5
parent4213eec74e74de6310c27a40c3e9759a08a73996 (diff)
GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are in favour of adding this, and this situation has not changed for several years. This is not a slight on Simon's patch, which is of fine quality, but just that a) we don't trust GSSAPI implementations that much and b) we don't like adding new KEX since they are pre-auth attack surface. This one is particularly scary, since it requires hooks out to typically root-owned system resources." However, quite a lot of people rely on this in Debian, and it's better to have it merged into the main openssh package rather than having separate -krb5 packages (as we used to have). It seems to have a generally good security history. Origin: other, https://github.com/openssh-gsskex/openssh-gsskex/commits/debian/master Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242 Last-Updated: 2019-10-09 Patch-Name: gssapi.patch
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.530
1 files changed, 30 insertions, 0 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 9486f2a1c..cec3c3c4e 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -655,6 +655,11 @@ Specifies whether to automatically destroy the user's credentials cache
655on logout. 655on logout.
656The default is 656The default is
657.Cm yes . 657.Cm yes .
658.It Cm GSSAPIKeyExchange
659Specifies whether key exchange based on GSSAPI is allowed. GSSAPI key exchange
660doesn't rely on ssh keys to verify host identity.
661The default is
662.Cm no .
658.It Cm GSSAPIStrictAcceptorCheck 663.It Cm GSSAPIStrictAcceptorCheck
659Determines whether to be strict about the identity of the GSSAPI acceptor 664Determines whether to be strict about the identity of the GSSAPI acceptor
660a client authenticates against. 665a client authenticates against.
@@ -669,6 +674,31 @@ machine's default store.
669This facility is provided to assist with operation on multi homed machines. 674This facility is provided to assist with operation on multi homed machines.
670The default is 675The default is
671.Cm yes . 676.Cm yes .
677.It Cm GSSAPIStoreCredentialsOnRekey
678Controls whether the user's GSSAPI credentials should be updated following a
679successful connection rekeying. This option can be used to accepted renewed
680or updated credentials from a compatible client. The default is
681.Dq no .
682.Pp
683For this to work
684.Cm GSSAPIKeyExchange
685needs to be enabled in the server and also used by the client.
686.It Cm GSSAPIKexAlgorithms
687The list of key exchange algorithms that are accepted by GSSAPI
688key exchange. Possible values are
689.Bd -literal -offset 3n
690gss-gex-sha1-,
691gss-group1-sha1-,
692gss-group14-sha1-,
693gss-group14-sha256-,
694gss-group16-sha512-,
695gss-nistp256-sha256-,
696gss-curve25519-sha256-
697.Ed
698.Pp
699The default is
700.Dq gss-gex-sha1-,gss-group14-sha1- .
701This option only applies to protocol version 2 connections using GSSAPI.
672.It Cm HostbasedAcceptedKeyTypes 702.It Cm HostbasedAcceptedKeyTypes
673Specifies the key types that will be accepted for hostbased authentication 703Specifies the key types that will be accepted for hostbased authentication
674as a list of comma-separated patterns. 704as a list of comma-separated patterns.