diff options
author | Simon Wilkinson <simon@sxw.org.uk> | 2014-02-09 16:09:48 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2019-10-09 23:06:20 +0100 |
commit | 9da806e67101afdc0d3a1d304659927acf18f5c5 (patch) | |
tree | 4cb56e13b3b3b14147366a04a7ff691f76908bf7 /sshd_config.5 | |
parent | 4213eec74e74de6310c27a40c3e9759a08a73996 (diff) |
GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are
in favour of adding this, and this situation has not changed for several
years. This is not a slight on Simon's patch, which is of fine quality, but
just that a) we don't trust GSSAPI implementations that much and b) we don't
like adding new KEX since they are pre-auth attack surface. This one is
particularly scary, since it requires hooks out to typically root-owned
system resources."
However, quite a lot of people rely on this in Debian, and it's better to
have it merged into the main openssh package rather than having separate
-krb5 packages (as we used to have). It seems to have a generally good
security history.
Origin: other, https://github.com/openssh-gsskex/openssh-gsskex/commits/debian/master
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242
Last-Updated: 2019-10-09
Patch-Name: gssapi.patch
Diffstat (limited to 'sshd_config.5')
-rw-r--r-- | sshd_config.5 | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/sshd_config.5 b/sshd_config.5 index 9486f2a1c..cec3c3c4e 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -655,6 +655,11 @@ Specifies whether to automatically destroy the user's credentials cache | |||
655 | on logout. | 655 | on logout. |
656 | The default is | 656 | The default is |
657 | .Cm yes . | 657 | .Cm yes . |
658 | .It Cm GSSAPIKeyExchange | ||
659 | Specifies whether key exchange based on GSSAPI is allowed. GSSAPI key exchange | ||
660 | doesn't rely on ssh keys to verify host identity. | ||
661 | The default is | ||
662 | .Cm no . | ||
658 | .It Cm GSSAPIStrictAcceptorCheck | 663 | .It Cm GSSAPIStrictAcceptorCheck |
659 | Determines whether to be strict about the identity of the GSSAPI acceptor | 664 | Determines whether to be strict about the identity of the GSSAPI acceptor |
660 | a client authenticates against. | 665 | a client authenticates against. |
@@ -669,6 +674,31 @@ machine's default store. | |||
669 | This facility is provided to assist with operation on multi homed machines. | 674 | This facility is provided to assist with operation on multi homed machines. |
670 | The default is | 675 | The default is |
671 | .Cm yes . | 676 | .Cm yes . |
677 | .It Cm GSSAPIStoreCredentialsOnRekey | ||
678 | Controls whether the user's GSSAPI credentials should be updated following a | ||
679 | successful connection rekeying. This option can be used to accepted renewed | ||
680 | or updated credentials from a compatible client. The default is | ||
681 | .Dq no . | ||
682 | .Pp | ||
683 | For this to work | ||
684 | .Cm GSSAPIKeyExchange | ||
685 | needs to be enabled in the server and also used by the client. | ||
686 | .It Cm GSSAPIKexAlgorithms | ||
687 | The list of key exchange algorithms that are accepted by GSSAPI | ||
688 | key exchange. Possible values are | ||
689 | .Bd -literal -offset 3n | ||
690 | gss-gex-sha1-, | ||
691 | gss-group1-sha1-, | ||
692 | gss-group14-sha1-, | ||
693 | gss-group14-sha256-, | ||
694 | gss-group16-sha512-, | ||
695 | gss-nistp256-sha256-, | ||
696 | gss-curve25519-sha256- | ||
697 | .Ed | ||
698 | .Pp | ||
699 | The default is | ||
700 | .Dq gss-gex-sha1-,gss-group14-sha1- . | ||
701 | This option only applies to protocol version 2 connections using GSSAPI. | ||
672 | .It Cm HostbasedAcceptedKeyTypes | 702 | .It Cm HostbasedAcceptedKeyTypes |
673 | Specifies the key types that will be accepted for hostbased authentication | 703 | Specifies the key types that will be accepted for hostbased authentication |
674 | as a list of comma-separated patterns. | 704 | as a list of comma-separated patterns. |