I've now completed updating my patches for GSSAPI in protocol v2 to OpenSSH 3.1p1 See http://www.sxw.org.uk/computing/patches/openssh.html As previously, you will need to apply the protocol v1 krb5 patch before the GSSAPI one, and run autoreconf from an autoconf later than 2.52 There are a number of improvements and minor bug fixes over previous patches. However, due to protocol changes this patch will not interoperate with my GSSAPI patches to 2.9p2 and earlier. This patch is conditionally compliant with draft-ietf-secsh-gsskeyex-03.txt. It does not currently implement GSSAPI secured host key exchange, or the optional GSSAPI error message passing Thanks to all those who have emailed me asking when this would be available, and to all those who have contributed patches and code reviews. The list on is on the web page! Cheers, Simon.
Nicolas Williams
2002-Mar-22 15:49 UTC
Auto-rekey? (was Re: GSSAPI/Kerberos support in OpenSSH 3.1p1)
A thought occurs: have the client attempt to automatically initiate re-keying when the GSS context is due to expire or, if expired, every few minutes. Let me be more specific. The way SSH gsskeyex works GSS context expiration is unimportant, but GSS context expiration is a clue on a tip as to when forwarded credentials expire. It would be useful if credentials were re-forwarded automatically when refreshed. The way one re-forwards GSS credentials with SSH gsskeyex is by re-keying the session. The client can find out from gss_init_sec_context() when the context and any forwarded credentials, will expire. The client can check, when the time comes, and periodically thereafter, if new credentials are available, and if so, re-key the SSH session. To make this happen would require a hook in the client loop (but NOT a select() timeout). This way one need only kinit in one place and tickets will eventually be re-forwarded automatically. Is there any interest in such a feature? Advice? Cheers, Nico On Thu, Mar 21, 2002 at 10:29:35PM +0000, Simon Wilkinson wrote:> > I've now completed updating my patches for GSSAPI in protocol v2 to > OpenSSH 3.1p1 > See http://www.sxw.org.uk/computing/patches/openssh.html > > Cheers, > > Simon. > > _______________________________________________ > openssh-unix-dev at mindrot.org mailing list > http://www.mindrot.org/mailman/listinfo/openssh-unix-dev-- -DISCLAIMER: an automatically appended disclaimer may follow. By posting- -to a public e-mail mailing list I hereby grant permission to distribute- -and copy this message.- Visit our website at http://www.ubswarburg.com This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message which arise as a result of e-mail transmission. If verification is required please request a hard-copy version. This message is provided for informational purposes and should not be construed as a solicitation or offer to buy or sell any securities or related financial instruments.