search for: gsskeyex

Displaying 17 results from an estimated 17 matches for "gsskeyex".

2001 Mar 20
1
Kerberos v5 and GSSAPI support in OpenSSH
...des updated Kerberos v5 support for protocol version 1, and also adds GSSAPI support for protocol version 2. Unlike the Kerberos v5 code (which will still not interoperate with ssh.com clients and servers), the GSSAPI support is based on two I-Ds draft-galb-secsh-gssapi-01.txt and draft-ietf-secsh-gsskeyex-01.txt. It adds two different points of authentication - the gsskeyex draft uses GSSAPI at the key exchange level, and removes the requirement to have hostkeys when it is used as the exchange mechanism. The first draft adds GSSAPI at the userauthentication level. Both support credential forwarding....
2002 Mar 21
1
GSSAPI/Kerberos support in OpenSSH 3.1p1
...run autoreconf from an autoconf later than 2.52 There are a number of improvements and minor bug fixes over previous patches. However, due to protocol changes this patch will not interoperate with my GSSAPI patches to 2.9p2 and earlier. This patch is conditionally compliant with draft-ietf-secsh-gsskeyex-03.txt. It does not currently implement GSSAPI secured host key exchange, or the optional GSSAPI error message passing Thanks to all those who have emailed me asking when this would be available, and to all those who have contributed patches and code reviews. The list on is on the web page! Cheer...
2003 Sep 03
1
value for SSH_MSG_USERAUTH_GSSAPI_ERRTOK
Hi, i notice in draft-ietf-secsh-gsskeyex-06.txt that the value for SSH_MSG_USERAUTH_GSSAPI_ERRTOK is not defined. does anyone know what this should be (i guess *will* be in a future rev)? thanks glen
2004 May 07
11
[Bug 866] ssh(1) is too picky about unknown options in ~/.ssh/config
http://bugzilla.mindrot.org/show_bug.cgi?id=866 Summary: ssh(1) is too picky about unknown options in ~/.ssh/config Product: Portable OpenSSH Version: 3.8p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: openssh-bugs at
2003 Jun 27
3
Kerberos Support in OpenSSH
...centrally managing keys and avoiding the problems of maintaining known_hosts files. We do have two concerns that we would like to discuss with you. We will briefly describe our concerns and then discuss them in detail. First, we would like to ask you to commit to implementing draft-ietf-secsh-gsskeyex in addition to any other Kerberos mechanisms you decide to ship for protocol version 2. We believe the mechanisms described in this draft better meet the needs of the Kerberos community, will have wider long-term acceptance and have undergone more comprehensive review in the standards communit...
2004 May 23
5
OpenSSH v3.8p1 fails to interoperate for GSSAPI (Kerberos) and X-Windows
...5 -> 3.8 -> 3.5, all the apps work properly. When both the client and the server are 3.8p1, and tcl/tk is the latest version, it works but xmag and xwd fail as above. Analysis: Sometime between 2003-09-12 and the present, a draft RFC: http://www.vandyke.com/technology/draft-ietf-secsh-gsskeyex.txt was issued defining gssapi-with-mic, which resists certain "man in the middle" attacks. v3.8p1 does only gssapi-with-mic; versions up to v3.7 do only old-style gssapi. There appears to be no ./configure switch to turn on gssapi-without-mic at compile time in v3.8. The resulting lack...
2005 Oct 10
0
[Bug 1100] GSSAPI-with-mic doesn't handle empty usernames
...can be empty as the server should be able to figure out what username to use from the established credentials. 3.2 [...] "The user name may be an empty string if it can be deduced from the results of the GSSAPI authentication." http://www.ietf.org/internet-drafts/draft-ietf-secsh-gsskeyex-10.txt Our modified PuTTY client has support for this; it sends a packet like this Outgoing packet type 50 / 0x32 (SSH2_MSG_USERAUTH_REQUEST) 00000000 00 00 00 00 00 00 00 0e 73 73 68 2d 63 6f 6e 6e ........ssh-conn 00000010 65 63 74 69 6f 6e 00 00 00 0f 67 73 73 61 70 69 ection....gssapi...
2001 Feb 14
1
Kerberos/GSSAPI support
Hi, Just wondering if anyone was looking at implementing draft-ietf-secsh-gsskeyex-00 in OpenSSH? My patches for SSH version 1 Kerberos 5 support (heavily based upon work done by Dan Kouril) are now available from http://www.sxw.org.uk/computing/patches/ Is there any interest in integrating these into the distribution? If so, I'd be happy to update them to the development v...
2002 Jan 25
0
[Bug 78] New: Support use of named (krb4, krb5, gsi, x.509) keys in auth_keys entries
...to indicate the client's authenticated name, if a named authorized_keys entry matches. These simple features simplify key management and authorized_keys file management in environments where Kerberos or GSI are in use with OpenSSH (see Simon Wilkinson's patch to OpenSSH that implements the gsskeyex draft). These features represent a much more general authorization system for Kerberos than .klogin or .k5login, and apply to other authentication mechanisms as well (again, GSI/X.509, and, in the future, when direct X.509 support is added to OpenSSH, x.509). These features, or a variation thereof...
2002 May 27
0
GSSAPI patches for OpenSSH 3.2.3p1
...of my patches providing GSSAPI support for OpenSSH is available from http://www.sxw.org.uk/computing/patches/openssh.html These patches provide support for authentication mechanisms such as Kerberos and GSI with version 2 of the SSH protocol. They are conditionally compliant with draft-ietf-secsh-gsskeyex-03.txt, with the optional error message passing and host key validation sections not implemented. As yet, I have not look at their interaction with the new privsep code. Feedback and patches are greatly appreciated - as is feedback from those performing interoperability testing. A full list of c...
2002 Jun 27
0
GSSAPI patches for OpenSSH 3.4p1 now available
...r running with privsep enabled. The patches are available from http://www.sxw.org.uk/computing/patches/openssh.html These patches provide support for Kerberos and GSI authentication and credential passing with version 2 of the SSH protocol. They implement the protocol described in draft-ietf-secsh-gsskeyex-03, which is hopefully approaching WG last call! I'd be very grateful if anyone more familiar with the privsep code could review the GSSAPI monitor routines. Thanks to those who put time aside to test this code over the last week! Cheers, Simon.
2003 Aug 22
1
gss userauth (fwd)
what about this? can we do about this if we break the protocol? -------------- next part -------------- An embedded message was scrubbed... From: Love <lha at stacken.kth.se> Subject: gss userauth Date: Fri, 22 Aug 2003 16:06:27 +0200 Size: 2878 Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20030822/f7bb85a0/attachment.mht
2004 Mar 01
1
GSSAPI support in 3.8 ?
Hi All, >From Changelog with 3.8: "The experimental "gssapi" support has been replaced with the "gssapi-with-mic" to fix possible MITM attacks.The two versions are not compatible." I am using OpenSSH-3.6 with Simon's patch and OpenSSH-3.7 built with GSSAPI support. The latest version OpenSSH-3.8 is not working with 3.6 or 3.7 with GSSAPI authentication. I
2003 May 01
2
Kerberos password auth/expiry kbdint patch
I took Markus Friedl's advice and set up a KbdintDevice for Kerberos password authentication/expiry. It took me a bit to wrap my head around privsep, but I think it's working properly (code stolen shamelessly from FBSD's PAM implementation :->). The hardest part was working out how to get the interaction between krb5_get_init_creds_password() (along with the prompter) to work
2004 Jan 22
11
Pending OpenSSH release: contains Kerberos/GSSAPI changes
(I hope this message is appropriate for these lists. If not, please tell me and I won't do it again.) Hi All. There will be a new release of OpenSSH in a couple of weeks. This release contains Kerberos and GSSAPI related changes that we would like to get some feedback about (and hopefully address any issues with) before the release. I encourage anyone with an interest in
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...entory/*.mydomain at MYREALM ... Double quotes can be used when key names contain whitespace and '\' can be used inside double-quotes to quote quote (use '\\' for '\')... This feature applies to SSHv1 krb4 and krb5 auth. It also applies to SSHv2, with Simon Wilkinson's gsskeyex patch, to GSS-API authentication, either with the Kerberos V GSS mechanism or the GSI GSS mechanism. Features added: - ssh-named key entry type for authorized_keys files - ssh-name-pat key entry type for authorized_keys files - deny-access option for authorized_keys files - SSH_AUTH_NAME...
2003 Aug 10
9
updated gssapi diff
...ORT + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#ifndef _SSH_GSS_H +#define _SSH_GSS_H + +#ifdef GSSAPI + +#include "buffer.h" + +#include <gssapi.h> + +/* draft-ietf-secsh-gsskeyex-06 */ +#define SSH2_MSG_USERAUTH_GSSAPI_RESPONSE 60 +#define SSH2_MSG_USERAUTH_GSSAPI_TOKEN 61 +#define SSH2_MSG_USERAUTH_GSSAPI_EXCHANGE_COMPLETE 63 +#define SSH2_MSG_USERAUTH_GSSAPI_ERROR 64 +#define SSH2_MSG_USERAUTH_GSSAPI_ERRTOK 65 + +#define SSH_GSS_OIDTYPE 0x06 + +typedef struct { + c...