[Bug 2107] seccomp sandbox breaks GSSAPI

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Mon Aug 13 18:24:06 AEST 2018


https://bugzilla.mindrot.org/show_bug.cgi?id=2107

Jakub Jelen <jjelen at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|FIXED                       |---
             Status|CLOSED                      |REOPENED

--- Comment #13 from Jakub Jelen <jjelen at redhat.com> ---
(In reply to Damien Miller from comment #12)
> Created attachment 3168 [details]
> cache OIDs unconditionally
> 
> I can't think of any reason we can't prime the cache unconditionally.

That is probably the only way with the downside of having some overhead
for non-GSSAPI mechanisms or potentially larger attack surface, but if
you are fine with this change, I would be glad to have this addressed
in the next release.

I will reopen the bug to make sure it will not get lost.

Thank you.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list