AFS and tokenforwarding

Nicolas Williams Nicolas.Williams at
Fri Oct 5 07:04:03 EST 2001

On Thu, Oct 04, 2001 at 05:00:44PM -0400, Dug Song wrote:
> On Thu, Oct 04, 2001 at 09:49:42PM +0200, Bjoern Groenvall wrote:
> > You can use the real server to increment the challenge for you. The
> > kerberos session key is only used for this. The kerberos session key
> > should really really be used to change the ssh session key so that the
> > tunnel between client and masquerading server breaks.
> yes, there's been argument over this before as well, and whether to
> just GSSify all of SSH anyhow, since there's so much overlap. :-/
> hrr, an easy interim solution would be to encrypt the SSH session key
> (or an HMAC of the challenge with the key) with the Kerberos session
> key however nasty this is...
> -d.
> ---

One of the two competing GSS-in-SSH proposals as an option to do just
this as a GSS-protected Diffie-Hellman key exchange.

-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-

Visit our website at

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.

More information about the openssh-unix-dev mailing list