[Bug 78] New: Support use of named (krb4, krb5, gsi, x.509) keys in auth_keys entries
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Fri Jan 25 13:27:57 EST 2002
http://bugzilla.mindrot.org/show_bug.cgi?id=78
Summary: Support use of named (krb4, krb5, gsi, x.509) keys in
auth_keys entries
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=101189381805982&w=2
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: Nicolas.Williams at ubsw.com
CC: openssh-unix-dev at mindrot.org
This patch adds support for entries in authorized_keys which reference
Kerberos principal names, GSI/X.509 certificate names when doing Kerberos
or GSS authentication. Also included is support for authorized_keys
entries which are patterns matching such names. Also included is support
for a new authorized_keys entry option, "deny-access." With this patch sshd
also sets environment variables to indicate the client's authenticated name,
if a named authorized_keys entry matches.
These simple features simplify key management and authorized_keys file
management in environments where Kerberos or GSI are in use with OpenSSH
(see Simon Wilkinson's patch to OpenSSH that implements the gsskeyex
draft). These features represent a much more general authorization system
for Kerberos than .klogin or .k5login, and apply to other authentication
mechanisms as well (again, GSI/X.509, and, in the future, when direct
X.509 support is added to OpenSSH, x.509).
These features, or a variation thereof, in OpenSSH, would be greatly
appreciated.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
You are on the CC list for the bug, or are watching someone who is.
More information about the openssh-unix-dev
mailing list