Merging GSSAPI kex?
Demi Marie Obenour
demiobenour at gmail.com
Fri May 27 00:35:10 AEST 2022
I was thinking about the recent problems with the GSSAPI kex patch,
and I wonder if it would be best to merge GSSAPI kex into OpenSSH
upstream. My (admittedly dated) understanding is that the patch is
of high quality, and that the concerns are instead about the GSSAPI
implementation in use. However, I believe this is a non-issue for
most environments where GSSAPI kex would be useful: if someone can
find an RCE in the GSSAPI implementation, there are bigger problems
(like compromised domain controllers).
To avoid increasing the attack surface when GSSAPI is not in use,
I recommend having it off by default at both build-time and run-time.
The OpenBSD version would of course ship with it disabled (no GSSAPI
implementation in base), though there might be a package that
ships with it enabled. Most Linux distributions would ship with
it included in the build, but not enabled via sshd.conf. In this
configuration, I would expect there to be no drawbacks other than a
slightly increased binary size. I also believe that the additional
attack surface would be little greater than GSSAPI authentication,
which OpenSSH already supports.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xB288B55FFF9C22C1.asc
Type: application/pgp-keys
Size: 4885 bytes
Desc: OpenPGP public key
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20220526/90ea9025/attachment-0001.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20220526/90ea9025/attachment-0001.asc>
More information about the openssh-unix-dev
mailing list