FS#8373 - Make openssh kerberos-aware
Attached to Project:
Arch Linux
Opened by Apollon Oikonomopoulos (apoikos) - Monday, 22 October 2007, 13:57 GMT
Last edited by Aaron Griffin (phrakture) - Friday, 07 December 2007, 02:46 GMT
Opened by Apollon Oikonomopoulos (apoikos) - Monday, 22 October 2007, 13:57 GMT
Last edited by Aaron Griffin (phrakture) - Friday, 07 December 2007, 02:46 GMT
|
Details
Description:
Openssh has a compile-time switch for including Kerberos v5 support, making secure single-sign-on possible in a kerberized domain. The upside of enabling this option is that Arch Linux can work "out of the box" in a kerberized domain (e.g. an academic institution). The downside is the added dependency of heimdal, that would move heimdal in "core" or openssh in "extra". Additional info: Kerberos support is enabled by passing "--with-kerberos5=/usr" to configure. If someone considers enabling kerberos support, they could also consider including the GSS Key Exchange patch (http://www.sxw.org.uk/computing/patches/openssh.html). |
This task depends upon
Closed by Aaron Griffin (phrakture)
Friday, 07 December 2007, 02:46 GMT
Reason for closing: Implemented
Friday, 07 December 2007, 02:46 GMT
Reason for closing: Implemented
Isn't it possible to setup pam to use kerberos, and then you can UsePAM in sshd_config? That seems like the path of least resistance here. I don't want to start pulling in a lot of complex deps for something as critical as openssh.
About your pam setup: yes, you can use pam_krb5 or pam_heimdal for kerberos authentication, but then you won't have all features. pam_krb5 and pam_heimdal request a ticket for you, the success of getting a ticket means succesful authentication. You can't authenticate with the ticket on your client system using these pam modules.
Further, there's no support for key forwarding with these pam modules.
+1 for enabling Kerberos support on everything that supports it. I run a kerberized setup at home, but archlinux is not part of it.
with one question: how is Kerberos v5 licenced? would it change the licence of the pkg in a way, when enabling it?
openssh is a BSD-derivate whereas kerberos implementation is i think (not sure) a MIT-derivate
I fully understand your reluctance to add extra packages to "core" and I know that this feature is really not targeted towards home users, but IMHO heimdal wouldn't be a big issue since, as JGC pointed out, its dependencies are already in "core". Of course in the end it's your decision :-)
Cheers and thank you for your rapid response!
Nov 26 22:57:53 kdc sshd[16644]: Authorized to jan, krb5 principal jan@GROOT.LOCAL (krb5_kuserok)
Nov 26 22:57:53 kdc sshd[16644]: Accepted gssapi-with-mic for jan from 192.168.1.1 port 34809 ssh2
Authentication without kerberos works also.
I haven't tested the server part, as I use x86_64, I tested your package from an i686 chroot.
a) What exactly does this patch do?
b) Why hasn't it been merged upstream? Looks like it has been around for a while
c) Is any functionality lost with the GSSAPI things that were just enabled?
Jan, what's your opinion?
b) Can't answer that, but there are other patches as well that haven't been merged upstream (like the hpn patch for example). However, Debian seems to use the GSS Key exchange patch in their mainline openssh package and the same goes for Ubuntu (obviously) and even Solaris 10, so I expect it to have suffered extensive security auditing.
c) No functionallity at all is lost, just added. Enabling GSSAPI adds just more authentication methods the client and server will try. If kerberos isn't supported on either side, the handshake goes on with other authentication methods (public key, challenge-response etc.)
http://archlinux.org/~aaron/openssh-4.7p1-5-i686.pkg.tar.gz
I have applied the gsskex patch, but am unable to test - all I can tell you is that normal SSH continues to work.
Thanks once more for your response.
I think this is a case where ABS is going to have to win out, as you're the edge case. A majority of users probably don't use kerberos, let alone for ssh, so I don't think the effort will be worth it.