| Summary: | Allow non-public-key credentials in authorized_keys file (Kerberos, etc.) | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Markus Kuhn <Markus.Kuhn> |
| Component: | Kerberos support | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | REOPENED --- | ||
| Severity: | enhancement | CC: | dtucker, matthew.nygard.dodd |
| Priority: | P2 | ||
| Version: | 4.4p1 | ||
| Hardware: | All | ||
| OS: | Linux | ||
| See Also: | https://bugzilla.mindrot.org/show_bug.cgi?id=1927 | ||
|
Description
Markus Kuhn
2007-06-29 07:12:36 AEST
(In reply to comment #0) > At present, the ~/.ssh/authorized_keys file serves two functions: > > - list RSA or DSA keys that are authorized as login credentials > > - define policy restrictions (command=, from=, etc.) for each > > Unfortunately, all the wonderful policy restrictions that > authorized_keys allows are currently only available for public-key > authentication. Actually that's no longer the case. In the most recent versions, the policy restrictions also available in sshd_config via Match, ForceCommand, PermitOpen and so on. You can implement some parts of your example with those, for example: Match User gssapiuser Host *.blah.com GSSAPIAuthentication yes PasswordAuthentication yes ForceCommand /bin/helpdesk Hatch User gssapiuser GSSAPIAuthentication no PasswordAuthentication no ForceCommand /bin/helpdesk would allow the user "gssapiuser" to authenticate using gssapi or password only from machines in the blah.com domain, and only allow them to run the /bin/helpdesk program no matter how they authenticated. I think the Match capability provides the requested functionality, so I'm closing. Thanks for the suggestion, but I don't think we'll be doing this. Mass move of bugs RESOLVED->CLOSED following the release of openssh-5.5p1 But the Match capability of /etc/ssh/sshd_config is only accessible to the system administrator, and there seems nothing equivalent that the user can do themselves in ~/.ssh/. |