IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Comment on draft-ietf-secsh-gsskeyex-06



The document says:

   The client SHOULD NOT send more then one gssapi mechanism OID unless
   there are no non-GSSAPI authentication methods between the GSSAPI
   mechanisms in the order of preference, otherwise, authentication
   methods may be executed out of order.

Besides having four (!) negations, I think some hints on how different
GSSAPI mechanisms should be handled instead would be useful.  E.g.:

   The client SHOULD send more than one mechanism OIDs only when all
   of the mechanisms are of the same priority, compared to non-GSSAPI
   authentication methods.  Otherwise, authentication methods may be
   executed out of order.  Thus, the client could first send a
   SSH_MSG_USERAUTH_REQUEST for one GSSAPI mechanism, then try public
   key authentication, and then try another GSSAPI mechanism.

FWIW, another implementation of the GSSAPI user authentication part of
the specification is available.  Patches (experimental!) for LSH using
GSSLib, Heimdal or MIT Kerberos 5, are available from
<http://josefsson.org/gss/gss-lsh.html>.

Thanks,
Simon




Home | Main Index | Thread Index | Old Index