2006
DOI: 10.17487/rfc4462
|View full text |Cite
|
Sign up to set email alerts
|

Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…Section 7.3 of [RFC4462]describes the problem referencing the Secure Shell (SSH) Protocol key exchange negotiation and the SPNEGO GSS-API mechanism. If a client preferred an EAP method A, a non-EAP authentication mechanism B, and then an EAP RFC 7055 EAP GSS-API December 2013 method C, then the client would have to commit to using EAP before learning whether A is actually supported.…”
Section: Selection Of Eap Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Section 7.3 of [RFC4462]describes the problem referencing the Secure Shell (SSH) Protocol key exchange negotiation and the SPNEGO GSS-API mechanism. If a client preferred an EAP method A, a non-EAP authentication mechanism B, and then an EAP RFC 7055 EAP GSS-API December 2013 method C, then the client would have to commit to using EAP before learning whether A is actually supported.…”
Section: Selection Of Eap Methodsmentioning
confidence: 99%
“…The only flag defined so far is GSS_C_MUTUAL_FLAG, indicating that the initiator successfully performed mutual authentication of the acceptor. This flag is communicated to the acceptor because some protocols [RFC4462] require the acceptor to know whether the initiator has confirmed its identity. This flag has the value 0x2 to be consistent with RFC 2744.…”
Section: Flags Subtokenmentioning
confidence: 99%
See 1 more Smart Citation
“…The public key algorithms and encodings defined in this document SHOULD be accepted any place in the Secure Shell protocol suite where public keys are used, including, but not limited to, the following protocol messages for server authentication and user authentication: o in the SSH_MSG_USERAUTH_REQUEST message when "publickey" authentication is used [RFC4252] o in the SSH_MSG_USERAUTH_REQUEST message when "hostbased" authentication is used [RFC4252] o in the SSH_MSG_KEXDH_REPLY message [RFC4253] o in the SSH_MSG_KEXRSA_PUBKEY message [RFC4432] o in the SSH_MSG_KEXGSS_HOSTKEY message [RFC4462] o in the SSH_MSG_KEX_ECDH_REPLY message [RFC5656] o in the SSH_MSG_KEX_ECMQV_REPLY message [RFC5656] When a public key from this specification is included in the input to a hash algorithm, the exact bytes that are transmitted on the wire must be used as input to the hash functions. In particular, implementations MUST NOT omit any of the chain certificates or OCSP responses that were included on the wire, nor change encoding of the certificate or OCSP data.…”
Section: Use In Public Key Algorithmsmentioning
confidence: 99%
“…As such, individual application protocol specifications have had to specify the structure of their GSS negotiation loops, including error handling, on a perprotocol basis (see [RFC4462], [RFC3645], [RFC5801], [RFC4752], and [RFC2203]). This represents a substantial duplication of effort, and the various specifications go into different levels of detail and describe different possible error conditions.…”
mentioning
confidence: 99%