Bug 409141
Summary: | fully kerberize ssh | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Kevin Krafthefer <krafthef> |
Component: | openssh | Assignee: | Jan F. Chadima <jchadima> |
Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 5.2 | CC: | abo, kwirth, riek |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-10-29 15:27:08 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Kevin Krafthefer
2007-12-03 19:04:46 UTC
I'd like to know the details :) I can only guess, but it's likely this is bug #187211 except for RHEL5, i.e. proper GSSAPI Key Exchange (which would be totally awesome to have). User krafthef's account has been closed No response from reporter. Insufficient data to fix the bug. |