Bug 409141

Summary: fully kerberize ssh
Product: Red Hat Enterprise Linux 5 Reporter: Kevin Krafthefer <krafthef>
Component: opensshAssignee: Jan F. Chadima <jchadima>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: high    
Version: 5.2CC: abo, kwirth, riek
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-10-29 15:27:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Kevin Krafthefer 2007-12-03 19:04:46 UTC
Description of problem:


Version-Release number of selected component (if applicable):
Due to IPA requirements, ssh needs to be kerberized. For details, please see
Karl Wirth.

How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 1 Tomas Mraz 2007-12-03 19:17:35 UTC
I'd like to know the details :)


Comment 2 Alexander Boström 2008-01-08 15:18:17 UTC
I can only guess, but it's likely this is bug #187211 except for RHEL5, i.e.
proper GSSAPI Key Exchange (which would be totally awesome to have).


Comment 3 Tony Fu 2008-10-06 01:47:07 UTC
User krafthef's account has been closed

Comment 4 Jan F. Chadima 2009-10-29 15:27:08 UTC
No response from reporter. Insufficient data to fix the bug.