Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement OpenSSH compat mode with predicate #52

Open
klizhentas opened this issue Nov 29, 2022 · 0 comments
Open

Implement OpenSSH compat mode with predicate #52

klizhentas opened this issue Nov 29, 2022 · 0 comments

Comments

@klizhentas
Copy link
Collaborator

Predicate will not embed linux principals in the login list anymore, because it's not always possible to evaluate beforehand. Not all information is available, at the time the cert is issued. For example node labels could change, and change the list of principals allowed for the node.

This is not a problem for Teleport's SSH nodes. This is a problem for OpenSSH that needs to see the list of principals in the cert.

For OpenSSH compatibility Teleport can terminate SSH (just like it's doing now) and instead of forwarding agent, re-issue a cert for each connection (just like it's doing for K8s).

Push this implementation for end of Q1 in 2023.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant