diff options
author | naddy@openbsd.org <naddy@openbsd.org> | 2016-08-15 12:27:56 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2016-08-23 13:28:30 +1000 |
commit | c38ea634893a1975dbbec798fb968c9488013f4a (patch) | |
tree | 29d9dcc51011ed7677e85b6ce2cabb25faedf74e /servconf.h | |
parent | 33ba55d9e358c07f069e579bfab80eccaaad52cb (diff) |
upstream commit
Remove more SSH1 server code: * Drop sshd's -k option. *
Retire configuration keywords that only apply to protocol 1, as well as the
"protocol" keyword. * Remove some related vestiges of protocol 1 support.
ok markus@
Upstream-ID: 9402f82886de917779db12f8ee3f03d4decc244d
Diffstat (limited to 'servconf.h')
-rw-r--r-- | servconf.h | 8 |
1 files changed, 1 insertions, 7 deletions
diff --git a/servconf.h b/servconf.h index f4137af7d..16b1467d2 100644 --- a/servconf.h +++ b/servconf.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.h,v 1.120 2015/07/10 06:21:53 markus Exp $ */ | 1 | /* $OpenBSD: servconf.h,v 1.121 2016/08/15 12:27:56 naddy Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -69,10 +69,8 @@ typedef struct { | |||
69 | int num_host_cert_files; /* Number of files for host certs. */ | 69 | int num_host_cert_files; /* Number of files for host certs. */ |
70 | char *host_key_agent; /* ssh-agent socket for host keys. */ | 70 | char *host_key_agent; /* ssh-agent socket for host keys. */ |
71 | char *pid_file; /* Where to put our pid */ | 71 | char *pid_file; /* Where to put our pid */ |
72 | int server_key_bits;/* Size of the server key. */ | ||
73 | int login_grace_time; /* Disconnect if no auth in this time | 72 | int login_grace_time; /* Disconnect if no auth in this time |
74 | * (sec). */ | 73 | * (sec). */ |
75 | int key_regeneration_time; /* Server key lifetime (seconds). */ | ||
76 | int permit_root_login; /* PERMIT_*, see above */ | 74 | int permit_root_login; /* PERMIT_*, see above */ |
77 | int ignore_rhosts; /* Ignore .rhosts and .shosts. */ | 75 | int ignore_rhosts; /* Ignore .rhosts and .shosts. */ |
78 | int ignore_user_known_hosts; /* Ignore ~/.ssh/known_hosts | 76 | int ignore_user_known_hosts; /* Ignore ~/.ssh/known_hosts |
@@ -93,17 +91,13 @@ typedef struct { | |||
93 | char *ciphers; /* Supported SSH2 ciphers. */ | 91 | char *ciphers; /* Supported SSH2 ciphers. */ |
94 | char *macs; /* Supported SSH2 macs. */ | 92 | char *macs; /* Supported SSH2 macs. */ |
95 | char *kex_algorithms; /* SSH2 kex methods in order of preference. */ | 93 | char *kex_algorithms; /* SSH2 kex methods in order of preference. */ |
96 | int protocol; /* Supported protocol versions. */ | ||
97 | struct ForwardOptions fwd_opts; /* forwarding options */ | 94 | struct ForwardOptions fwd_opts; /* forwarding options */ |
98 | SyslogFacility log_facility; /* Facility for system logging. */ | 95 | SyslogFacility log_facility; /* Facility for system logging. */ |
99 | LogLevel log_level; /* Level for system logging. */ | 96 | LogLevel log_level; /* Level for system logging. */ |
100 | int rhosts_rsa_authentication; /* If true, permit rhosts RSA | ||
101 | * authentication. */ | ||
102 | int hostbased_authentication; /* If true, permit ssh2 hostbased auth */ | 97 | int hostbased_authentication; /* If true, permit ssh2 hostbased auth */ |
103 | int hostbased_uses_name_from_packet_only; /* experimental */ | 98 | int hostbased_uses_name_from_packet_only; /* experimental */ |
104 | char *hostbased_key_types; /* Key types allowed for hostbased */ | 99 | char *hostbased_key_types; /* Key types allowed for hostbased */ |
105 | char *hostkeyalgorithms; /* SSH2 server key types */ | 100 | char *hostkeyalgorithms; /* SSH2 server key types */ |
106 | int rsa_authentication; /* If true, permit RSA authentication. */ | ||
107 | int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */ | 101 | int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */ |
108 | char *pubkey_key_types; /* Key types allowed for public key */ | 102 | char *pubkey_key_types; /* Key types allowed for public key */ |
109 | int kerberos_authentication; /* If true, permit Kerberos | 103 | int kerberos_authentication; /* If true, permit Kerberos |