diff options
author | Damien Miller <djm@mindrot.org> | 1999-11-25 00:26:21 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 1999-11-25 00:26:21 +1100 |
commit | 95def09838fc61b37b6ea7cd5c234a465b4b129b (patch) | |
tree | 042744f76f40a326b873cb1c3690a6d7d966bc3e /servconf.h | |
parent | 4d2f15f895f4c795afc008aeff3fd2ceffbc44f4 (diff) |
- Merged very large OpenBSD source code reformat
- OpenBSD CVS updates
- [channels.c cipher.c compat.c log-client.c scp.c serverloop.c]
[ssh.h sshd.8 sshd.c]
syslog changes:
* Unified Logmessage for all auth-types, for success and for failed
* Standard connections get only ONE line in the LOG when level==LOG:
Auth-attempts are logged only, if authentication is:
a) successfull or
b) with passwd or
c) we had more than AUTH_FAIL_LOG failues
* many log() became verbose()
* old behaviour with level=VERBOSE
- [readconf.c readconf.h ssh.1 ssh.h sshconnect.c sshd.c]
tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGE
messages. allows use of s/key in windows (ttssh, securecrt) and
ssh-1.2.27 clients without 'ssh -v', ok: niels@
- [sshd.8]
-V, for fallback to openssh in SSH2 compatibility mode
- [sshd.c]
fix sigchld race; cjc5@po.cwru.edu
Diffstat (limited to 'servconf.h')
-rw-r--r-- | servconf.h | 142 |
1 files changed, 77 insertions, 65 deletions
diff --git a/servconf.h b/servconf.h index e16f3d044..4f3238e0c 100644 --- a/servconf.h +++ b/servconf.h | |||
@@ -1,86 +1,98 @@ | |||
1 | /* | 1 | /* |
2 | * | ||
3 | * servconf.h | ||
4 | * | ||
5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | ||
6 | * | ||
7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | ||
8 | * All rights reserved | ||
9 | * | ||
10 | * Created: Mon Aug 21 15:35:03 1995 ylo | ||
11 | * | ||
12 | * Definitions for server configuration data and for the functions reading it. | ||
13 | * | ||
14 | */ | ||
2 | 15 | ||
3 | servconf.h | 16 | /* RCSID("$Id: servconf.h,v 1.4 1999/11/24 13:26:22 damien Exp $"); */ |
4 | |||
5 | Author: Tatu Ylonen <ylo@cs.hut.fi> | ||
6 | |||
7 | Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | ||
8 | All rights reserved | ||
9 | |||
10 | Created: Mon Aug 21 15:35:03 1995 ylo | ||
11 | |||
12 | Definitions for server configuration data and for the functions reading it. | ||
13 | |||
14 | */ | ||
15 | |||
16 | /* RCSID("$Id: servconf.h,v 1.3 1999/11/12 00:33:04 damien Exp $"); */ | ||
17 | 17 | ||
18 | #ifndef SERVCONF_H | 18 | #ifndef SERVCONF_H |
19 | #define SERVCONF_H | 19 | #define SERVCONF_H |
20 | 20 | ||
21 | #define MAX_ALLOW_USERS 256 /* Max # users on allow list. */ | 21 | #define MAX_ALLOW_USERS 256 /* Max # users on allow list. */ |
22 | #define MAX_DENY_USERS 256 /* Max # users on deny list. */ | 22 | #define MAX_DENY_USERS 256 /* Max # users on deny list. */ |
23 | #define MAX_ALLOW_GROUPS 256 /* Max # groups on allow list. */ | 23 | #define MAX_ALLOW_GROUPS 256 /* Max # groups on allow list. */ |
24 | #define MAX_DENY_GROUPS 256 /* Max # groups on deny list. */ | 24 | #define MAX_DENY_GROUPS 256 /* Max # groups on deny list. */ |
25 | 25 | ||
26 | typedef struct | 26 | typedef struct { |
27 | { | 27 | int port; /* Port number to listen on. */ |
28 | int port; /* Port number to listen on. */ | 28 | struct in_addr listen_addr; /* Address on which the server |
29 | struct in_addr listen_addr; /* Address on which the server listens. */ | 29 | * listens. */ |
30 | char *host_key_file; /* File containing host key. */ | 30 | char *host_key_file; /* File containing host key. */ |
31 | int server_key_bits; /* Size of the server key. */ | 31 | int server_key_bits;/* Size of the server key. */ |
32 | int login_grace_time; /* Disconnect if no auth in this time (sec). */ | 32 | int login_grace_time; /* Disconnect if no auth in this time |
33 | int key_regeneration_time; /* Server key lifetime (seconds). */ | 33 | * (sec). */ |
34 | int permit_root_login; /* If true, permit root login. */ | 34 | int key_regeneration_time; /* Server key lifetime (seconds). */ |
35 | int ignore_rhosts; /* Ignore .rhosts and .shosts. */ | 35 | int permit_root_login; /* If true, permit root login. */ |
36 | int ignore_user_known_hosts; /* Ignore ~/.ssh/known_hosts for RhostsRsaAuth */ | 36 | int ignore_rhosts; /* Ignore .rhosts and .shosts. */ |
37 | int print_motd; /* If true, print /etc/motd. */ | 37 | int ignore_user_known_hosts; /* Ignore ~/.ssh/known_hosts |
38 | int check_mail; /* If true, check for new mail. */ | 38 | * for RhostsRsaAuth */ |
39 | int x11_forwarding; /* If true, permit inet (spoofing) X11 fwd. */ | 39 | int print_motd; /* If true, print /etc/motd. */ |
40 | int x11_display_offset; /* What DISPLAY number to start searching at */ | 40 | int check_mail; /* If true, check for new mail. */ |
41 | int strict_modes; /* If true, require string home dir modes. */ | 41 | int x11_forwarding; /* If true, permit inet (spoofing) X11 fwd. */ |
42 | int keepalives; /* If true, set SO_KEEPALIVE. */ | 42 | int x11_display_offset; /* What DISPLAY number to start |
43 | SyslogFacility log_facility; /* Facility for system logging. */ | 43 | * searching at */ |
44 | LogLevel log_level; /* Level for system logging. */ | 44 | int strict_modes; /* If true, require string home dir modes. */ |
45 | int rhosts_authentication; /* If true, permit rhosts authentication. */ | 45 | int keepalives; /* If true, set SO_KEEPALIVE. */ |
46 | int rhosts_rsa_authentication;/* If true, permit rhosts RSA authentication.*/ | 46 | SyslogFacility log_facility; /* Facility for system logging. */ |
47 | int rsa_authentication; /* If true, permit RSA authentication. */ | 47 | LogLevel log_level; /* Level for system logging. */ |
48 | int rhosts_authentication; /* If true, permit rhosts | ||
49 | * authentication. */ | ||
50 | int rhosts_rsa_authentication; /* If true, permit rhosts RSA | ||
51 | * authentication. */ | ||
52 | int rsa_authentication; /* If true, permit RSA authentication. */ | ||
48 | #ifdef KRB4 | 53 | #ifdef KRB4 |
49 | int kerberos_authentication; /* If true, permit Kerberos authentication. */ | 54 | int kerberos_authentication; /* If true, permit Kerberos |
50 | int kerberos_or_local_passwd; /* If true, permit kerberos and any other | 55 | * authentication. */ |
51 | password authentication mechanism, such | 56 | int kerberos_or_local_passwd; /* If true, permit kerberos |
52 | as SecurID or /etc/passwd */ | 57 | * and any other password |
53 | int kerberos_ticket_cleanup; /* If true, destroy ticket file on logout. */ | 58 | * authentication mechanism, |
59 | * such as SecurID or | ||
60 | * /etc/passwd */ | ||
61 | int kerberos_ticket_cleanup; /* If true, destroy ticket | ||
62 | * file on logout. */ | ||
54 | #endif | 63 | #endif |
55 | #ifdef AFS | 64 | #ifdef AFS |
56 | int kerberos_tgt_passing; /* If true, permit Kerberos tgt passing. */ | 65 | int kerberos_tgt_passing; /* If true, permit Kerberos tgt |
57 | int afs_token_passing; /* If true, permit AFS token passing. */ | 66 | * passing. */ |
67 | int afs_token_passing; /* If true, permit AFS token passing. */ | ||
58 | #endif | 68 | #endif |
59 | int password_authentication; /* If true, permit password authentication. */ | 69 | int password_authentication; /* If true, permit password |
70 | * authentication. */ | ||
60 | #ifdef SKEY | 71 | #ifdef SKEY |
61 | int skey_authentication; /* If true, permit s/key authentication. */ | 72 | int skey_authentication; /* If true, permit s/key |
73 | * authentication. */ | ||
62 | #endif | 74 | #endif |
63 | int permit_empty_passwd; /* If false, do not permit empty passwords. */ | 75 | int permit_empty_passwd; /* If false, do not permit empty |
64 | int use_login; /* If true, login(1) is used */ | 76 | * passwords. */ |
65 | unsigned int num_allow_users; | 77 | int use_login; /* If true, login(1) is used */ |
66 | char *allow_users[MAX_ALLOW_USERS]; | 78 | unsigned int num_allow_users; |
67 | unsigned int num_deny_users; | 79 | char *allow_users[MAX_ALLOW_USERS]; |
68 | char *deny_users[MAX_DENY_USERS]; | 80 | unsigned int num_deny_users; |
69 | unsigned int num_allow_groups; | 81 | char *deny_users[MAX_DENY_USERS]; |
70 | char *allow_groups[MAX_ALLOW_GROUPS]; | 82 | unsigned int num_allow_groups; |
71 | unsigned int num_deny_groups; | 83 | char *allow_groups[MAX_ALLOW_GROUPS]; |
72 | char *deny_groups[MAX_DENY_GROUPS]; | 84 | unsigned int num_deny_groups; |
73 | } ServerOptions; | 85 | char *deny_groups[MAX_DENY_GROUPS]; |
74 | 86 | } ServerOptions; | |
75 | /* Initializes the server options to special values that indicate that they | 87 | /* Initializes the server options to special values that indicate that they |
76 | have not yet been set. */ | 88 | have not yet been set. */ |
77 | void initialize_server_options(ServerOptions *options); | 89 | void initialize_server_options(ServerOptions * options); |
78 | 90 | ||
79 | /* Reads the server configuration file. This only sets the values for those | 91 | /* Reads the server configuration file. This only sets the values for those |
80 | options that have the special value indicating they have not been set. */ | 92 | options that have the special value indicating they have not been set. */ |
81 | void read_server_config(ServerOptions *options, const char *filename); | 93 | void read_server_config(ServerOptions * options, const char *filename); |
82 | 94 | ||
83 | /* Sets values for those values that have not yet been set. */ | 95 | /* Sets values for those values that have not yet been set. */ |
84 | void fill_default_server_options(ServerOptions *options); | 96 | void fill_default_server_options(ServerOptions * options); |
85 | 97 | ||
86 | #endif /* SERVCONF_H */ | 98 | #endif /* SERVCONF_H */ |