Print this page
3477 SunSSH config should accept TCPKeepAlive as synonym for KeepAlive
Reviewed by: Jerry Jelinek <jerry@joyent.com>
   1 /*
   2  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
   3  *                    All rights reserved
   4  *
   5  * As far as I am concerned, the code I have written for this software
   6  * can be used freely for any purpose.  Any derived versions of this
   7  * software must be clearly marked as such, and if the derived work is
   8  * incompatible with the protocol description in the RFC file, it must be
   9  * called by a name other than "ssh" or "Secure Shell".
  10  */
  11 /*
  12  * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.

  13  */
  14 
  15 #include "includes.h"
  16 RCSID("$OpenBSD: servconf.c,v 1.115 2002/09/04 18:52:42 stevesk Exp $");
  17 
  18 #ifdef HAVE_DEFOPEN
  19 #include <deflt.h>
  20 #endif /* HAVE_DEFOPEN */
  21 
  22 #if defined(KRB4)
  23 #include <krb.h>
  24 #endif
  25 #if defined(KRB5)
  26 #ifdef HEIMDAL
  27 #include <krb.h>
  28 #else
  29 /* Bodge - but then, so is using the kerberos IV KEYFILE to get a Kerberos V
  30  * keytab */
  31 #define KEYFILE "/etc/krb5.keytab"
  32 #endif


 484 #endif
 485         { "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
 486         { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
 487         { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
 488         { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
 489         { "checkmail", sDeprecated, SSHCFG_GLOBAL },
 490         { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
 491         { "printmotd", sPrintMotd, SSHCFG_GLOBAL },
 492         { "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
 493         { "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
 494         { "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
 495         { "x11forwarding", sX11Forwarding, SSHCFG_ALL },
 496         { "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
 497         { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
 498         { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
 499         { "strictmodes", sStrictModes, SSHCFG_GLOBAL },
 500         { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
 501         { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
 502         { "uselogin", sUseLogin, SSHCFG_GLOBAL },
 503         { "compression", sCompression, SSHCFG_GLOBAL },
 504         { "keepalive", sKeepAlives, SSHCFG_GLOBAL },

 505         { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
 506         { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
 507         { "denyusers", sDenyUsers, SSHCFG_GLOBAL },
 508         { "allowgroups", sAllowGroups, SSHCFG_GLOBAL },
 509         { "denygroups", sDenyGroups, SSHCFG_GLOBAL },
 510         { "ciphers", sCiphers, SSHCFG_GLOBAL },
 511         { "macs", sMacs, SSHCFG_GLOBAL},
 512         { "protocol", sProtocol,SSHCFG_GLOBAL },
 513         { "gatewayports", sGatewayPorts, SSHCFG_ALL },
 514         { "subsystem", sSubsystem, SSHCFG_GLOBAL},
 515         { "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
 516         { "banner", sBanner, SSHCFG_ALL },
 517         { "verifyreversemapping", sVerifyReverseMapping, SSHCFG_GLOBAL },
 518         { "reversemappingcheck", sVerifyReverseMapping,SSHCFG_GLOBAL },
 519         { "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
 520         { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
 521         { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
 522         { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
 523         { "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
 524         { "maxauthtrieslog", sMaxAuthTriesLog, SSHCFG_GLOBAL },


   1 /*
   2  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
   3  *                    All rights reserved
   4  *
   5  * As far as I am concerned, the code I have written for this software
   6  * can be used freely for any purpose.  Any derived versions of this
   7  * software must be clearly marked as such, and if the derived work is
   8  * incompatible with the protocol description in the RFC file, it must be
   9  * called by a name other than "ssh" or "Secure Shell".
  10  */
  11 /*
  12  * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
  13  * Copyright 2013 Joyent, Inc.  All rights reserved.
  14  */
  15 
  16 #include "includes.h"
  17 RCSID("$OpenBSD: servconf.c,v 1.115 2002/09/04 18:52:42 stevesk Exp $");
  18 
  19 #ifdef HAVE_DEFOPEN
  20 #include <deflt.h>
  21 #endif /* HAVE_DEFOPEN */
  22 
  23 #if defined(KRB4)
  24 #include <krb.h>
  25 #endif
  26 #if defined(KRB5)
  27 #ifdef HEIMDAL
  28 #include <krb.h>
  29 #else
  30 /* Bodge - but then, so is using the kerberos IV KEYFILE to get a Kerberos V
  31  * keytab */
  32 #define KEYFILE "/etc/krb5.keytab"
  33 #endif


 485 #endif
 486         { "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
 487         { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
 488         { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
 489         { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
 490         { "checkmail", sDeprecated, SSHCFG_GLOBAL },
 491         { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
 492         { "printmotd", sPrintMotd, SSHCFG_GLOBAL },
 493         { "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
 494         { "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
 495         { "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
 496         { "x11forwarding", sX11Forwarding, SSHCFG_ALL },
 497         { "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
 498         { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
 499         { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
 500         { "strictmodes", sStrictModes, SSHCFG_GLOBAL },
 501         { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
 502         { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
 503         { "uselogin", sUseLogin, SSHCFG_GLOBAL },
 504         { "compression", sCompression, SSHCFG_GLOBAL },
 505         { "tcpkeepalive", sKeepAlives, SSHCFG_GLOBAL },
 506         { "keepalive", sKeepAlives, SSHCFG_GLOBAL },            /* obsolete */
 507         { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
 508         { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
 509         { "denyusers", sDenyUsers, SSHCFG_GLOBAL },
 510         { "allowgroups", sAllowGroups, SSHCFG_GLOBAL },
 511         { "denygroups", sDenyGroups, SSHCFG_GLOBAL },
 512         { "ciphers", sCiphers, SSHCFG_GLOBAL },
 513         { "macs", sMacs, SSHCFG_GLOBAL},
 514         { "protocol", sProtocol,SSHCFG_GLOBAL },
 515         { "gatewayports", sGatewayPorts, SSHCFG_ALL },
 516         { "subsystem", sSubsystem, SSHCFG_GLOBAL},
 517         { "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
 518         { "banner", sBanner, SSHCFG_ALL },
 519         { "verifyreversemapping", sVerifyReverseMapping, SSHCFG_GLOBAL },
 520         { "reversemappingcheck", sVerifyReverseMapping,SSHCFG_GLOBAL },
 521         { "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
 522         { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
 523         { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
 524         { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
 525         { "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
 526         { "maxauthtrieslog", sMaxAuthTriesLog, SSHCFG_GLOBAL },