1 /*
2 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
3 * All rights reserved
4 *
5 * As far as I am concerned, the code I have written for this software
6 * can be used freely for any purpose. Any derived versions of this
7 * software must be clearly marked as such, and if the derived work is
8 * incompatible with the protocol description in the RFC file, it must be
9 * called by a name other than "ssh" or "Secure Shell".
10 */
11 /*
12 * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
13 */
14
15 #include "includes.h"
16 RCSID("$OpenBSD: servconf.c,v 1.115 2002/09/04 18:52:42 stevesk Exp $");
17
18 #ifdef HAVE_DEFOPEN
19 #include <deflt.h>
20 #endif /* HAVE_DEFOPEN */
21
22 #if defined(KRB4)
23 #include <krb.h>
24 #endif
25 #if defined(KRB5)
26 #ifdef HEIMDAL
27 #include <krb.h>
28 #else
29 /* Bodge - but then, so is using the kerberos IV KEYFILE to get a Kerberos V
30 * keytab */
31 #define KEYFILE "/etc/krb5.keytab"
32 #endif
484 #endif
485 { "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
486 { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
487 { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
488 { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
489 { "checkmail", sDeprecated, SSHCFG_GLOBAL },
490 { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
491 { "printmotd", sPrintMotd, SSHCFG_GLOBAL },
492 { "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
493 { "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
494 { "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
495 { "x11forwarding", sX11Forwarding, SSHCFG_ALL },
496 { "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
497 { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
498 { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
499 { "strictmodes", sStrictModes, SSHCFG_GLOBAL },
500 { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
501 { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
502 { "uselogin", sUseLogin, SSHCFG_GLOBAL },
503 { "compression", sCompression, SSHCFG_GLOBAL },
504 { "keepalive", sKeepAlives, SSHCFG_GLOBAL },
505 { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
506 { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
507 { "denyusers", sDenyUsers, SSHCFG_GLOBAL },
508 { "allowgroups", sAllowGroups, SSHCFG_GLOBAL },
509 { "denygroups", sDenyGroups, SSHCFG_GLOBAL },
510 { "ciphers", sCiphers, SSHCFG_GLOBAL },
511 { "macs", sMacs, SSHCFG_GLOBAL},
512 { "protocol", sProtocol,SSHCFG_GLOBAL },
513 { "gatewayports", sGatewayPorts, SSHCFG_ALL },
514 { "subsystem", sSubsystem, SSHCFG_GLOBAL},
515 { "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
516 { "banner", sBanner, SSHCFG_ALL },
517 { "verifyreversemapping", sVerifyReverseMapping, SSHCFG_GLOBAL },
518 { "reversemappingcheck", sVerifyReverseMapping,SSHCFG_GLOBAL },
519 { "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
520 { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
521 { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
522 { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
523 { "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
524 { "maxauthtrieslog", sMaxAuthTriesLog, SSHCFG_GLOBAL },
|
1 /*
2 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
3 * All rights reserved
4 *
5 * As far as I am concerned, the code I have written for this software
6 * can be used freely for any purpose. Any derived versions of this
7 * software must be clearly marked as such, and if the derived work is
8 * incompatible with the protocol description in the RFC file, it must be
9 * called by a name other than "ssh" or "Secure Shell".
10 */
11 /*
12 * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
13 * Copyright 2013 Joyent, Inc. All rights reserved.
14 */
15
16 #include "includes.h"
17 RCSID("$OpenBSD: servconf.c,v 1.115 2002/09/04 18:52:42 stevesk Exp $");
18
19 #ifdef HAVE_DEFOPEN
20 #include <deflt.h>
21 #endif /* HAVE_DEFOPEN */
22
23 #if defined(KRB4)
24 #include <krb.h>
25 #endif
26 #if defined(KRB5)
27 #ifdef HEIMDAL
28 #include <krb.h>
29 #else
30 /* Bodge - but then, so is using the kerberos IV KEYFILE to get a Kerberos V
31 * keytab */
32 #define KEYFILE "/etc/krb5.keytab"
33 #endif
485 #endif
486 { "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
487 { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
488 { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
489 { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
490 { "checkmail", sDeprecated, SSHCFG_GLOBAL },
491 { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
492 { "printmotd", sPrintMotd, SSHCFG_GLOBAL },
493 { "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
494 { "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
495 { "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
496 { "x11forwarding", sX11Forwarding, SSHCFG_ALL },
497 { "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
498 { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
499 { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
500 { "strictmodes", sStrictModes, SSHCFG_GLOBAL },
501 { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
502 { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
503 { "uselogin", sUseLogin, SSHCFG_GLOBAL },
504 { "compression", sCompression, SSHCFG_GLOBAL },
505 { "tcpkeepalive", sKeepAlives, SSHCFG_GLOBAL },
506 { "keepalive", sKeepAlives, SSHCFG_GLOBAL }, /* obsolete */
507 { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
508 { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
509 { "denyusers", sDenyUsers, SSHCFG_GLOBAL },
510 { "allowgroups", sAllowGroups, SSHCFG_GLOBAL },
511 { "denygroups", sDenyGroups, SSHCFG_GLOBAL },
512 { "ciphers", sCiphers, SSHCFG_GLOBAL },
513 { "macs", sMacs, SSHCFG_GLOBAL},
514 { "protocol", sProtocol,SSHCFG_GLOBAL },
515 { "gatewayports", sGatewayPorts, SSHCFG_ALL },
516 { "subsystem", sSubsystem, SSHCFG_GLOBAL},
517 { "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
518 { "banner", sBanner, SSHCFG_ALL },
519 { "verifyreversemapping", sVerifyReverseMapping, SSHCFG_GLOBAL },
520 { "reversemappingcheck", sVerifyReverseMapping,SSHCFG_GLOBAL },
521 { "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
522 { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
523 { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
524 { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
525 { "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
526 { "maxauthtrieslog", sMaxAuthTriesLog, SSHCFG_GLOBAL },
|