1 /*
2 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
3 * All rights reserved
4 *
5 * As far as I am concerned, the code I have written for this software
6 * can be used freely for any purpose. Any derived versions of this
7 * software must be clearly marked as such, and if the derived work is
8 * incompatible with the protocol description in the RFC file, it must be
9 * called by a name other than "ssh" or "Secure Shell".
10 */
11 /*
12 * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
13 */
14
15 #include "includes.h"
16 RCSID("$OpenBSD: servconf.c,v 1.115 2002/09/04 18:52:42 stevesk Exp $");
17
18 #ifdef HAVE_DEFOPEN
19 #include <deflt.h>
20 #endif /* HAVE_DEFOPEN */
21
22 #if defined(KRB4)
23 #include <krb.h>
24 #endif
25 #if defined(KRB5)
26 #ifdef HEIMDAL
27 #include <krb.h>
28 #else
29 /* Bodge - but then, so is using the kerberos IV KEYFILE to get a Kerberos V
30 * keytab */
31 #define KEYFILE "/etc/krb5.keytab"
32 #endif
486 #endif
487 { "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
488 { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
489 { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
490 { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
491 { "checkmail", sDeprecated, SSHCFG_GLOBAL },
492 { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
493 { "printmotd", sPrintMotd, SSHCFG_GLOBAL },
494 { "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
495 { "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
496 { "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
497 { "x11forwarding", sX11Forwarding, SSHCFG_ALL },
498 { "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
499 { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
500 { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
501 { "strictmodes", sStrictModes, SSHCFG_GLOBAL },
502 { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
503 { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
504 { "uselogin", sUseLogin, SSHCFG_GLOBAL },
505 { "compression", sCompression, SSHCFG_GLOBAL },
506 { "keepalive", sKeepAlives, SSHCFG_GLOBAL },
507 { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
508 { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
509 { "denyusers", sDenyUsers, SSHCFG_GLOBAL },
510 { "allowgroups", sAllowGroups, SSHCFG_GLOBAL },
511 { "denygroups", sDenyGroups, SSHCFG_GLOBAL },
512 { "ciphers", sCiphers, SSHCFG_GLOBAL },
513 { "macs", sMacs, SSHCFG_GLOBAL},
514 { "protocol", sProtocol,SSHCFG_GLOBAL },
515 { "gatewayports", sGatewayPorts, SSHCFG_ALL },
516 { "subsystem", sSubsystem, SSHCFG_GLOBAL},
517 { "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
518 { "banner", sBanner, SSHCFG_ALL },
519 { "verifyreversemapping", sVerifyReverseMapping, SSHCFG_GLOBAL },
520 { "reversemappingcheck", sVerifyReverseMapping,SSHCFG_GLOBAL },
521 { "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
522 { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
523 { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
524 { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
525 { "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
526 { "maxauthtrieslog", sMaxAuthTriesLog, SSHCFG_GLOBAL },
|
1 /*
2 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
3 * All rights reserved
4 *
5 * As far as I am concerned, the code I have written for this software
6 * can be used freely for any purpose. Any derived versions of this
7 * software must be clearly marked as such, and if the derived work is
8 * incompatible with the protocol description in the RFC file, it must be
9 * called by a name other than "ssh" or "Secure Shell".
10 */
11 /*
12 * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
13 * Copyright 2012 Joyent, Inc. All rights reserved.
14 */
15
16 #include "includes.h"
17 RCSID("$OpenBSD: servconf.c,v 1.115 2002/09/04 18:52:42 stevesk Exp $");
18
19 #ifdef HAVE_DEFOPEN
20 #include <deflt.h>
21 #endif /* HAVE_DEFOPEN */
22
23 #if defined(KRB4)
24 #include <krb.h>
25 #endif
26 #if defined(KRB5)
27 #ifdef HEIMDAL
28 #include <krb.h>
29 #else
30 /* Bodge - but then, so is using the kerberos IV KEYFILE to get a Kerberos V
31 * keytab */
32 #define KEYFILE "/etc/krb5.keytab"
33 #endif
487 #endif
488 { "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
489 { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
490 { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
491 { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
492 { "checkmail", sDeprecated, SSHCFG_GLOBAL },
493 { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
494 { "printmotd", sPrintMotd, SSHCFG_GLOBAL },
495 { "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
496 { "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
497 { "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
498 { "x11forwarding", sX11Forwarding, SSHCFG_ALL },
499 { "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
500 { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
501 { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
502 { "strictmodes", sStrictModes, SSHCFG_GLOBAL },
503 { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
504 { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
505 { "uselogin", sUseLogin, SSHCFG_GLOBAL },
506 { "compression", sCompression, SSHCFG_GLOBAL },
507 { "tcpkeepalive", sKeepAlives, SSHCFG_GLOBAL },
508 { "keepalive", sKeepAlives, SSHCFG_GLOBAL }, /* obsolete */
509 { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
510 { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
511 { "denyusers", sDenyUsers, SSHCFG_GLOBAL },
512 { "allowgroups", sAllowGroups, SSHCFG_GLOBAL },
513 { "denygroups", sDenyGroups, SSHCFG_GLOBAL },
514 { "ciphers", sCiphers, SSHCFG_GLOBAL },
515 { "macs", sMacs, SSHCFG_GLOBAL},
516 { "protocol", sProtocol,SSHCFG_GLOBAL },
517 { "gatewayports", sGatewayPorts, SSHCFG_ALL },
518 { "subsystem", sSubsystem, SSHCFG_GLOBAL},
519 { "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
520 { "banner", sBanner, SSHCFG_ALL },
521 { "verifyreversemapping", sVerifyReverseMapping, SSHCFG_GLOBAL },
522 { "reversemappingcheck", sVerifyReverseMapping,SSHCFG_GLOBAL },
523 { "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
524 { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
525 { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
526 { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
527 { "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
528 { "maxauthtrieslog", sMaxAuthTriesLog, SSHCFG_GLOBAL },
|