blob: ed5fb9aaae63fe5f56828300180092790a037c41 [file] [log] [blame]
Damien Miller51096382006-03-26 14:30:00 +11001/* $OpenBSD: ssh.h,v 1.77 2006/03/25 22:22:43 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millerd4a8b7e1999-10-27 13:42:43 +10003/*
Damien Miller95def091999-11-25 00:26:21 +11004 * Author: Tatu Ylonen <ylo@cs.hut.fi>
Damien Miller95def091999-11-25 00:26:21 +11005 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
Damien Miller4af51302000-04-16 11:18:38 +10007 *
Damien Millere4340be2000-09-16 13:29:08 +11008 * As far as I am concerned, the code I have written for this software
9 * can be used freely for any purpose. Any derived versions of this
10 * software must be clearly marked as such, and if the derived work is
11 * incompatible with the protocol description in the RFC file, it must be
12 * called by a name other than "ssh" or "Secure Shell".
Damien Miller95def091999-11-25 00:26:21 +110013 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100014
Damien Millerd4a8b7e1999-10-27 13:42:43 +100015#ifndef SSH_H
16#define SSH_H
17
Damien Millerab18c411999-11-11 10:40:23 +110018#include <netinet/in.h> /* For struct sockaddr_in */
19#include <pwd.h> /* For struct pw */
Damien Miller5ce662a1999-11-11 17:57:39 +110020#include <stdarg.h> /* For va_list */
Damien Miller6dbfef62000-11-29 13:51:06 +110021#include <syslog.h> /* For LOG_AUTH and friends */
Damien Miller34132e52000-01-14 15:45:46 +110022#include <sys/socket.h> /* For struct sockaddr_storage */
Damien Miller365199d1999-12-22 00:12:38 +110023#ifdef HAVE_SYS_SELECT_H
24# include <sys/select.h>
25#endif
Ben Lindstrom226cfa02001-01-22 05:34:40 +000026
Damien Millerd4a8b7e1999-10-27 13:42:43 +100027/* Cipher used for encrypting authentication files. */
28#define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES
29
30/* Default port number. */
31#define SSH_DEFAULT_PORT 22
32
33/* Maximum number of TCP/IP ports forwarded per direction. */
34#define SSH_MAX_FORWARDS_PER_DIRECTION 100
35
Damien Miller5428f641999-11-25 11:54:57 +110036/*
37 * Maximum number of RSA authentication identity files that can be specified
38 * in configuration files or on the command line.
39 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100040#define SSH_MAX_IDENTITY_FILES 100
41
Damien Miller5428f641999-11-25 11:54:57 +110042/*
Darren Tucker22cc7412004-12-06 22:47:41 +110043 * Maximum length of lines in authorized_keys file.
44 * Current value permits 16kbit RSA and RSA1 keys and 8kbit DSA keys, with
45 * some room for options and comments.
46 */
47#define SSH_MAX_PUBKEY_BYTES 8192
48
49/*
Ben Lindstrom2e14bc72002-06-06 20:56:07 +000050 * Major protocol version. Different version indicates major incompatibility
Damien Miller5428f641999-11-25 11:54:57 +110051 * that prevents communication.
Damien Miller78928792000-04-12 20:17:38 +100052 *
Damien Miller5428f641999-11-25 11:54:57 +110053 * Minor protocol version. Different version indicates minor incompatibility
54 * that does not prevent interoperation.
55 */
Damien Miller78928792000-04-12 20:17:38 +100056#define PROTOCOL_MAJOR_1 1
57#define PROTOCOL_MINOR_1 5
58
59/* We support both SSH1 and SSH2 */
60#define PROTOCOL_MAJOR_2 2
61#define PROTOCOL_MINOR_2 0
Damien Millerd4a8b7e1999-10-27 13:42:43 +100062
Damien Miller5428f641999-11-25 11:54:57 +110063/*
64 * Name for the service. The port named by this service overrides the
65 * default port if present.
66 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100067#define SSH_SERVICE_NAME "ssh"
68
Damien Miller5428f641999-11-25 11:54:57 +110069/*
Ben Lindstrom5590aa52002-06-23 00:30:30 +000070 * Name of the environment variable containing the process ID of the
71 * authentication agent.
Damien Miller5428f641999-11-25 11:54:57 +110072 */
Kevin Steves28a7f262001-02-05 15:43:59 +000073#define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100074
Damien Miller5428f641999-11-25 11:54:57 +110075/*
76 * Name of the environment variable containing the pathname of the
77 * authentication socket.
78 */
Ben Lindstrom226cfa02001-01-22 05:34:40 +000079#define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100080
Damien Miller5428f641999-11-25 11:54:57 +110081/*
Ben Lindstrom226cfa02001-01-22 05:34:40 +000082 * Environment variable for overwriting the default location of askpass
Damien Miller5428f641999-11-25 11:54:57 +110083 */
Damien Milleraae6c611999-12-06 11:47:28 +110084#define SSH_ASKPASS_ENV "SSH_ASKPASS"
85
86/*
Damien Miller5428f641999-11-25 11:54:57 +110087 * Force host key length and server key length to differ by at least this
88 * many bits. This is to make double encryption with rsaref work.
89 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100090#define SSH_KEY_BITS_RESERVED 128
91
Damien Miller5428f641999-11-25 11:54:57 +110092/*
93 * Length of the session key in bytes. (Specified as 256 bits in the
94 * protocol.)
95 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100096#define SSH_SESSION_KEY_LENGTH 32
97
Ben Lindstrom2b1f71b2001-06-05 20:32:21 +000098/* Used to identify ``EscapeChar none'' */
99#define SSH_ESCAPECHAR_NONE -2
100
Ben Lindstromc7431342002-03-22 03:11:49 +0000101/*
102 * unprivileged user when UsePrivilegeSeparation=yes;
Ben Lindstrom966bfda2002-05-15 16:09:57 +0000103 * sshd will change its privileges to this user and its
Ben Lindstromc7431342002-03-22 03:11:49 +0000104 * primary group.
105 */
Kevin Steves7ff91122002-04-07 19:22:54 +0000106#ifndef SSH_PRIVSEP_USER
Ben Lindstrom973be002002-05-15 16:08:48 +0000107#define SSH_PRIVSEP_USER "sshd"
Kevin Steves7ff91122002-04-07 19:22:54 +0000108#endif
Ben Lindstromc7431342002-03-22 03:11:49 +0000109
Ben Lindstrom03f39322002-04-02 20:43:11 +0000110/* Minimum modulus size (n) for RSA keys. */
111#define SSH_RSA_MINIMUM_MODULUS_SIZE 768
112
Darren Tucker3175eb92003-12-09 19:15:11 +1100113/* Listen backlog for sshd, ssh-agent and forwarding sockets */
114#define SSH_LISTEN_BACKLOG 128
115
Damien Miller95def091999-11-25 00:26:21 +1100116#endif /* SSH_H */