blob: c94633bdce42262fcea6ff2de604856c966ff41a [file] [log] [blame]
Damien Miller232cfb12010-06-26 09:50:30 +10001/* $OpenBSD: ssh.h,v 1.79 2010/06/25 07:14:46 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millerd4a8b7e1999-10-27 13:42:43 +10003/*
Damien Miller95def091999-11-25 00:26:21 +11004 * Author: Tatu Ylonen <ylo@cs.hut.fi>
Damien Miller95def091999-11-25 00:26:21 +11005 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
Damien Miller4af51302000-04-16 11:18:38 +10007 *
Damien Millere4340be2000-09-16 13:29:08 +11008 * As far as I am concerned, the code I have written for this software
9 * can be used freely for any purpose. Any derived versions of this
10 * software must be clearly marked as such, and if the derived work is
11 * incompatible with the protocol description in the RFC file, it must be
12 * called by a name other than "ssh" or "Secure Shell".
Damien Miller95def091999-11-25 00:26:21 +110013 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100014
Damien Millerd4a8b7e1999-10-27 13:42:43 +100015/* Cipher used for encrypting authentication files. */
16#define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES
17
18/* Default port number. */
19#define SSH_DEFAULT_PORT 22
20
Damien Miller5428f641999-11-25 11:54:57 +110021/*
22 * Maximum number of RSA authentication identity files that can be specified
23 * in configuration files or on the command line.
24 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100025#define SSH_MAX_IDENTITY_FILES 100
26
Damien Miller5428f641999-11-25 11:54:57 +110027/*
Darren Tucker22cc7412004-12-06 22:47:41 +110028 * Maximum length of lines in authorized_keys file.
29 * Current value permits 16kbit RSA and RSA1 keys and 8kbit DSA keys, with
30 * some room for options and comments.
31 */
32#define SSH_MAX_PUBKEY_BYTES 8192
33
34/*
Ben Lindstrom2e14bc72002-06-06 20:56:07 +000035 * Major protocol version. Different version indicates major incompatibility
Damien Miller5428f641999-11-25 11:54:57 +110036 * that prevents communication.
Damien Miller78928792000-04-12 20:17:38 +100037 *
Damien Miller5428f641999-11-25 11:54:57 +110038 * Minor protocol version. Different version indicates minor incompatibility
39 * that does not prevent interoperation.
40 */
Damien Miller78928792000-04-12 20:17:38 +100041#define PROTOCOL_MAJOR_1 1
42#define PROTOCOL_MINOR_1 5
43
44/* We support both SSH1 and SSH2 */
45#define PROTOCOL_MAJOR_2 2
46#define PROTOCOL_MINOR_2 0
Damien Millerd4a8b7e1999-10-27 13:42:43 +100047
Damien Miller5428f641999-11-25 11:54:57 +110048/*
49 * Name for the service. The port named by this service overrides the
50 * default port if present.
51 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100052#define SSH_SERVICE_NAME "ssh"
53
Damien Miller5428f641999-11-25 11:54:57 +110054/*
Ben Lindstrom5590aa52002-06-23 00:30:30 +000055 * Name of the environment variable containing the process ID of the
56 * authentication agent.
Damien Miller5428f641999-11-25 11:54:57 +110057 */
Kevin Steves28a7f262001-02-05 15:43:59 +000058#define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100059
Damien Miller5428f641999-11-25 11:54:57 +110060/*
61 * Name of the environment variable containing the pathname of the
62 * authentication socket.
63 */
Ben Lindstrom226cfa02001-01-22 05:34:40 +000064#define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100065
Damien Miller5428f641999-11-25 11:54:57 +110066/*
Ben Lindstrom226cfa02001-01-22 05:34:40 +000067 * Environment variable for overwriting the default location of askpass
Damien Miller5428f641999-11-25 11:54:57 +110068 */
Damien Milleraae6c611999-12-06 11:47:28 +110069#define SSH_ASKPASS_ENV "SSH_ASKPASS"
70
71/*
Damien Miller5428f641999-11-25 11:54:57 +110072 * Force host key length and server key length to differ by at least this
73 * many bits. This is to make double encryption with rsaref work.
74 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100075#define SSH_KEY_BITS_RESERVED 128
76
Damien Miller5428f641999-11-25 11:54:57 +110077/*
78 * Length of the session key in bytes. (Specified as 256 bits in the
79 * protocol.)
80 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100081#define SSH_SESSION_KEY_LENGTH 32
82
Ben Lindstrom2b1f71b2001-06-05 20:32:21 +000083/* Used to identify ``EscapeChar none'' */
84#define SSH_ESCAPECHAR_NONE -2
85
Ben Lindstromc7431342002-03-22 03:11:49 +000086/*
87 * unprivileged user when UsePrivilegeSeparation=yes;
Ben Lindstrom966bfda2002-05-15 16:09:57 +000088 * sshd will change its privileges to this user and its
Ben Lindstromc7431342002-03-22 03:11:49 +000089 * primary group.
90 */
Kevin Steves7ff91122002-04-07 19:22:54 +000091#ifndef SSH_PRIVSEP_USER
Ben Lindstrom973be002002-05-15 16:08:48 +000092#define SSH_PRIVSEP_USER "sshd"
Kevin Steves7ff91122002-04-07 19:22:54 +000093#endif
Ben Lindstromc7431342002-03-22 03:11:49 +000094
Ben Lindstrom03f39322002-04-02 20:43:11 +000095/* Minimum modulus size (n) for RSA keys. */
96#define SSH_RSA_MINIMUM_MODULUS_SIZE 768
97
Darren Tucker3175eb92003-12-09 19:15:11 +110098/* Listen backlog for sshd, ssh-agent and forwarding sockets */
99#define SSH_LISTEN_BACKLOG 128