blob: 50467a792bdf07a16c0acd4c4018b1060e2835c3 [file] [log] [blame]
djm@openbsd.orgcce6a362015-12-11 03:19:09 +00001/* $OpenBSD: ssh.h,v 1.83 2015/12/11 03:19:09 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millerd4a8b7e1999-10-27 13:42:43 +10003/*
Damien Miller95def091999-11-25 00:26:21 +11004 * Author: Tatu Ylonen <ylo@cs.hut.fi>
Damien Miller95def091999-11-25 00:26:21 +11005 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
Damien Miller4af51302000-04-16 11:18:38 +10007 *
Damien Millere4340be2000-09-16 13:29:08 +11008 * As far as I am concerned, the code I have written for this software
9 * can be used freely for any purpose. Any derived versions of this
10 * software must be clearly marked as such, and if the derived work is
11 * incompatible with the protocol description in the RFC file, it must be
12 * called by a name other than "ssh" or "Secure Shell".
Damien Miller95def091999-11-25 00:26:21 +110013 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100014
Damien Millerd4a8b7e1999-10-27 13:42:43 +100015/* Cipher used for encrypting authentication files. */
16#define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES
17
18/* Default port number. */
19#define SSH_DEFAULT_PORT 22
20
Damien Miller5428f641999-11-25 11:54:57 +110021/*
djm@openbsd.org4e44a792015-09-24 06:15:11 +000022 * Maximum number of certificate files that can be specified
23 * in configuration files or on the command line.
24 */
25#define SSH_MAX_CERTIFICATE_FILES 100
26
27/*
Damien Miller5428f641999-11-25 11:54:57 +110028 * Maximum number of RSA authentication identity files that can be specified
29 * in configuration files or on the command line.
30 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100031#define SSH_MAX_IDENTITY_FILES 100
32
Damien Miller5428f641999-11-25 11:54:57 +110033/*
Darren Tucker22cc7412004-12-06 22:47:41 +110034 * Maximum length of lines in authorized_keys file.
35 * Current value permits 16kbit RSA and RSA1 keys and 8kbit DSA keys, with
36 * some room for options and comments.
37 */
djm@openbsd.orgcce6a362015-12-11 03:19:09 +000038#define SSH_MAX_PUBKEY_BYTES 16384
Darren Tucker22cc7412004-12-06 22:47:41 +110039
40/*
Ben Lindstrom2e14bc72002-06-06 20:56:07 +000041 * Major protocol version. Different version indicates major incompatibility
Damien Miller5428f641999-11-25 11:54:57 +110042 * that prevents communication.
Damien Miller78928792000-04-12 20:17:38 +100043 *
Damien Miller5428f641999-11-25 11:54:57 +110044 * Minor protocol version. Different version indicates minor incompatibility
45 * that does not prevent interoperation.
46 */
Damien Miller78928792000-04-12 20:17:38 +100047#define PROTOCOL_MAJOR_1 1
48#define PROTOCOL_MINOR_1 5
49
50/* We support both SSH1 and SSH2 */
51#define PROTOCOL_MAJOR_2 2
52#define PROTOCOL_MINOR_2 0
Damien Millerd4a8b7e1999-10-27 13:42:43 +100053
Damien Miller5428f641999-11-25 11:54:57 +110054/*
55 * Name for the service. The port named by this service overrides the
56 * default port if present.
57 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100058#define SSH_SERVICE_NAME "ssh"
59
Damien Miller5428f641999-11-25 11:54:57 +110060/*
Ben Lindstrom5590aa52002-06-23 00:30:30 +000061 * Name of the environment variable containing the process ID of the
62 * authentication agent.
Damien Miller5428f641999-11-25 11:54:57 +110063 */
Kevin Steves28a7f262001-02-05 15:43:59 +000064#define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100065
Damien Miller5428f641999-11-25 11:54:57 +110066/*
67 * Name of the environment variable containing the pathname of the
68 * authentication socket.
69 */
Ben Lindstrom226cfa02001-01-22 05:34:40 +000070#define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100071
Damien Miller5428f641999-11-25 11:54:57 +110072/*
Ben Lindstrom226cfa02001-01-22 05:34:40 +000073 * Environment variable for overwriting the default location of askpass
Damien Miller5428f641999-11-25 11:54:57 +110074 */
Damien Milleraae6c611999-12-06 11:47:28 +110075#define SSH_ASKPASS_ENV "SSH_ASKPASS"
76
77/*
Damien Miller5428f641999-11-25 11:54:57 +110078 * Force host key length and server key length to differ by at least this
79 * many bits. This is to make double encryption with rsaref work.
80 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100081#define SSH_KEY_BITS_RESERVED 128
82
Damien Miller5428f641999-11-25 11:54:57 +110083/*
84 * Length of the session key in bytes. (Specified as 256 bits in the
85 * protocol.)
86 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100087#define SSH_SESSION_KEY_LENGTH 32
88
Ben Lindstrom2b1f71b2001-06-05 20:32:21 +000089/* Used to identify ``EscapeChar none'' */
90#define SSH_ESCAPECHAR_NONE -2
91
Ben Lindstromc7431342002-03-22 03:11:49 +000092/*
93 * unprivileged user when UsePrivilegeSeparation=yes;
Ben Lindstrom966bfda2002-05-15 16:09:57 +000094 * sshd will change its privileges to this user and its
Ben Lindstromc7431342002-03-22 03:11:49 +000095 * primary group.
96 */
Kevin Steves7ff91122002-04-07 19:22:54 +000097#ifndef SSH_PRIVSEP_USER
Ben Lindstrom973be002002-05-15 16:08:48 +000098#define SSH_PRIVSEP_USER "sshd"
Kevin Steves7ff91122002-04-07 19:22:54 +000099#endif
Ben Lindstromc7431342002-03-22 03:11:49 +0000100
Ben Lindstrom03f39322002-04-02 20:43:11 +0000101/* Minimum modulus size (n) for RSA keys. */
djm@openbsd.org57e8e222015-08-04 05:23:06 +0000102#define SSH_RSA_MINIMUM_MODULUS_SIZE 768
Ben Lindstrom03f39322002-04-02 20:43:11 +0000103
Darren Tucker3175eb92003-12-09 19:15:11 +1100104/* Listen backlog for sshd, ssh-agent and forwarding sockets */
105#define SSH_LISTEN_BACKLOG 128