Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 1 | /* $OpenBSD: readconf.h,v 1.102 2014/07/15 15:54:14 millert Exp $ */ |
Ben Lindstrom | 05764b9 | 2002-03-05 01:53:02 +0000 | [diff] [blame] | 2 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 3 | /* |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 6 | * All rights reserved |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 7 | * Functions for reading the configuration file. |
Damien Miller | 4af5130 | 2000-04-16 11:18:38 +1000 | [diff] [blame] | 8 | * |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 9 | * As far as I am concerned, the code I have written for this software |
| 10 | * can be used freely for any purpose. Any derived versions of this |
| 11 | * software must be clearly marked as such, and if the derived work is |
| 12 | * incompatible with the protocol description in the RFC file, it must be |
| 13 | * called by a name other than "ssh" or "Secure Shell". |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 14 | */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 15 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 16 | #ifndef READCONF_H |
| 17 | #define READCONF_H |
| 18 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 19 | /* Data structure for representing option data. */ |
| 20 | |
Damien Miller | 295ee63 | 2011-05-29 21:42:31 +1000 | [diff] [blame] | 21 | #define MAX_SEND_ENV 256 |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 22 | #define SSH_MAX_HOSTS_FILES 32 |
| 23 | #define MAX_CANON_DOMAINS 32 |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 24 | #define PATH_MAX_SUN (sizeof((struct sockaddr_un *)0)->sun_path) |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 25 | |
| 26 | struct allowed_cname { |
| 27 | char *source_list; |
| 28 | char *target_list; |
| 29 | }; |
Darren Tucker | 46bc075 | 2004-05-02 22:11:30 +1000 | [diff] [blame] | 30 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 31 | typedef struct { |
| 32 | int forward_agent; /* Forward authentication agent. */ |
| 33 | int forward_x11; /* Forward X11 display. */ |
Damien Miller | 1ab6a51 | 2010-06-26 10:02:24 +1000 | [diff] [blame] | 34 | int forward_x11_timeout; /* Expiration for Cookies */ |
Darren Tucker | 0a118da | 2003-10-15 15:54:32 +1000 | [diff] [blame] | 35 | int forward_x11_trusted; /* Trust Forward X11 display. */ |
Darren Tucker | e7d4b19 | 2006-07-12 22:17:10 +1000 | [diff] [blame] | 36 | int exit_on_forward_failure; /* Exit if bind(2) fails for -L/-R */ |
Damien Miller | d3a1857 | 2000-06-07 19:55:44 +1000 | [diff] [blame] | 37 | char *xauth_location; /* Location for xauth program */ |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 38 | struct ForwardOptions fwd_opts; /* forwarding options */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 39 | int use_privileged_port; /* Don't use privileged port if false. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 40 | int rhosts_rsa_authentication; /* Try rhosts with RSA |
| 41 | * authentication. */ |
| 42 | int rsa_authentication; /* Try RSA authentication. */ |
Damien Miller | 0bc1bd8 | 2000-11-13 22:57:25 +1100 | [diff] [blame] | 43 | int pubkey_authentication; /* Try ssh2 pubkey authentication. */ |
Ben Lindstrom | 5eabda3 | 2001-04-12 23:34:34 +0000 | [diff] [blame] | 44 | int hostbased_authentication; /* ssh2's rhosts_rsa */ |
Ben Lindstrom | 551ea37 | 2001-06-05 18:56:16 +0000 | [diff] [blame] | 45 | int challenge_response_authentication; |
Ben Lindstrom | 95fb2dd | 2001-01-23 03:12:10 +0000 | [diff] [blame] | 46 | /* Try S/Key or TIS, authentication. */ |
Darren Tucker | 0efd155 | 2003-08-26 11:49:55 +1000 | [diff] [blame] | 47 | int gss_authentication; /* Try GSS authentication */ |
| 48 | int gss_deleg_creds; /* Delegate GSS credentials */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 49 | int password_authentication; /* Try password |
| 50 | * authentication. */ |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 51 | int kbd_interactive_authentication; /* Try keyboard-interactive auth. */ |
| 52 | char *kbd_interactive_devices; /* Keyboard-interactive auth devices. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 53 | int batch_mode; /* Batch mode: do not ask for passwords. */ |
| 54 | int check_host_ip; /* Also keep track of keys for IP address */ |
| 55 | int strict_host_key_checking; /* Strict host key checking. */ |
| 56 | int compression; /* Compress packets in both directions. */ |
| 57 | int compression_level; /* Compression level 1 (fast) to 9 |
| 58 | * (best). */ |
Damien Miller | 12c150e | 2003-12-17 16:31:10 +1100 | [diff] [blame] | 59 | int tcp_keep_alive; /* Set SO_KEEPALIVE. */ |
Damien Miller | 0dac6fb | 2010-11-20 15:19:38 +1100 | [diff] [blame] | 60 | int ip_qos_interactive; /* IP ToS/DSCP/class for interactive */ |
| 61 | int ip_qos_bulk; /* IP ToS/DSCP/class for bulk traffic */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 62 | LogLevel log_level; /* Level for logging. */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 63 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 64 | int port; /* Port to connect. */ |
Darren Tucker | 0a4f04b | 2003-07-03 20:37:47 +1000 | [diff] [blame] | 65 | int address_family; |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 66 | int connection_attempts; /* Max attempts (seconds) before |
| 67 | * giving up */ |
Damien Miller | b78d5eb | 2003-05-16 11:39:04 +1000 | [diff] [blame] | 68 | int connection_timeout; /* Max time (seconds) before |
Damien Miller | a8e06ce | 2003-11-21 23:48:55 +1100 | [diff] [blame] | 69 | * aborting connection attempt */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 70 | int number_of_password_prompts; /* Max number of password |
| 71 | * prompts. */ |
| 72 | int cipher; /* Cipher to use. */ |
Damien Miller | 30c3d42 | 2000-05-09 11:02:59 +1000 | [diff] [blame] | 73 | char *ciphers; /* SSH2 ciphers in order of preference. */ |
Ben Lindstrom | 06b33aa | 2001-02-15 03:01:59 +0000 | [diff] [blame] | 74 | char *macs; /* SSH2 macs in order of preference. */ |
Ben Lindstrom | 982dbbc | 2001-04-17 18:11:36 +0000 | [diff] [blame] | 75 | char *hostkeyalgorithms; /* SSH2 server key types in order of preference. */ |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 76 | char *kex_algorithms; /* SSH2 kex methods in order of preference. */ |
Damien Miller | 7892879 | 2000-04-12 20:17:38 +1000 | [diff] [blame] | 77 | int protocol; /* Protocol in order of preference. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 78 | char *hostname; /* Real host to connect. */ |
Ben Lindstrom | 4dccfa5 | 2000-12-28 16:40:05 +0000 | [diff] [blame] | 79 | char *host_key_alias; /* hostname alias for .ssh/known_hosts */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 80 | char *proxy_command; /* Proxy command for connecting the host. */ |
| 81 | char *user; /* User to log in as. */ |
| 82 | int escape_char; /* Escape character; -2 = none */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 83 | |
Damien Miller | 295ee63 | 2011-05-29 21:42:31 +1000 | [diff] [blame] | 84 | u_int num_system_hostfiles; /* Paths for /etc/ssh/ssh_known_hosts */ |
| 85 | char *system_hostfiles[SSH_MAX_HOSTS_FILES]; |
| 86 | u_int num_user_hostfiles; /* Path for $HOME/.ssh/known_hosts */ |
| 87 | char *user_hostfiles[SSH_MAX_HOSTS_FILES]; |
Ben Lindstrom | b9be60a | 2001-03-11 01:49:19 +0000 | [diff] [blame] | 88 | char *preferred_authentications; |
Ben Lindstrom | e0f8804 | 2001-04-30 13:06:24 +0000 | [diff] [blame] | 89 | char *bind_address; /* local socket address for connection to sshd */ |
Damien Miller | 7ea845e | 2010-02-12 09:21:02 +1100 | [diff] [blame] | 90 | char *pkcs11_provider; /* PKCS#11 provider */ |
Damien Miller | 37876e9 | 2003-05-15 10:19:46 +1000 | [diff] [blame] | 91 | int verify_host_key_dns; /* Verify host key using DNS */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 92 | |
Damien Miller | 0bc1bd8 | 2000-11-13 22:57:25 +1100 | [diff] [blame] | 93 | int num_identity_files; /* Number of files for RSA/DSA identities. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 94 | char *identity_files[SSH_MAX_IDENTITY_FILES]; |
Darren Tucker | 1910478 | 2013-04-05 11:13:08 +1100 | [diff] [blame] | 95 | int identity_file_userprovided[SSH_MAX_IDENTITY_FILES]; |
Ben Lindstrom | 266dfdf | 2001-03-09 00:12:22 +0000 | [diff] [blame] | 96 | Key *identity_keys[SSH_MAX_IDENTITY_FILES]; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 97 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 98 | /* Local TCP/IP forward requests. */ |
| 99 | int num_local_forwards; |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 100 | struct Forward *local_forwards; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 101 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 102 | /* Remote TCP/IP forward requests. */ |
| 103 | int num_remote_forwards; |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 104 | struct Forward *remote_forwards; |
Ben Lindstrom | 2b7a0e9 | 2001-09-20 00:57:55 +0000 | [diff] [blame] | 105 | int clear_forwardings; |
Ben Lindstrom | b6df73b | 2002-11-09 15:52:31 +0000 | [diff] [blame] | 106 | |
| 107 | int enable_ssh_keysign; |
Damien Miller | 3dff176 | 2008-02-10 22:25:52 +1100 | [diff] [blame] | 108 | int64_t rekey_limit; |
Darren Tucker | c53c2af | 2013-05-16 20:28:16 +1000 | [diff] [blame] | 109 | int rekey_interval; |
Ben Lindstrom | 3cecc9a | 2001-10-03 17:39:38 +0000 | [diff] [blame] | 110 | int no_host_authentication_for_localhost; |
Damien Miller | bd394c3 | 2004-03-08 23:12:36 +1100 | [diff] [blame] | 111 | int identities_only; |
Darren Tucker | fc95970 | 2004-07-17 16:12:08 +1000 | [diff] [blame] | 112 | int server_alive_interval; |
Damien Miller | 509b010 | 2003-12-17 16:33:10 +1100 | [diff] [blame] | 113 | int server_alive_count_max; |
Darren Tucker | 46bc075 | 2004-05-02 22:11:30 +1000 | [diff] [blame] | 114 | |
| 115 | int num_send_env; |
| 116 | char *send_env[MAX_SEND_ENV]; |
Damien Miller | 0e220db | 2004-06-15 10:34:08 +1000 | [diff] [blame] | 117 | |
| 118 | char *control_path; |
| 119 | int control_master; |
Damien Miller | e11e1ea | 2010-08-03 16:04:46 +1000 | [diff] [blame] | 120 | int control_persist; /* ControlPersist flag */ |
| 121 | int control_persist_timeout; /* ControlPersist timeout (seconds) */ |
Damien Miller | e177615 | 2005-03-01 21:47:37 +1100 | [diff] [blame] | 122 | |
| 123 | int hash_known_hosts; |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 124 | |
| 125 | int tun_open; /* tun(4) */ |
| 126 | int tun_local; /* force tun device (optional) */ |
| 127 | int tun_remote; /* force tun device (optional) */ |
| 128 | |
| 129 | char *local_command; |
| 130 | int permit_local_command; |
Damien Miller | 1028824 | 2008-06-30 00:04:03 +1000 | [diff] [blame] | 131 | int visual_host_key; |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 132 | |
Darren Tucker | 71e4d54 | 2009-07-06 07:12:27 +1000 | [diff] [blame] | 133 | int use_roaming; |
| 134 | |
Damien Miller | 21771e2 | 2011-05-15 08:45:50 +1000 | [diff] [blame] | 135 | int request_tty; |
Darren Tucker | 0763698 | 2013-05-16 20:30:03 +1000 | [diff] [blame] | 136 | |
Damien Miller | 1262b66 | 2013-08-21 02:44:24 +1000 | [diff] [blame] | 137 | int proxy_use_fdpass; |
| 138 | |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 139 | int num_canonical_domains; |
| 140 | char *canonical_domains[MAX_CANON_DOMAINS]; |
Damien Miller | 3850559 | 2013-10-17 11:48:13 +1100 | [diff] [blame] | 141 | int canonicalize_hostname; |
| 142 | int canonicalize_max_dots; |
| 143 | int canonicalize_fallback_local; |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 144 | int num_permitted_cnames; |
| 145 | struct allowed_cname permitted_cnames[MAX_CANON_DOMAINS]; |
| 146 | |
Darren Tucker | 0763698 | 2013-05-16 20:30:03 +1000 | [diff] [blame] | 147 | char *ignored_unknown; /* Pattern list of unknown tokens to ignore */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 148 | } Options; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 149 | |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 150 | #define SSH_CANONICALISE_NO 0 |
| 151 | #define SSH_CANONICALISE_YES 1 |
| 152 | #define SSH_CANONICALISE_ALWAYS 2 |
| 153 | |
Damien Miller | d14b1e7 | 2005-06-16 13:19:41 +1000 | [diff] [blame] | 154 | #define SSHCTL_MASTER_NO 0 |
| 155 | #define SSHCTL_MASTER_YES 1 |
| 156 | #define SSHCTL_MASTER_AUTO 2 |
| 157 | #define SSHCTL_MASTER_ASK 3 |
| 158 | #define SSHCTL_MASTER_AUTO_ASK 4 |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 159 | |
Damien Miller | 21771e2 | 2011-05-15 08:45:50 +1000 | [diff] [blame] | 160 | #define REQUEST_TTY_AUTO 0 |
| 161 | #define REQUEST_TTY_NO 1 |
| 162 | #define REQUEST_TTY_YES 2 |
| 163 | #define REQUEST_TTY_FORCE 3 |
| 164 | |
Darren Tucker | aefa368 | 2013-04-05 11:18:35 +1100 | [diff] [blame] | 165 | #define SSHCONF_CHECKPERM 1 /* check permissions on config file */ |
| 166 | #define SSHCONF_USERCONF 2 /* user provided config file not system */ |
| 167 | |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 168 | void initialize_options(Options *); |
| 169 | void fill_default_options(Options *); |
Damien Miller | 13f97b2 | 2014-02-24 15:57:55 +1100 | [diff] [blame] | 170 | void fill_default_options_for_canonicalization(Options *); |
Damien Miller | 194fd90 | 2013-10-15 12:13:05 +1100 | [diff] [blame] | 171 | int process_config_line(Options *, struct passwd *, const char *, char *, |
| 172 | const char *, int, int *, int); |
| 173 | int read_config_file(const char *, struct passwd *, const char *, |
| 174 | Options *, int); |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 175 | int parse_forward(struct Forward *, const char *, int, int); |
Damien Miller | 194fd90 | 2013-10-15 12:13:05 +1100 | [diff] [blame] | 176 | int default_ssh_port(void); |
Damien Miller | 13f97b2 | 2014-02-24 15:57:55 +1100 | [diff] [blame] | 177 | int option_clear_or_none(const char *); |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 178 | |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 179 | void add_local_forward(Options *, const struct Forward *); |
| 180 | void add_remote_forward(Options *, const struct Forward *); |
Darren Tucker | 1910478 | 2013-04-05 11:13:08 +1100 | [diff] [blame] | 181 | void add_identity_file(Options *, const char *, const char *, int); |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 182 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 183 | #endif /* READCONF_H */ |