xref: /freebsd/crypto/openssh/servconf.c (revision 144a80bd9a603b8b7a1ec866ff4acdd73efc308c)
1eccfee6eSDag-Erling Smørgrav 
2acc1a9efSDag-Erling Smørgrav /* $OpenBSD: servconf.c,v 1.285 2016/02/17 05:29:04 djm Exp $ */
3511b41d2SMark Murray /*
4511b41d2SMark Murray  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5511b41d2SMark Murray  *                    All rights reserved
6511b41d2SMark Murray  *
7c2d3a559SKris Kennaway  * As far as I am concerned, the code I have written for this software
8c2d3a559SKris Kennaway  * can be used freely for any purpose.  Any derived versions of this
9c2d3a559SKris Kennaway  * software must be clearly marked as such, and if the derived work is
10c2d3a559SKris Kennaway  * incompatible with the protocol description in the RFC file, it must be
11c2d3a559SKris Kennaway  * called by a name other than "ssh" or "Secure Shell".
12511b41d2SMark Murray  */
13511b41d2SMark Murray 
14511b41d2SMark Murray #include "includes.h"
15333ee039SDag-Erling Smørgrav __RCSID("$FreeBSD$");
16511b41d2SMark Murray 
17333ee039SDag-Erling Smørgrav #include <sys/types.h>
18333ee039SDag-Erling Smørgrav #include <sys/socket.h>
19333ee039SDag-Erling Smørgrav 
204a421b63SDag-Erling Smørgrav #include <netinet/in.h>
214a421b63SDag-Erling Smørgrav #include <netinet/in_systm.h>
224a421b63SDag-Erling Smørgrav #include <netinet/ip.h>
234a421b63SDag-Erling Smørgrav 
24e4a9863fSDag-Erling Smørgrav #include <ctype.h>
25*144a80bdSDag-Erling Smørgrav #include <fcntl.h>
26333ee039SDag-Erling Smørgrav #include <netdb.h>
27333ee039SDag-Erling Smørgrav #include <pwd.h>
28333ee039SDag-Erling Smørgrav #include <stdio.h>
29333ee039SDag-Erling Smørgrav #include <stdlib.h>
30333ee039SDag-Erling Smørgrav #include <string.h>
31333ee039SDag-Erling Smørgrav #include <signal.h>
32333ee039SDag-Erling Smørgrav #include <unistd.h>
33bc5531deSDag-Erling Smørgrav #include <limits.h>
34333ee039SDag-Erling Smørgrav #include <stdarg.h>
35d4af9e69SDag-Erling Smørgrav #include <errno.h>
36e4a9863fSDag-Erling Smørgrav #ifdef HAVE_UTIL_H
37e4a9863fSDag-Erling Smørgrav #include <util.h>
38e4a9863fSDag-Erling Smørgrav #endif
39333ee039SDag-Erling Smørgrav 
40d4af9e69SDag-Erling Smørgrav #include "openbsd-compat/sys-queue.h"
41333ee039SDag-Erling Smørgrav #include "xmalloc.h"
42511b41d2SMark Murray #include "ssh.h"
43ca3176e7SBrian Feldman #include "log.h"
44333ee039SDag-Erling Smørgrav #include "buffer.h"
45a0ee8cc6SDag-Erling Smørgrav #include "misc.h"
46511b41d2SMark Murray #include "servconf.h"
47e8aafc91SKris Kennaway #include "compat.h"
48ca3176e7SBrian Feldman #include "pathnames.h"
49ca3176e7SBrian Feldman #include "cipher.h"
50333ee039SDag-Erling Smørgrav #include "key.h"
51ca3176e7SBrian Feldman #include "kex.h"
52ca3176e7SBrian Feldman #include "mac.h"
53333ee039SDag-Erling Smørgrav #include "match.h"
54333ee039SDag-Erling Smørgrav #include "channels.h"
55333ee039SDag-Erling Smørgrav #include "groupaccess.h"
56462c32cbSDag-Erling Smørgrav #include "canohost.h"
57462c32cbSDag-Erling Smørgrav #include "packet.h"
586888a9beSDag-Erling Smørgrav #include "hostfile.h"
596888a9beSDag-Erling Smørgrav #include "auth.h"
60bc5531deSDag-Erling Smørgrav #include "myproposal.h"
61bc5531deSDag-Erling Smørgrav #include "digest.h"
62b15c8340SDag-Erling Smørgrav #include "version.h"
63511b41d2SMark Murray 
64cce7d346SDag-Erling Smørgrav static void add_listen_addr(ServerOptions *, char *, int);
65cce7d346SDag-Erling Smørgrav static void add_one_listen_addr(ServerOptions *, char *, int);
66ca3176e7SBrian Feldman 
6780628bacSDag-Erling Smørgrav /* Use of privilege separation or not */
6880628bacSDag-Erling Smørgrav extern int use_privsep;
69333ee039SDag-Erling Smørgrav extern Buffer cfg;
70511b41d2SMark Murray 
71511b41d2SMark Murray /* Initializes the server options to their default values. */
72511b41d2SMark Murray 
73511b41d2SMark Murray void
74511b41d2SMark Murray initialize_server_options(ServerOptions *options)
75511b41d2SMark Murray {
76511b41d2SMark Murray 	memset(options, 0, sizeof(*options));
77989dd127SDag-Erling Smørgrav 
78989dd127SDag-Erling Smørgrav 	/* Portable-specific options */
79cf2b5f3bSDag-Erling Smørgrav 	options->use_pam = -1;
80989dd127SDag-Erling Smørgrav 
81989dd127SDag-Erling Smørgrav 	/* Standard Options */
82511b41d2SMark Murray 	options->num_ports = 0;
83511b41d2SMark Murray 	options->ports_from_cmdline = 0;
84557f75e5SDag-Erling Smørgrav 	options->queued_listen_addrs = NULL;
85557f75e5SDag-Erling Smørgrav 	options->num_queued_listens = 0;
86511b41d2SMark Murray 	options->listen_addrs = NULL;
87aa49c926SDag-Erling Smørgrav 	options->address_family = -1;
88ca3176e7SBrian Feldman 	options->num_host_key_files = 0;
89b15c8340SDag-Erling Smørgrav 	options->num_host_cert_files = 0;
90e4a9863fSDag-Erling Smørgrav 	options->host_key_agent = NULL;
91e8aafc91SKris Kennaway 	options->pid_file = NULL;
92511b41d2SMark Murray 	options->server_key_bits = -1;
93511b41d2SMark Murray 	options->login_grace_time = -1;
94511b41d2SMark Murray 	options->key_regeneration_time = -1;
95ca3176e7SBrian Feldman 	options->permit_root_login = PERMIT_NOT_SET;
96511b41d2SMark Murray 	options->ignore_rhosts = -1;
97511b41d2SMark Murray 	options->ignore_user_known_hosts = -1;
98511b41d2SMark Murray 	options->print_motd = -1;
99ca3176e7SBrian Feldman 	options->print_lastlog = -1;
100511b41d2SMark Murray 	options->x11_forwarding = -1;
101511b41d2SMark Murray 	options->x11_display_offset = -1;
102af12a3e7SDag-Erling Smørgrav 	options->x11_use_localhost = -1;
103f7167e0eSDag-Erling Smørgrav 	options->permit_tty = -1;
104a0ee8cc6SDag-Erling Smørgrav 	options->permit_user_rc = -1;
105c2d3a559SKris Kennaway 	options->xauth_location = NULL;
106511b41d2SMark Murray 	options->strict_modes = -1;
1071ec0d754SDag-Erling Smørgrav 	options->tcp_keep_alive = -1;
108af12a3e7SDag-Erling Smørgrav 	options->log_facility = SYSLOG_FACILITY_NOT_SET;
109af12a3e7SDag-Erling Smørgrav 	options->log_level = SYSLOG_LEVEL_NOT_SET;
110511b41d2SMark Murray 	options->rhosts_rsa_authentication = -1;
111ca3176e7SBrian Feldman 	options->hostbased_authentication = -1;
112ca3176e7SBrian Feldman 	options->hostbased_uses_name_from_packet_only = -1;
113bc5531deSDag-Erling Smørgrav 	options->hostbased_key_types = NULL;
114eccfee6eSDag-Erling Smørgrav 	options->hostkeyalgorithms = NULL;
115511b41d2SMark Murray 	options->rsa_authentication = -1;
116ca3176e7SBrian Feldman 	options->pubkey_authentication = -1;
117bc5531deSDag-Erling Smørgrav 	options->pubkey_key_types = NULL;
118cb96ab36SAssar Westerlund 	options->kerberos_authentication = -1;
119af12a3e7SDag-Erling Smørgrav 	options->kerberos_or_local_passwd = -1;
120af12a3e7SDag-Erling Smørgrav 	options->kerberos_ticket_cleanup = -1;
1211ec0d754SDag-Erling Smørgrav 	options->kerberos_get_afs_token = -1;
122cf2b5f3bSDag-Erling Smørgrav 	options->gss_authentication=-1;
123cf2b5f3bSDag-Erling Smørgrav 	options->gss_cleanup_creds = -1;
124557f75e5SDag-Erling Smørgrav 	options->gss_strict_acceptor = -1;
125511b41d2SMark Murray 	options->password_authentication = -1;
12609958426SBrian Feldman 	options->kbd_interactive_authentication = -1;
127af12a3e7SDag-Erling Smørgrav 	options->challenge_response_authentication = -1;
128511b41d2SMark Murray 	options->permit_empty_passwd = -1;
129f388f5efSDag-Erling Smørgrav 	options->permit_user_env = -1;
130511b41d2SMark Murray 	options->use_login = -1;
13180628bacSDag-Erling Smørgrav 	options->compression = -1;
132e4a9863fSDag-Erling Smørgrav 	options->rekey_limit = -1;
133e4a9863fSDag-Erling Smørgrav 	options->rekey_interval = -1;
13409958426SBrian Feldman 	options->allow_tcp_forwarding = -1;
135a0ee8cc6SDag-Erling Smørgrav 	options->allow_streamlocal_forwarding = -1;
136d4af9e69SDag-Erling Smørgrav 	options->allow_agent_forwarding = -1;
137511b41d2SMark Murray 	options->num_allow_users = 0;
138511b41d2SMark Murray 	options->num_deny_users = 0;
139511b41d2SMark Murray 	options->num_allow_groups = 0;
140511b41d2SMark Murray 	options->num_deny_groups = 0;
141e8aafc91SKris Kennaway 	options->ciphers = NULL;
142ca3176e7SBrian Feldman 	options->macs = NULL;
1434a421b63SDag-Erling Smørgrav 	options->kex_algorithms = NULL;
144e8aafc91SKris Kennaway 	options->protocol = SSH_PROTO_UNKNOWN;
145a0ee8cc6SDag-Erling Smørgrav 	options->fwd_opts.gateway_ports = -1;
146a0ee8cc6SDag-Erling Smørgrav 	options->fwd_opts.streamlocal_bind_mask = (mode_t)-1;
147a0ee8cc6SDag-Erling Smørgrav 	options->fwd_opts.streamlocal_bind_unlink = -1;
148c2d3a559SKris Kennaway 	options->num_subsystems = 0;
149c2d3a559SKris Kennaway 	options->max_startups_begin = -1;
150c2d3a559SKris Kennaway 	options->max_startups_rate = -1;
151c2d3a559SKris Kennaway 	options->max_startups = -1;
15221e764dfSDag-Erling Smørgrav 	options->max_authtries = -1;
153d4af9e69SDag-Erling Smørgrav 	options->max_sessions = -1;
154ca3176e7SBrian Feldman 	options->banner = NULL;
155cf2b5f3bSDag-Erling Smørgrav 	options->use_dns = -1;
156ca3176e7SBrian Feldman 	options->client_alive_interval = -1;
157ca3176e7SBrian Feldman 	options->client_alive_count_max = -1;
158e146993eSDag-Erling Smørgrav 	options->num_authkeys_files = 0;
15921e764dfSDag-Erling Smørgrav 	options->num_accept_env = 0;
160b74df5b2SDag-Erling Smørgrav 	options->permit_tun = -1;
161333ee039SDag-Erling Smørgrav 	options->num_permitted_opens = -1;
162333ee039SDag-Erling Smørgrav 	options->adm_forced_command = NULL;
163d4af9e69SDag-Erling Smørgrav 	options->chroot_directory = NULL;
1646888a9beSDag-Erling Smørgrav 	options->authorized_keys_command = NULL;
1656888a9beSDag-Erling Smørgrav 	options->authorized_keys_command_user = NULL;
166b15c8340SDag-Erling Smørgrav 	options->revoked_keys_file = NULL;
167b15c8340SDag-Erling Smørgrav 	options->trusted_user_ca_keys = NULL;
168e2f6069cSDag-Erling Smørgrav 	options->authorized_principals_file = NULL;
169557f75e5SDag-Erling Smørgrav 	options->authorized_principals_command = NULL;
170557f75e5SDag-Erling Smørgrav 	options->authorized_principals_command_user = NULL;
1714a421b63SDag-Erling Smørgrav 	options->ip_qos_interactive = -1;
1724a421b63SDag-Erling Smørgrav 	options->ip_qos_bulk = -1;
173462c32cbSDag-Erling Smørgrav 	options->version_addendum = NULL;
174bc5531deSDag-Erling Smørgrav 	options->fingerprint_hash = -1;
175bc5531deSDag-Erling Smørgrav }
176bc5531deSDag-Erling Smørgrav 
177bc5531deSDag-Erling Smørgrav /* Returns 1 if a string option is unset or set to "none" or 0 otherwise. */
178bc5531deSDag-Erling Smørgrav static int
179bc5531deSDag-Erling Smørgrav option_clear_or_none(const char *o)
180bc5531deSDag-Erling Smørgrav {
181bc5531deSDag-Erling Smørgrav 	return o == NULL || strcasecmp(o, "none") == 0;
182511b41d2SMark Murray }
183511b41d2SMark Murray 
184acc1a9efSDag-Erling Smørgrav static void
185acc1a9efSDag-Erling Smørgrav assemble_algorithms(ServerOptions *o)
186acc1a9efSDag-Erling Smørgrav {
187acc1a9efSDag-Erling Smørgrav 	if (kex_assemble_names(KEX_SERVER_ENCRYPT, &o->ciphers) != 0 ||
188acc1a9efSDag-Erling Smørgrav 	    kex_assemble_names(KEX_SERVER_MAC, &o->macs) != 0 ||
189acc1a9efSDag-Erling Smørgrav 	    kex_assemble_names(KEX_SERVER_KEX, &o->kex_algorithms) != 0 ||
190acc1a9efSDag-Erling Smørgrav 	    kex_assemble_names(KEX_DEFAULT_PK_ALG,
191acc1a9efSDag-Erling Smørgrav 	    &o->hostkeyalgorithms) != 0 ||
192acc1a9efSDag-Erling Smørgrav 	    kex_assemble_names(KEX_DEFAULT_PK_ALG,
193acc1a9efSDag-Erling Smørgrav 	    &o->hostbased_key_types) != 0 ||
194acc1a9efSDag-Erling Smørgrav 	    kex_assemble_names(KEX_DEFAULT_PK_ALG, &o->pubkey_key_types) != 0)
195acc1a9efSDag-Erling Smørgrav 		fatal("kex_assemble_names failed");
196acc1a9efSDag-Erling Smørgrav }
197acc1a9efSDag-Erling Smørgrav 
198511b41d2SMark Murray void
199511b41d2SMark Murray fill_default_server_options(ServerOptions *options)
200511b41d2SMark Murray {
201bc5531deSDag-Erling Smørgrav 	int i;
202bc5531deSDag-Erling Smørgrav 
203989dd127SDag-Erling Smørgrav 	/* Portable-specific options */
204cf2b5f3bSDag-Erling Smørgrav 	if (options->use_pam == -1)
205f0477b26SDag-Erling Smørgrav 		options->use_pam = 1;
206989dd127SDag-Erling Smørgrav 
207989dd127SDag-Erling Smørgrav 	/* Standard Options */
208ca3176e7SBrian Feldman 	if (options->protocol == SSH_PROTO_UNKNOWN)
209028c324aSDag-Erling Smørgrav 		options->protocol = SSH_PROTO_2;
210*144a80bdSDag-Erling Smørgrav #define add_host_key_file(path)						\
211*144a80bdSDag-Erling Smørgrav 	do {								\
212*144a80bdSDag-Erling Smørgrav 		if (access((path), O_RDONLY) == 0)			\
213*144a80bdSDag-Erling Smørgrav 			options->host_key_files				\
214*144a80bdSDag-Erling Smørgrav 			    [options->num_host_key_files++] = (path);	\
215*144a80bdSDag-Erling Smørgrav 	} while (0)
216ca3176e7SBrian Feldman 	if (options->num_host_key_files == 0) {
217ca3176e7SBrian Feldman 		/* fill default hostkeys for protocols */
218ca3176e7SBrian Feldman 		if (options->protocol & SSH_PROTO_1)
219*144a80bdSDag-Erling Smørgrav 			add_host_key_file(_PATH_HOST_KEY_FILE);
220af12a3e7SDag-Erling Smørgrav 		if (options->protocol & SSH_PROTO_2) {
221*144a80bdSDag-Erling Smørgrav 			add_host_key_file(_PATH_HOST_RSA_KEY_FILE);
222*144a80bdSDag-Erling Smørgrav 			add_host_key_file(_PATH_HOST_DSA_KEY_FILE);
2234a421b63SDag-Erling Smørgrav #ifdef OPENSSL_HAS_ECC
224*144a80bdSDag-Erling Smørgrav 			add_host_key_file(_PATH_HOST_ECDSA_KEY_FILE);
2254a421b63SDag-Erling Smørgrav #endif
226*144a80bdSDag-Erling Smørgrav 			add_host_key_file(_PATH_HOST_ED25519_KEY_FILE);
227af12a3e7SDag-Erling Smørgrav 		}
228ca3176e7SBrian Feldman 	}
229*144a80bdSDag-Erling Smørgrav #undef add_host_key_file
230*144a80bdSDag-Erling Smørgrav 	if (options->num_host_key_files == 0)
231*144a80bdSDag-Erling Smørgrav 		fatal("No host key files found");
232b15c8340SDag-Erling Smørgrav 	/* No certificates by default */
233511b41d2SMark Murray 	if (options->num_ports == 0)
234511b41d2SMark Murray 		options->ports[options->num_ports++] = SSH_DEFAULT_PORT;
235557f75e5SDag-Erling Smørgrav 	if (options->address_family == -1)
236557f75e5SDag-Erling Smørgrav 		options->address_family = AF_UNSPEC;
237511b41d2SMark Murray 	if (options->listen_addrs == NULL)
238ca3176e7SBrian Feldman 		add_listen_addr(options, NULL, 0);
239e8aafc91SKris Kennaway 	if (options->pid_file == NULL)
240bc5531deSDag-Erling Smørgrav 		options->pid_file = xstrdup(_PATH_SSH_DAEMON_PID_FILE);
241511b41d2SMark Murray 	if (options->server_key_bits == -1)
242d4af9e69SDag-Erling Smørgrav 		options->server_key_bits = 1024;
243511b41d2SMark Murray 	if (options->login_grace_time == -1)
244975616f0SDag-Erling Smørgrav 		options->login_grace_time = 120;
245511b41d2SMark Murray 	if (options->key_regeneration_time == -1)
246511b41d2SMark Murray 		options->key_regeneration_time = 3600;
247ca3176e7SBrian Feldman 	if (options->permit_root_login == PERMIT_NOT_SET)
248975616f0SDag-Erling Smørgrav 		options->permit_root_login = PERMIT_NO;
249511b41d2SMark Murray 	if (options->ignore_rhosts == -1)
250fe5fd017SMark Murray 		options->ignore_rhosts = 1;
251511b41d2SMark Murray 	if (options->ignore_user_known_hosts == -1)
252511b41d2SMark Murray 		options->ignore_user_known_hosts = 0;
253511b41d2SMark Murray 	if (options->print_motd == -1)
254511b41d2SMark Murray 		options->print_motd = 1;
255ca3176e7SBrian Feldman 	if (options->print_lastlog == -1)
256ca3176e7SBrian Feldman 		options->print_lastlog = 1;
257511b41d2SMark Murray 	if (options->x11_forwarding == -1)
258975616f0SDag-Erling Smørgrav 		options->x11_forwarding = 1;
259511b41d2SMark Murray 	if (options->x11_display_offset == -1)
260fe5fd017SMark Murray 		options->x11_display_offset = 10;
261af12a3e7SDag-Erling Smørgrav 	if (options->x11_use_localhost == -1)
262af12a3e7SDag-Erling Smørgrav 		options->x11_use_localhost = 1;
263c2d3a559SKris Kennaway 	if (options->xauth_location == NULL)
264bc5531deSDag-Erling Smørgrav 		options->xauth_location = xstrdup(_PATH_XAUTH);
265f7167e0eSDag-Erling Smørgrav 	if (options->permit_tty == -1)
266f7167e0eSDag-Erling Smørgrav 		options->permit_tty = 1;
267a0ee8cc6SDag-Erling Smørgrav 	if (options->permit_user_rc == -1)
268a0ee8cc6SDag-Erling Smørgrav 		options->permit_user_rc = 1;
269511b41d2SMark Murray 	if (options->strict_modes == -1)
270511b41d2SMark Murray 		options->strict_modes = 1;
2711ec0d754SDag-Erling Smørgrav 	if (options->tcp_keep_alive == -1)
2721ec0d754SDag-Erling Smørgrav 		options->tcp_keep_alive = 1;
273af12a3e7SDag-Erling Smørgrav 	if (options->log_facility == SYSLOG_FACILITY_NOT_SET)
274511b41d2SMark Murray 		options->log_facility = SYSLOG_FACILITY_AUTH;
275af12a3e7SDag-Erling Smørgrav 	if (options->log_level == SYSLOG_LEVEL_NOT_SET)
276511b41d2SMark Murray 		options->log_level = SYSLOG_LEVEL_INFO;
277511b41d2SMark Murray 	if (options->rhosts_rsa_authentication == -1)
278fe5fd017SMark Murray 		options->rhosts_rsa_authentication = 0;
279ca3176e7SBrian Feldman 	if (options->hostbased_authentication == -1)
280ca3176e7SBrian Feldman 		options->hostbased_authentication = 0;
281ca3176e7SBrian Feldman 	if (options->hostbased_uses_name_from_packet_only == -1)
282ca3176e7SBrian Feldman 		options->hostbased_uses_name_from_packet_only = 0;
283511b41d2SMark Murray 	if (options->rsa_authentication == -1)
284511b41d2SMark Murray 		options->rsa_authentication = 1;
285ca3176e7SBrian Feldman 	if (options->pubkey_authentication == -1)
286ca3176e7SBrian Feldman 		options->pubkey_authentication = 1;
287989dd127SDag-Erling Smørgrav 	if (options->kerberos_authentication == -1)
288cf2b5f3bSDag-Erling Smørgrav 		options->kerberos_authentication = 0;
289af12a3e7SDag-Erling Smørgrav 	if (options->kerberos_or_local_passwd == -1)
290af12a3e7SDag-Erling Smørgrav 		options->kerberos_or_local_passwd = 1;
291af12a3e7SDag-Erling Smørgrav 	if (options->kerberos_ticket_cleanup == -1)
292af12a3e7SDag-Erling Smørgrav 		options->kerberos_ticket_cleanup = 1;
2931ec0d754SDag-Erling Smørgrav 	if (options->kerberos_get_afs_token == -1)
2941ec0d754SDag-Erling Smørgrav 		options->kerberos_get_afs_token = 0;
295cf2b5f3bSDag-Erling Smørgrav 	if (options->gss_authentication == -1)
296cf2b5f3bSDag-Erling Smørgrav 		options->gss_authentication = 0;
297cf2b5f3bSDag-Erling Smørgrav 	if (options->gss_cleanup_creds == -1)
298cf2b5f3bSDag-Erling Smørgrav 		options->gss_cleanup_creds = 1;
299557f75e5SDag-Erling Smørgrav 	if (options->gss_strict_acceptor == -1)
300557f75e5SDag-Erling Smørgrav 		options->gss_strict_acceptor = 0;
301511b41d2SMark Murray 	if (options->password_authentication == -1)
302b909c84bSDag-Erling Smørgrav 		options->password_authentication = 0;
30309958426SBrian Feldman 	if (options->kbd_interactive_authentication == -1)
30409958426SBrian Feldman 		options->kbd_interactive_authentication = 0;
305af12a3e7SDag-Erling Smørgrav 	if (options->challenge_response_authentication == -1)
30680241871SDag-Erling Smørgrav 		options->challenge_response_authentication = 1;
307511b41d2SMark Murray 	if (options->permit_empty_passwd == -1)
308fe5fd017SMark Murray 		options->permit_empty_passwd = 0;
309f388f5efSDag-Erling Smørgrav 	if (options->permit_user_env == -1)
310f388f5efSDag-Erling Smørgrav 		options->permit_user_env = 0;
311511b41d2SMark Murray 	if (options->use_login == -1)
312511b41d2SMark Murray 		options->use_login = 0;
31380628bacSDag-Erling Smørgrav 	if (options->compression == -1)
314d4ecd108SDag-Erling Smørgrav 		options->compression = COMP_DELAYED;
315e4a9863fSDag-Erling Smørgrav 	if (options->rekey_limit == -1)
316e4a9863fSDag-Erling Smørgrav 		options->rekey_limit = 0;
317e4a9863fSDag-Erling Smørgrav 	if (options->rekey_interval == -1)
318e4a9863fSDag-Erling Smørgrav 		options->rekey_interval = 0;
31909958426SBrian Feldman 	if (options->allow_tcp_forwarding == -1)
3206888a9beSDag-Erling Smørgrav 		options->allow_tcp_forwarding = FORWARD_ALLOW;
321a0ee8cc6SDag-Erling Smørgrav 	if (options->allow_streamlocal_forwarding == -1)
322a0ee8cc6SDag-Erling Smørgrav 		options->allow_streamlocal_forwarding = FORWARD_ALLOW;
323d4af9e69SDag-Erling Smørgrav 	if (options->allow_agent_forwarding == -1)
324d4af9e69SDag-Erling Smørgrav 		options->allow_agent_forwarding = 1;
325a0ee8cc6SDag-Erling Smørgrav 	if (options->fwd_opts.gateway_ports == -1)
326a0ee8cc6SDag-Erling Smørgrav 		options->fwd_opts.gateway_ports = 0;
327c2d3a559SKris Kennaway 	if (options->max_startups == -1)
3286888a9beSDag-Erling Smørgrav 		options->max_startups = 100;
329c2d3a559SKris Kennaway 	if (options->max_startups_rate == -1)
3306888a9beSDag-Erling Smørgrav 		options->max_startups_rate = 30;		/* 30% */
331c2d3a559SKris Kennaway 	if (options->max_startups_begin == -1)
3326888a9beSDag-Erling Smørgrav 		options->max_startups_begin = 10;
33321e764dfSDag-Erling Smørgrav 	if (options->max_authtries == -1)
33421e764dfSDag-Erling Smørgrav 		options->max_authtries = DEFAULT_AUTH_FAIL_MAX;
335d4af9e69SDag-Erling Smørgrav 	if (options->max_sessions == -1)
336d4af9e69SDag-Erling Smørgrav 		options->max_sessions = DEFAULT_SESSIONS_MAX;
337cf2b5f3bSDag-Erling Smørgrav 	if (options->use_dns == -1)
338c4cd1fa4SDag-Erling Smørgrav 		options->use_dns = 1;
339ca3176e7SBrian Feldman 	if (options->client_alive_interval == -1)
340ca3176e7SBrian Feldman 		options->client_alive_interval = 0;
341ca3176e7SBrian Feldman 	if (options->client_alive_count_max == -1)
342ca3176e7SBrian Feldman 		options->client_alive_count_max = 3;
343e146993eSDag-Erling Smørgrav 	if (options->num_authkeys_files == 0) {
344e146993eSDag-Erling Smørgrav 		options->authorized_keys_files[options->num_authkeys_files++] =
345e146993eSDag-Erling Smørgrav 		    xstrdup(_PATH_SSH_USER_PERMITTED_KEYS);
346e146993eSDag-Erling Smørgrav 		options->authorized_keys_files[options->num_authkeys_files++] =
347e146993eSDag-Erling Smørgrav 		    xstrdup(_PATH_SSH_USER_PERMITTED_KEYS2);
348af12a3e7SDag-Erling Smørgrav 	}
349b74df5b2SDag-Erling Smørgrav 	if (options->permit_tun == -1)
350b74df5b2SDag-Erling Smørgrav 		options->permit_tun = SSH_TUNMODE_NO;
3514a421b63SDag-Erling Smørgrav 	if (options->ip_qos_interactive == -1)
3524a421b63SDag-Erling Smørgrav 		options->ip_qos_interactive = IPTOS_LOWDELAY;
3534a421b63SDag-Erling Smørgrav 	if (options->ip_qos_bulk == -1)
3544a421b63SDag-Erling Smørgrav 		options->ip_qos_bulk = IPTOS_THROUGHPUT;
355462c32cbSDag-Erling Smørgrav 	if (options->version_addendum == NULL)
356462c32cbSDag-Erling Smørgrav 		options->version_addendum = xstrdup(SSH_VERSION_FREEBSD);
357a0ee8cc6SDag-Erling Smørgrav 	if (options->fwd_opts.streamlocal_bind_mask == (mode_t)-1)
358a0ee8cc6SDag-Erling Smørgrav 		options->fwd_opts.streamlocal_bind_mask = 0177;
359a0ee8cc6SDag-Erling Smørgrav 	if (options->fwd_opts.streamlocal_bind_unlink == -1)
360a0ee8cc6SDag-Erling Smørgrav 		options->fwd_opts.streamlocal_bind_unlink = 0;
361bc5531deSDag-Erling Smørgrav 	if (options->fingerprint_hash == -1)
362bc5531deSDag-Erling Smørgrav 		options->fingerprint_hash = SSH_FP_HASH_DEFAULT;
363eccfee6eSDag-Erling Smørgrav 
364acc1a9efSDag-Erling Smørgrav 	assemble_algorithms(options);
365eccfee6eSDag-Erling Smørgrav 
366acc1a9efSDag-Erling Smørgrav 	/* Turn privilege separation and sandboxing on by default */
367462c32cbSDag-Erling Smørgrav 	if (use_privsep == -1)
3682b1970f3SDag-Erling Smørgrav 		use_privsep = PRIVSEP_ON;
369462c32cbSDag-Erling Smørgrav 
370bc5531deSDag-Erling Smørgrav #define CLEAR_ON_NONE(v) \
371bc5531deSDag-Erling Smørgrav 	do { \
372bc5531deSDag-Erling Smørgrav 		if (option_clear_or_none(v)) { \
373bc5531deSDag-Erling Smørgrav 			free(v); \
374bc5531deSDag-Erling Smørgrav 			v = NULL; \
375bc5531deSDag-Erling Smørgrav 		} \
376bc5531deSDag-Erling Smørgrav 	} while(0)
377bc5531deSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->pid_file);
378bc5531deSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->xauth_location);
379bc5531deSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->banner);
380bc5531deSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->trusted_user_ca_keys);
381bc5531deSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->revoked_keys_file);
382557f75e5SDag-Erling Smørgrav 	CLEAR_ON_NONE(options->authorized_principals_file);
383acc1a9efSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->adm_forced_command);
384acc1a9efSDag-Erling Smørgrav 	CLEAR_ON_NONE(options->chroot_directory);
385bc5531deSDag-Erling Smørgrav 	for (i = 0; i < options->num_host_key_files; i++)
386bc5531deSDag-Erling Smørgrav 		CLEAR_ON_NONE(options->host_key_files[i]);
387bc5531deSDag-Erling Smørgrav 	for (i = 0; i < options->num_host_cert_files; i++)
388bc5531deSDag-Erling Smørgrav 		CLEAR_ON_NONE(options->host_cert_files[i]);
389bc5531deSDag-Erling Smørgrav #undef CLEAR_ON_NONE
390bc5531deSDag-Erling Smørgrav 
391462c32cbSDag-Erling Smørgrav #ifndef HAVE_MMAP
392462c32cbSDag-Erling Smørgrav 	if (use_privsep && options->compression == 1) {
393462c32cbSDag-Erling Smørgrav 		error("This platform does not support both privilege "
394462c32cbSDag-Erling Smørgrav 		    "separation and compression");
395462c32cbSDag-Erling Smørgrav 		error("Compression disabled");
396462c32cbSDag-Erling Smørgrav 		options->compression = 0;
397462c32cbSDag-Erling Smørgrav 	}
398462c32cbSDag-Erling Smørgrav #endif
399462c32cbSDag-Erling Smørgrav 
400511b41d2SMark Murray }
401511b41d2SMark Murray 
402511b41d2SMark Murray /* Keyword tokens. */
403511b41d2SMark Murray typedef enum {
404511b41d2SMark Murray 	sBadOption,		/* == unknown option */
405989dd127SDag-Erling Smørgrav 	/* Portable-specific options */
406cf2b5f3bSDag-Erling Smørgrav 	sUsePAM,
407989dd127SDag-Erling Smørgrav 	/* Standard Options */
408bc5531deSDag-Erling Smørgrav 	sPort, sHostKeyFile, sServerKeyBits, sLoginGraceTime,
409bc5531deSDag-Erling Smørgrav 	sKeyRegenerationTime, sPermitRootLogin, sLogFacility, sLogLevel,
410cf2b5f3bSDag-Erling Smørgrav 	sRhostsRSAAuthentication, sRSAAuthentication,
411af12a3e7SDag-Erling Smørgrav 	sKerberosAuthentication, sKerberosOrLocalPasswd, sKerberosTicketCleanup,
4121ec0d754SDag-Erling Smørgrav 	sKerberosGetAFSToken,
413cf2b5f3bSDag-Erling Smørgrav 	sKerberosTgtPassing, sChallengeResponseAuthentication,
414aa49c926SDag-Erling Smørgrav 	sPasswordAuthentication, sKbdInteractiveAuthentication,
415aa49c926SDag-Erling Smørgrav 	sListenAddress, sAddressFamily,
416ca3176e7SBrian Feldman 	sPrintMotd, sPrintLastLog, sIgnoreRhosts,
417af12a3e7SDag-Erling Smørgrav 	sX11Forwarding, sX11DisplayOffset, sX11UseLocalhost,
418f7167e0eSDag-Erling Smørgrav 	sPermitTTY, sStrictModes, sEmptyPasswd, sTCPKeepAlive,
419f388f5efSDag-Erling Smørgrav 	sPermitUserEnvironment, sUseLogin, sAllowTcpForwarding, sCompression,
420e4a9863fSDag-Erling Smørgrav 	sRekeyLimit, sAllowUsers, sDenyUsers, sAllowGroups, sDenyGroups,
421ca3176e7SBrian Feldman 	sIgnoreUserKnownHosts, sCiphers, sMacs, sProtocol, sPidFile,
422bc5531deSDag-Erling Smørgrav 	sGatewayPorts, sPubkeyAuthentication, sPubkeyAcceptedKeyTypes,
423bc5531deSDag-Erling Smørgrav 	sXAuthLocation, sSubsystem, sMaxStartups, sMaxAuthTries, sMaxSessions,
424cf2b5f3bSDag-Erling Smørgrav 	sBanner, sUseDNS, sHostbasedAuthentication,
425bc5531deSDag-Erling Smørgrav 	sHostbasedUsesNameFromPacketOnly, sHostbasedAcceptedKeyTypes,
426eccfee6eSDag-Erling Smørgrav 	sHostKeyAlgorithms,
427bc5531deSDag-Erling Smørgrav 	sClientAliveInterval, sClientAliveCountMax, sAuthorizedKeysFile,
428557f75e5SDag-Erling Smørgrav 	sGssAuthentication, sGssCleanupCreds, sGssStrictAcceptor,
429557f75e5SDag-Erling Smørgrav 	sAcceptEnv, sPermitTunnel,
430d4af9e69SDag-Erling Smørgrav 	sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
431d4af9e69SDag-Erling Smørgrav 	sUsePrivilegeSeparation, sAllowAgentForwarding,
432b83788ffSDag-Erling Smørgrav 	sHostCertificate,
433e2f6069cSDag-Erling Smørgrav 	sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile,
434557f75e5SDag-Erling Smørgrav 	sAuthorizedPrincipalsCommand, sAuthorizedPrincipalsCommandUser,
435462c32cbSDag-Erling Smørgrav 	sKexAlgorithms, sIPQoS, sVersionAddendum,
4366888a9beSDag-Erling Smørgrav 	sAuthorizedKeysCommand, sAuthorizedKeysCommandUser,
437a0ee8cc6SDag-Erling Smørgrav 	sAuthenticationMethods, sHostKeyAgent, sPermitUserRC,
438a0ee8cc6SDag-Erling Smørgrav 	sStreamLocalBindMask, sStreamLocalBindUnlink,
439bc5531deSDag-Erling Smørgrav 	sAllowStreamLocalForwarding, sFingerprintHash,
440cf2b5f3bSDag-Erling Smørgrav 	sDeprecated, sUnsupported
441511b41d2SMark Murray } ServerOpCodes;
442511b41d2SMark Murray 
443333ee039SDag-Erling Smørgrav #define SSHCFG_GLOBAL	0x01	/* allowed in main section of sshd_config */
444333ee039SDag-Erling Smørgrav #define SSHCFG_MATCH	0x02	/* allowed inside a Match section */
445333ee039SDag-Erling Smørgrav #define SSHCFG_ALL	(SSHCFG_GLOBAL|SSHCFG_MATCH)
446333ee039SDag-Erling Smørgrav 
447511b41d2SMark Murray /* Textual representation of the tokens. */
448511b41d2SMark Murray static struct {
449511b41d2SMark Murray 	const char *name;
450511b41d2SMark Murray 	ServerOpCodes opcode;
451333ee039SDag-Erling Smørgrav 	u_int flags;
452511b41d2SMark Murray } keywords[] = {
453989dd127SDag-Erling Smørgrav 	/* Portable-specific options */
454cf2b5f3bSDag-Erling Smørgrav #ifdef USE_PAM
455333ee039SDag-Erling Smørgrav 	{ "usepam", sUsePAM, SSHCFG_GLOBAL },
456cf2b5f3bSDag-Erling Smørgrav #else
457333ee039SDag-Erling Smørgrav 	{ "usepam", sUnsupported, SSHCFG_GLOBAL },
458975616f0SDag-Erling Smørgrav #endif
459333ee039SDag-Erling Smørgrav 	{ "pamauthenticationviakbdint", sDeprecated, SSHCFG_GLOBAL },
460989dd127SDag-Erling Smørgrav 	/* Standard Options */
461333ee039SDag-Erling Smørgrav 	{ "port", sPort, SSHCFG_GLOBAL },
462333ee039SDag-Erling Smørgrav 	{ "hostkey", sHostKeyFile, SSHCFG_GLOBAL },
463333ee039SDag-Erling Smørgrav 	{ "hostdsakey", sHostKeyFile, SSHCFG_GLOBAL },		/* alias */
464e4a9863fSDag-Erling Smørgrav 	{ "hostkeyagent", sHostKeyAgent, SSHCFG_GLOBAL },
465333ee039SDag-Erling Smørgrav 	{ "pidfile", sPidFile, SSHCFG_GLOBAL },
466333ee039SDag-Erling Smørgrav 	{ "serverkeybits", sServerKeyBits, SSHCFG_GLOBAL },
467333ee039SDag-Erling Smørgrav 	{ "logingracetime", sLoginGraceTime, SSHCFG_GLOBAL },
468333ee039SDag-Erling Smørgrav 	{ "keyregenerationinterval", sKeyRegenerationTime, SSHCFG_GLOBAL },
469d4af9e69SDag-Erling Smørgrav 	{ "permitrootlogin", sPermitRootLogin, SSHCFG_ALL },
470333ee039SDag-Erling Smørgrav 	{ "syslogfacility", sLogFacility, SSHCFG_GLOBAL },
471333ee039SDag-Erling Smørgrav 	{ "loglevel", sLogLevel, SSHCFG_GLOBAL },
472333ee039SDag-Erling Smørgrav 	{ "rhostsauthentication", sDeprecated, SSHCFG_GLOBAL },
473d4af9e69SDag-Erling Smørgrav 	{ "rhostsrsaauthentication", sRhostsRSAAuthentication, SSHCFG_ALL },
474d4af9e69SDag-Erling Smørgrav 	{ "hostbasedauthentication", sHostbasedAuthentication, SSHCFG_ALL },
475e2f6069cSDag-Erling Smørgrav 	{ "hostbasedusesnamefrompacketonly", sHostbasedUsesNameFromPacketOnly, SSHCFG_ALL },
476bc5531deSDag-Erling Smørgrav 	{ "hostbasedacceptedkeytypes", sHostbasedAcceptedKeyTypes, SSHCFG_ALL },
477eccfee6eSDag-Erling Smørgrav 	{ "hostkeyalgorithms", sHostKeyAlgorithms, SSHCFG_GLOBAL },
478d4af9e69SDag-Erling Smørgrav 	{ "rsaauthentication", sRSAAuthentication, SSHCFG_ALL },
479d4af9e69SDag-Erling Smørgrav 	{ "pubkeyauthentication", sPubkeyAuthentication, SSHCFG_ALL },
480bc5531deSDag-Erling Smørgrav 	{ "pubkeyacceptedkeytypes", sPubkeyAcceptedKeyTypes, SSHCFG_ALL },
481333ee039SDag-Erling Smørgrav 	{ "dsaauthentication", sPubkeyAuthentication, SSHCFG_GLOBAL }, /* alias */
482cf2b5f3bSDag-Erling Smørgrav #ifdef KRB5
483d4af9e69SDag-Erling Smørgrav 	{ "kerberosauthentication", sKerberosAuthentication, SSHCFG_ALL },
484333ee039SDag-Erling Smørgrav 	{ "kerberosorlocalpasswd", sKerberosOrLocalPasswd, SSHCFG_GLOBAL },
485333ee039SDag-Erling Smørgrav 	{ "kerberosticketcleanup", sKerberosTicketCleanup, SSHCFG_GLOBAL },
4861ec0d754SDag-Erling Smørgrav #ifdef USE_AFS
487333ee039SDag-Erling Smørgrav 	{ "kerberosgetafstoken", sKerberosGetAFSToken, SSHCFG_GLOBAL },
4881ec0d754SDag-Erling Smørgrav #else
489333ee039SDag-Erling Smørgrav 	{ "kerberosgetafstoken", sUnsupported, SSHCFG_GLOBAL },
4901ec0d754SDag-Erling Smørgrav #endif
491cf2b5f3bSDag-Erling Smørgrav #else
492d4af9e69SDag-Erling Smørgrav 	{ "kerberosauthentication", sUnsupported, SSHCFG_ALL },
493333ee039SDag-Erling Smørgrav 	{ "kerberosorlocalpasswd", sUnsupported, SSHCFG_GLOBAL },
494333ee039SDag-Erling Smørgrav 	{ "kerberosticketcleanup", sUnsupported, SSHCFG_GLOBAL },
495333ee039SDag-Erling Smørgrav 	{ "kerberosgetafstoken", sUnsupported, SSHCFG_GLOBAL },
496cb96ab36SAssar Westerlund #endif
497333ee039SDag-Erling Smørgrav 	{ "kerberostgtpassing", sUnsupported, SSHCFG_GLOBAL },
498333ee039SDag-Erling Smørgrav 	{ "afstokenpassing", sUnsupported, SSHCFG_GLOBAL },
499cf2b5f3bSDag-Erling Smørgrav #ifdef GSSAPI
500d4af9e69SDag-Erling Smørgrav 	{ "gssapiauthentication", sGssAuthentication, SSHCFG_ALL },
501333ee039SDag-Erling Smørgrav 	{ "gssapicleanupcredentials", sGssCleanupCreds, SSHCFG_GLOBAL },
502557f75e5SDag-Erling Smørgrav 	{ "gssapistrictacceptorcheck", sGssStrictAcceptor, SSHCFG_GLOBAL },
503cf2b5f3bSDag-Erling Smørgrav #else
504d4af9e69SDag-Erling Smørgrav 	{ "gssapiauthentication", sUnsupported, SSHCFG_ALL },
505333ee039SDag-Erling Smørgrav 	{ "gssapicleanupcredentials", sUnsupported, SSHCFG_GLOBAL },
506557f75e5SDag-Erling Smørgrav 	{ "gssapistrictacceptorcheck", sUnsupported, SSHCFG_GLOBAL },
507511b41d2SMark Murray #endif
508d4af9e69SDag-Erling Smørgrav 	{ "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL },
509d4af9e69SDag-Erling Smørgrav 	{ "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
510333ee039SDag-Erling Smørgrav 	{ "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
511333ee039SDag-Erling Smørgrav 	{ "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
512333ee039SDag-Erling Smørgrav 	{ "checkmail", sDeprecated, SSHCFG_GLOBAL },
513333ee039SDag-Erling Smørgrav 	{ "listenaddress", sListenAddress, SSHCFG_GLOBAL },
514333ee039SDag-Erling Smørgrav 	{ "addressfamily", sAddressFamily, SSHCFG_GLOBAL },
515333ee039SDag-Erling Smørgrav 	{ "printmotd", sPrintMotd, SSHCFG_GLOBAL },
516acc1a9efSDag-Erling Smørgrav #ifdef DISABLE_LASTLOG
517acc1a9efSDag-Erling Smørgrav 	{ "printlastlog", sUnsupported, SSHCFG_GLOBAL },
518acc1a9efSDag-Erling Smørgrav #else
519333ee039SDag-Erling Smørgrav 	{ "printlastlog", sPrintLastLog, SSHCFG_GLOBAL },
520acc1a9efSDag-Erling Smørgrav #endif
521333ee039SDag-Erling Smørgrav 	{ "ignorerhosts", sIgnoreRhosts, SSHCFG_GLOBAL },
522333ee039SDag-Erling Smørgrav 	{ "ignoreuserknownhosts", sIgnoreUserKnownHosts, SSHCFG_GLOBAL },
523333ee039SDag-Erling Smørgrav 	{ "x11forwarding", sX11Forwarding, SSHCFG_ALL },
524333ee039SDag-Erling Smørgrav 	{ "x11displayoffset", sX11DisplayOffset, SSHCFG_ALL },
525333ee039SDag-Erling Smørgrav 	{ "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL },
526333ee039SDag-Erling Smørgrav 	{ "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL },
527333ee039SDag-Erling Smørgrav 	{ "strictmodes", sStrictModes, SSHCFG_GLOBAL },
528cce7d346SDag-Erling Smørgrav 	{ "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL },
529333ee039SDag-Erling Smørgrav 	{ "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL },
530333ee039SDag-Erling Smørgrav 	{ "uselogin", sUseLogin, SSHCFG_GLOBAL },
531333ee039SDag-Erling Smørgrav 	{ "compression", sCompression, SSHCFG_GLOBAL },
532e4a9863fSDag-Erling Smørgrav 	{ "rekeylimit", sRekeyLimit, SSHCFG_ALL },
533333ee039SDag-Erling Smørgrav 	{ "tcpkeepalive", sTCPKeepAlive, SSHCFG_GLOBAL },
534333ee039SDag-Erling Smørgrav 	{ "keepalive", sTCPKeepAlive, SSHCFG_GLOBAL },	/* obsolete alias */
535333ee039SDag-Erling Smørgrav 	{ "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
536d4af9e69SDag-Erling Smørgrav 	{ "allowagentforwarding", sAllowAgentForwarding, SSHCFG_ALL },
537462c32cbSDag-Erling Smørgrav 	{ "allowusers", sAllowUsers, SSHCFG_ALL },
538462c32cbSDag-Erling Smørgrav 	{ "denyusers", sDenyUsers, SSHCFG_ALL },
539462c32cbSDag-Erling Smørgrav 	{ "allowgroups", sAllowGroups, SSHCFG_ALL },
540462c32cbSDag-Erling Smørgrav 	{ "denygroups", sDenyGroups, SSHCFG_ALL },
541333ee039SDag-Erling Smørgrav 	{ "ciphers", sCiphers, SSHCFG_GLOBAL },
542333ee039SDag-Erling Smørgrav 	{ "macs", sMacs, SSHCFG_GLOBAL },
543333ee039SDag-Erling Smørgrav 	{ "protocol", sProtocol, SSHCFG_GLOBAL },
544333ee039SDag-Erling Smørgrav 	{ "gatewayports", sGatewayPorts, SSHCFG_ALL },
545333ee039SDag-Erling Smørgrav 	{ "subsystem", sSubsystem, SSHCFG_GLOBAL },
546333ee039SDag-Erling Smørgrav 	{ "maxstartups", sMaxStartups, SSHCFG_GLOBAL },
547d4af9e69SDag-Erling Smørgrav 	{ "maxauthtries", sMaxAuthTries, SSHCFG_ALL },
548d4af9e69SDag-Erling Smørgrav 	{ "maxsessions", sMaxSessions, SSHCFG_ALL },
549d4af9e69SDag-Erling Smørgrav 	{ "banner", sBanner, SSHCFG_ALL },
550333ee039SDag-Erling Smørgrav 	{ "usedns", sUseDNS, SSHCFG_GLOBAL },
551333ee039SDag-Erling Smørgrav 	{ "verifyreversemapping", sDeprecated, SSHCFG_GLOBAL },
552333ee039SDag-Erling Smørgrav 	{ "reversemappingcheck", sDeprecated, SSHCFG_GLOBAL },
553333ee039SDag-Erling Smørgrav 	{ "clientaliveinterval", sClientAliveInterval, SSHCFG_GLOBAL },
554333ee039SDag-Erling Smørgrav 	{ "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
555e2f6069cSDag-Erling Smørgrav 	{ "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_ALL },
556e146993eSDag-Erling Smørgrav 	{ "authorizedkeysfile2", sDeprecated, SSHCFG_ALL },
557333ee039SDag-Erling Smørgrav 	{ "useprivilegeseparation", sUsePrivilegeSeparation, SSHCFG_GLOBAL},
558462c32cbSDag-Erling Smørgrav 	{ "acceptenv", sAcceptEnv, SSHCFG_ALL },
559e2f6069cSDag-Erling Smørgrav 	{ "permittunnel", sPermitTunnel, SSHCFG_ALL },
560f7167e0eSDag-Erling Smørgrav 	{ "permittty", sPermitTTY, SSHCFG_ALL },
561a0ee8cc6SDag-Erling Smørgrav 	{ "permituserrc", sPermitUserRC, SSHCFG_ALL },
562333ee039SDag-Erling Smørgrav 	{ "match", sMatch, SSHCFG_ALL },
563333ee039SDag-Erling Smørgrav 	{ "permitopen", sPermitOpen, SSHCFG_ALL },
564333ee039SDag-Erling Smørgrav 	{ "forcecommand", sForceCommand, SSHCFG_ALL },
565d4af9e69SDag-Erling Smørgrav 	{ "chrootdirectory", sChrootDirectory, SSHCFG_ALL },
566b15c8340SDag-Erling Smørgrav 	{ "hostcertificate", sHostCertificate, SSHCFG_GLOBAL },
567b15c8340SDag-Erling Smørgrav 	{ "revokedkeys", sRevokedKeys, SSHCFG_ALL },
568b15c8340SDag-Erling Smørgrav 	{ "trustedusercakeys", sTrustedUserCAKeys, SSHCFG_ALL },
569e2f6069cSDag-Erling Smørgrav 	{ "authorizedprincipalsfile", sAuthorizedPrincipalsFile, SSHCFG_ALL },
5704a421b63SDag-Erling Smørgrav 	{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL },
5714a421b63SDag-Erling Smørgrav 	{ "ipqos", sIPQoS, SSHCFG_ALL },
5726888a9beSDag-Erling Smørgrav 	{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL },
5736888a9beSDag-Erling Smørgrav 	{ "authorizedkeyscommanduser", sAuthorizedKeysCommandUser, SSHCFG_ALL },
574557f75e5SDag-Erling Smørgrav 	{ "authorizedprincipalscommand", sAuthorizedPrincipalsCommand, SSHCFG_ALL },
575557f75e5SDag-Erling Smørgrav 	{ "authorizedprincipalscommanduser", sAuthorizedPrincipalsCommandUser, SSHCFG_ALL },
576462c32cbSDag-Erling Smørgrav 	{ "versionaddendum", sVersionAddendum, SSHCFG_GLOBAL },
5776888a9beSDag-Erling Smørgrav 	{ "authenticationmethods", sAuthenticationMethods, SSHCFG_ALL },
578a0ee8cc6SDag-Erling Smørgrav 	{ "streamlocalbindmask", sStreamLocalBindMask, SSHCFG_ALL },
579a0ee8cc6SDag-Erling Smørgrav 	{ "streamlocalbindunlink", sStreamLocalBindUnlink, SSHCFG_ALL },
580a0ee8cc6SDag-Erling Smørgrav 	{ "allowstreamlocalforwarding", sAllowStreamLocalForwarding, SSHCFG_ALL },
581bc5531deSDag-Erling Smørgrav 	{ "fingerprinthash", sFingerprintHash, SSHCFG_GLOBAL },
5826f351346SDag-Erling Smørgrav 	{ "noneenabled", sUnsupported, SSHCFG_ALL },
5839860d96eSDag-Erling Smørgrav 	{ "hpndisabled", sDeprecated, SSHCFG_ALL },
5849860d96eSDag-Erling Smørgrav 	{ "hpnbuffersize", sDeprecated, SSHCFG_ALL },
5859860d96eSDag-Erling Smørgrav 	{ "tcprcvbufpoll", sDeprecated, SSHCFG_ALL },
586333ee039SDag-Erling Smørgrav 	{ NULL, sBadOption, 0 }
587511b41d2SMark Murray };
588511b41d2SMark Murray 
589d4af9e69SDag-Erling Smørgrav static struct {
590d4af9e69SDag-Erling Smørgrav 	int val;
591d4af9e69SDag-Erling Smørgrav 	char *text;
592d4af9e69SDag-Erling Smørgrav } tunmode_desc[] = {
593d4af9e69SDag-Erling Smørgrav 	{ SSH_TUNMODE_NO, "no" },
594d4af9e69SDag-Erling Smørgrav 	{ SSH_TUNMODE_POINTOPOINT, "point-to-point" },
595d4af9e69SDag-Erling Smørgrav 	{ SSH_TUNMODE_ETHERNET, "ethernet" },
596d4af9e69SDag-Erling Smørgrav 	{ SSH_TUNMODE_YES, "yes" },
597d4af9e69SDag-Erling Smørgrav 	{ -1, NULL }
598d4af9e69SDag-Erling Smørgrav };
599d4af9e69SDag-Erling Smørgrav 
600511b41d2SMark Murray /*
601ca3176e7SBrian Feldman  * Returns the number of the token pointed to by cp or sBadOption.
602511b41d2SMark Murray  */
603511b41d2SMark Murray 
604511b41d2SMark Murray static ServerOpCodes
605511b41d2SMark Murray parse_token(const char *cp, const char *filename,
606333ee039SDag-Erling Smørgrav 	    int linenum, u_int *flags)
607511b41d2SMark Murray {
608ca3176e7SBrian Feldman 	u_int i;
609511b41d2SMark Murray 
610511b41d2SMark Murray 	for (i = 0; keywords[i].name; i++)
611333ee039SDag-Erling Smørgrav 		if (strcasecmp(cp, keywords[i].name) == 0) {
612333ee039SDag-Erling Smørgrav 			*flags = keywords[i].flags;
613511b41d2SMark Murray 			return keywords[i].opcode;
614333ee039SDag-Erling Smørgrav 		}
615511b41d2SMark Murray 
616ca3176e7SBrian Feldman 	error("%s: line %d: Bad configuration option: %s",
617511b41d2SMark Murray 	    filename, linenum, cp);
618511b41d2SMark Murray 	return sBadOption;
619511b41d2SMark Murray }
620511b41d2SMark Murray 
621b15c8340SDag-Erling Smørgrav char *
622b15c8340SDag-Erling Smørgrav derelativise_path(const char *path)
623b15c8340SDag-Erling Smørgrav {
624bc5531deSDag-Erling Smørgrav 	char *expanded, *ret, cwd[PATH_MAX];
625b15c8340SDag-Erling Smørgrav 
626bc5531deSDag-Erling Smørgrav 	if (strcasecmp(path, "none") == 0)
627bc5531deSDag-Erling Smørgrav 		return xstrdup("none");
628b15c8340SDag-Erling Smørgrav 	expanded = tilde_expand_filename(path, getuid());
629b15c8340SDag-Erling Smørgrav 	if (*expanded == '/')
630b15c8340SDag-Erling Smørgrav 		return expanded;
6318ad9b54aSDag-Erling Smørgrav 	if (getcwd(cwd, sizeof(cwd)) == NULL)
632b15c8340SDag-Erling Smørgrav 		fatal("%s: getcwd: %s", __func__, strerror(errno));
633b15c8340SDag-Erling Smørgrav 	xasprintf(&ret, "%s/%s", cwd, expanded);
634e4a9863fSDag-Erling Smørgrav 	free(expanded);
635b15c8340SDag-Erling Smørgrav 	return ret;
636b15c8340SDag-Erling Smørgrav }
637b15c8340SDag-Erling Smørgrav 
638af12a3e7SDag-Erling Smørgrav static void
639cce7d346SDag-Erling Smørgrav add_listen_addr(ServerOptions *options, char *addr, int port)
640511b41d2SMark Murray {
641d4ecd108SDag-Erling Smørgrav 	u_int i;
642511b41d2SMark Murray 
643ca3176e7SBrian Feldman 	if (port == 0)
644ca3176e7SBrian Feldman 		for (i = 0; i < options->num_ports; i++)
645ca3176e7SBrian Feldman 			add_one_listen_addr(options, addr, options->ports[i]);
646ca3176e7SBrian Feldman 	else
647ca3176e7SBrian Feldman 		add_one_listen_addr(options, addr, port);
648ca3176e7SBrian Feldman }
649ca3176e7SBrian Feldman 
650af12a3e7SDag-Erling Smørgrav static void
651cce7d346SDag-Erling Smørgrav add_one_listen_addr(ServerOptions *options, char *addr, int port)
652ca3176e7SBrian Feldman {
653ca3176e7SBrian Feldman 	struct addrinfo hints, *ai, *aitop;
654ca3176e7SBrian Feldman 	char strport[NI_MAXSERV];
655ca3176e7SBrian Feldman 	int gaierr;
656ca3176e7SBrian Feldman 
657511b41d2SMark Murray 	memset(&hints, 0, sizeof(hints));
658aa49c926SDag-Erling Smørgrav 	hints.ai_family = options->address_family;
659511b41d2SMark Murray 	hints.ai_socktype = SOCK_STREAM;
660511b41d2SMark Murray 	hints.ai_flags = (addr == NULL) ? AI_PASSIVE : 0;
661cce7d346SDag-Erling Smørgrav 	snprintf(strport, sizeof strport, "%d", port);
662511b41d2SMark Murray 	if ((gaierr = getaddrinfo(addr, strport, &hints, &aitop)) != 0)
663ca3176e7SBrian Feldman 		fatal("bad addr or host: %s (%s)",
664511b41d2SMark Murray 		    addr ? addr : "<NULL>",
665d4af9e69SDag-Erling Smørgrav 		    ssh_gai_strerror(gaierr));
666511b41d2SMark Murray 	for (ai = aitop; ai->ai_next; ai = ai->ai_next)
667511b41d2SMark Murray 		;
668511b41d2SMark Murray 	ai->ai_next = options->listen_addrs;
669511b41d2SMark Murray 	options->listen_addrs = aitop;
670511b41d2SMark Murray }
671511b41d2SMark Murray 
672557f75e5SDag-Erling Smørgrav /*
673557f75e5SDag-Erling Smørgrav  * Queue a ListenAddress to be processed once we have all of the Ports
674557f75e5SDag-Erling Smørgrav  * and AddressFamily options.
675557f75e5SDag-Erling Smørgrav  */
676557f75e5SDag-Erling Smørgrav static void
677557f75e5SDag-Erling Smørgrav queue_listen_addr(ServerOptions *options, char *addr, int port)
678557f75e5SDag-Erling Smørgrav {
679557f75e5SDag-Erling Smørgrav 	options->queued_listen_addrs = xreallocarray(
680557f75e5SDag-Erling Smørgrav 	    options->queued_listen_addrs, options->num_queued_listens + 1,
681557f75e5SDag-Erling Smørgrav 	    sizeof(addr));
682557f75e5SDag-Erling Smørgrav 	options->queued_listen_ports = xreallocarray(
683557f75e5SDag-Erling Smørgrav 	    options->queued_listen_ports, options->num_queued_listens + 1,
684557f75e5SDag-Erling Smørgrav 	    sizeof(port));
685557f75e5SDag-Erling Smørgrav 	options->queued_listen_addrs[options->num_queued_listens] =
686557f75e5SDag-Erling Smørgrav 	    xstrdup(addr);
687557f75e5SDag-Erling Smørgrav 	options->queued_listen_ports[options->num_queued_listens] = port;
688557f75e5SDag-Erling Smørgrav 	options->num_queued_listens++;
689557f75e5SDag-Erling Smørgrav }
690557f75e5SDag-Erling Smørgrav 
691557f75e5SDag-Erling Smørgrav /*
692557f75e5SDag-Erling Smørgrav  * Process queued (text) ListenAddress entries.
693557f75e5SDag-Erling Smørgrav  */
694557f75e5SDag-Erling Smørgrav static void
695557f75e5SDag-Erling Smørgrav process_queued_listen_addrs(ServerOptions *options)
696557f75e5SDag-Erling Smørgrav {
697557f75e5SDag-Erling Smørgrav 	u_int i;
698557f75e5SDag-Erling Smørgrav 
699557f75e5SDag-Erling Smørgrav 	if (options->num_ports == 0)
700557f75e5SDag-Erling Smørgrav 		options->ports[options->num_ports++] = SSH_DEFAULT_PORT;
701557f75e5SDag-Erling Smørgrav 	if (options->address_family == -1)
702557f75e5SDag-Erling Smørgrav 		options->address_family = AF_UNSPEC;
703557f75e5SDag-Erling Smørgrav 
704557f75e5SDag-Erling Smørgrav 	for (i = 0; i < options->num_queued_listens; i++) {
705557f75e5SDag-Erling Smørgrav 		add_listen_addr(options, options->queued_listen_addrs[i],
706557f75e5SDag-Erling Smørgrav 		    options->queued_listen_ports[i]);
707557f75e5SDag-Erling Smørgrav 		free(options->queued_listen_addrs[i]);
708557f75e5SDag-Erling Smørgrav 		options->queued_listen_addrs[i] = NULL;
709557f75e5SDag-Erling Smørgrav 	}
710557f75e5SDag-Erling Smørgrav 	free(options->queued_listen_addrs);
711557f75e5SDag-Erling Smørgrav 	options->queued_listen_addrs = NULL;
712557f75e5SDag-Erling Smørgrav 	free(options->queued_listen_ports);
713557f75e5SDag-Erling Smørgrav 	options->queued_listen_ports = NULL;
714557f75e5SDag-Erling Smørgrav 	options->num_queued_listens = 0;
715557f75e5SDag-Erling Smørgrav }
716557f75e5SDag-Erling Smørgrav 
717462c32cbSDag-Erling Smørgrav struct connection_info *
718462c32cbSDag-Erling Smørgrav get_connection_info(int populate, int use_dns)
719462c32cbSDag-Erling Smørgrav {
720462c32cbSDag-Erling Smørgrav 	static struct connection_info ci;
721462c32cbSDag-Erling Smørgrav 
722462c32cbSDag-Erling Smørgrav 	if (!populate)
723462c32cbSDag-Erling Smørgrav 		return &ci;
724462c32cbSDag-Erling Smørgrav 	ci.host = get_canonical_hostname(use_dns);
725462c32cbSDag-Erling Smørgrav 	ci.address = get_remote_ipaddr();
726462c32cbSDag-Erling Smørgrav 	ci.laddress = get_local_ipaddr(packet_get_connection_in());
727462c32cbSDag-Erling Smørgrav 	ci.lport = get_local_port();
728462c32cbSDag-Erling Smørgrav 	return &ci;
729462c32cbSDag-Erling Smørgrav }
730462c32cbSDag-Erling Smørgrav 
731333ee039SDag-Erling Smørgrav /*
732333ee039SDag-Erling Smørgrav  * The strategy for the Match blocks is that the config file is parsed twice.
733333ee039SDag-Erling Smørgrav  *
734333ee039SDag-Erling Smørgrav  * The first time is at startup.  activep is initialized to 1 and the
735333ee039SDag-Erling Smørgrav  * directives in the global context are processed and acted on.  Hitting a
736333ee039SDag-Erling Smørgrav  * Match directive unsets activep and the directives inside the block are
737333ee039SDag-Erling Smørgrav  * checked for syntax only.
738333ee039SDag-Erling Smørgrav  *
739333ee039SDag-Erling Smørgrav  * The second time is after a connection has been established but before
740333ee039SDag-Erling Smørgrav  * authentication.  activep is initialized to 2 and global config directives
741333ee039SDag-Erling Smørgrav  * are ignored since they have already been processed.  If the criteria in a
742333ee039SDag-Erling Smørgrav  * Match block is met, activep is set and the subsequent directives
743333ee039SDag-Erling Smørgrav  * processed and actioned until EOF or another Match block unsets it.  Any
744333ee039SDag-Erling Smørgrav  * options set are copied into the main server config.
745333ee039SDag-Erling Smørgrav  *
746333ee039SDag-Erling Smørgrav  * Potential additions/improvements:
747333ee039SDag-Erling Smørgrav  *  - Add Match support for pre-kex directives, eg Protocol, Ciphers.
748333ee039SDag-Erling Smørgrav  *
749333ee039SDag-Erling Smørgrav  *  - Add a Tag directive (idea from David Leonard) ala pf, eg:
750333ee039SDag-Erling Smørgrav  *	Match Address 192.168.0.*
751333ee039SDag-Erling Smørgrav  *		Tag trusted
752333ee039SDag-Erling Smørgrav  *	Match Group wheel
753333ee039SDag-Erling Smørgrav  *		Tag trusted
754333ee039SDag-Erling Smørgrav  *	Match Tag trusted
755333ee039SDag-Erling Smørgrav  *		AllowTcpForwarding yes
756333ee039SDag-Erling Smørgrav  *		GatewayPorts clientspecified
757333ee039SDag-Erling Smørgrav  *		[...]
758333ee039SDag-Erling Smørgrav  *
759333ee039SDag-Erling Smørgrav  *  - Add a PermittedChannelRequests directive
760333ee039SDag-Erling Smørgrav  *	Match Group shell
761333ee039SDag-Erling Smørgrav  *		PermittedChannelRequests session,forwarded-tcpip
762333ee039SDag-Erling Smørgrav  */
763333ee039SDag-Erling Smørgrav 
764333ee039SDag-Erling Smørgrav static int
765333ee039SDag-Erling Smørgrav match_cfg_line_group(const char *grps, int line, const char *user)
766333ee039SDag-Erling Smørgrav {
767333ee039SDag-Erling Smørgrav 	int result = 0;
768333ee039SDag-Erling Smørgrav 	struct passwd *pw;
769333ee039SDag-Erling Smørgrav 
770333ee039SDag-Erling Smørgrav 	if (user == NULL)
771333ee039SDag-Erling Smørgrav 		goto out;
772333ee039SDag-Erling Smørgrav 
773333ee039SDag-Erling Smørgrav 	if ((pw = getpwnam(user)) == NULL) {
774333ee039SDag-Erling Smørgrav 		debug("Can't match group at line %d because user %.100s does "
775333ee039SDag-Erling Smørgrav 		    "not exist", line, user);
776333ee039SDag-Erling Smørgrav 	} else if (ga_init(pw->pw_name, pw->pw_gid) == 0) {
777333ee039SDag-Erling Smørgrav 		debug("Can't Match group because user %.100s not in any group "
778333ee039SDag-Erling Smørgrav 		    "at line %d", user, line);
779d4af9e69SDag-Erling Smørgrav 	} else if (ga_match_pattern_list(grps) != 1) {
780d4af9e69SDag-Erling Smørgrav 		debug("user %.100s does not match group list %.100s at line %d",
781d4af9e69SDag-Erling Smørgrav 		    user, grps, line);
782333ee039SDag-Erling Smørgrav 	} else {
783d4af9e69SDag-Erling Smørgrav 		debug("user %.100s matched group list %.100s at line %d", user,
784d4af9e69SDag-Erling Smørgrav 		    grps, line);
785333ee039SDag-Erling Smørgrav 		result = 1;
786333ee039SDag-Erling Smørgrav 	}
787333ee039SDag-Erling Smørgrav out:
788333ee039SDag-Erling Smørgrav 	ga_free();
789333ee039SDag-Erling Smørgrav 	return result;
790333ee039SDag-Erling Smørgrav }
791333ee039SDag-Erling Smørgrav 
792462c32cbSDag-Erling Smørgrav /*
7936888a9beSDag-Erling Smørgrav  * All of the attributes on a single Match line are ANDed together, so we need
794f7167e0eSDag-Erling Smørgrav  * to check every attribute and set the result to zero if any attribute does
7956888a9beSDag-Erling Smørgrav  * not match.
796462c32cbSDag-Erling Smørgrav  */
797333ee039SDag-Erling Smørgrav static int
798462c32cbSDag-Erling Smørgrav match_cfg_line(char **condition, int line, struct connection_info *ci)
799333ee039SDag-Erling Smørgrav {
800f7167e0eSDag-Erling Smørgrav 	int result = 1, attributes = 0, port;
801333ee039SDag-Erling Smørgrav 	char *arg, *attrib, *cp = *condition;
802333ee039SDag-Erling Smørgrav 
803462c32cbSDag-Erling Smørgrav 	if (ci == NULL)
804333ee039SDag-Erling Smørgrav 		debug3("checking syntax for 'Match %s'", cp);
805333ee039SDag-Erling Smørgrav 	else
806462c32cbSDag-Erling Smørgrav 		debug3("checking match for '%s' user %s host %s addr %s "
807462c32cbSDag-Erling Smørgrav 		    "laddr %s lport %d", cp, ci->user ? ci->user : "(null)",
808462c32cbSDag-Erling Smørgrav 		    ci->host ? ci->host : "(null)",
809462c32cbSDag-Erling Smørgrav 		    ci->address ? ci->address : "(null)",
810462c32cbSDag-Erling Smørgrav 		    ci->laddress ? ci->laddress : "(null)", ci->lport);
811333ee039SDag-Erling Smørgrav 
812333ee039SDag-Erling Smørgrav 	while ((attrib = strdelim(&cp)) && *attrib != '\0') {
813f7167e0eSDag-Erling Smørgrav 		attributes++;
814f7167e0eSDag-Erling Smørgrav 		if (strcasecmp(attrib, "all") == 0) {
815f7167e0eSDag-Erling Smørgrav 			if (attributes != 1 ||
816f7167e0eSDag-Erling Smørgrav 			    ((arg = strdelim(&cp)) != NULL && *arg != '\0')) {
817f7167e0eSDag-Erling Smørgrav 				error("'all' cannot be combined with other "
818f7167e0eSDag-Erling Smørgrav 				    "Match attributes");
819f7167e0eSDag-Erling Smørgrav 				return -1;
820f7167e0eSDag-Erling Smørgrav 			}
821f7167e0eSDag-Erling Smørgrav 			*condition = cp;
822f7167e0eSDag-Erling Smørgrav 			return 1;
823f7167e0eSDag-Erling Smørgrav 		}
824333ee039SDag-Erling Smørgrav 		if ((arg = strdelim(&cp)) == NULL || *arg == '\0') {
825333ee039SDag-Erling Smørgrav 			error("Missing Match criteria for %s", attrib);
826333ee039SDag-Erling Smørgrav 			return -1;
827333ee039SDag-Erling Smørgrav 		}
828333ee039SDag-Erling Smørgrav 		if (strcasecmp(attrib, "user") == 0) {
829462c32cbSDag-Erling Smørgrav 			if (ci == NULL || ci->user == NULL) {
830333ee039SDag-Erling Smørgrav 				result = 0;
831333ee039SDag-Erling Smørgrav 				continue;
832333ee039SDag-Erling Smørgrav 			}
833557f75e5SDag-Erling Smørgrav 			if (match_pattern_list(ci->user, arg, 0) != 1)
834333ee039SDag-Erling Smørgrav 				result = 0;
835333ee039SDag-Erling Smørgrav 			else
836333ee039SDag-Erling Smørgrav 				debug("user %.100s matched 'User %.100s' at "
837462c32cbSDag-Erling Smørgrav 				    "line %d", ci->user, arg, line);
838333ee039SDag-Erling Smørgrav 		} else if (strcasecmp(attrib, "group") == 0) {
839462c32cbSDag-Erling Smørgrav 			if (ci == NULL || ci->user == NULL) {
840462c32cbSDag-Erling Smørgrav 				result = 0;
841462c32cbSDag-Erling Smørgrav 				continue;
842462c32cbSDag-Erling Smørgrav 			}
843462c32cbSDag-Erling Smørgrav 			switch (match_cfg_line_group(arg, line, ci->user)) {
844333ee039SDag-Erling Smørgrav 			case -1:
845333ee039SDag-Erling Smørgrav 				return -1;
846333ee039SDag-Erling Smørgrav 			case 0:
847333ee039SDag-Erling Smørgrav 				result = 0;
848333ee039SDag-Erling Smørgrav 			}
849333ee039SDag-Erling Smørgrav 		} else if (strcasecmp(attrib, "host") == 0) {
850462c32cbSDag-Erling Smørgrav 			if (ci == NULL || ci->host == NULL) {
851333ee039SDag-Erling Smørgrav 				result = 0;
852333ee039SDag-Erling Smørgrav 				continue;
853333ee039SDag-Erling Smørgrav 			}
854557f75e5SDag-Erling Smørgrav 			if (match_hostname(ci->host, arg) != 1)
855333ee039SDag-Erling Smørgrav 				result = 0;
856333ee039SDag-Erling Smørgrav 			else
857333ee039SDag-Erling Smørgrav 				debug("connection from %.100s matched 'Host "
858462c32cbSDag-Erling Smørgrav 				    "%.100s' at line %d", ci->host, arg, line);
859333ee039SDag-Erling Smørgrav 		} else if (strcasecmp(attrib, "address") == 0) {
860462c32cbSDag-Erling Smørgrav 			if (ci == NULL || ci->address == NULL) {
861462c32cbSDag-Erling Smørgrav 				result = 0;
862462c32cbSDag-Erling Smørgrav 				continue;
863462c32cbSDag-Erling Smørgrav 			}
864462c32cbSDag-Erling Smørgrav 			switch (addr_match_list(ci->address, arg)) {
865d4af9e69SDag-Erling Smørgrav 			case 1:
866333ee039SDag-Erling Smørgrav 				debug("connection from %.100s matched 'Address "
867462c32cbSDag-Erling Smørgrav 				    "%.100s' at line %d", ci->address, arg, line);
868d4af9e69SDag-Erling Smørgrav 				break;
869d4af9e69SDag-Erling Smørgrav 			case 0:
870d4af9e69SDag-Erling Smørgrav 			case -1:
871d4af9e69SDag-Erling Smørgrav 				result = 0;
872d4af9e69SDag-Erling Smørgrav 				break;
873d4af9e69SDag-Erling Smørgrav 			case -2:
874d4af9e69SDag-Erling Smørgrav 				return -1;
875d4af9e69SDag-Erling Smørgrav 			}
876462c32cbSDag-Erling Smørgrav 		} else if (strcasecmp(attrib, "localaddress") == 0){
877462c32cbSDag-Erling Smørgrav 			if (ci == NULL || ci->laddress == NULL) {
878462c32cbSDag-Erling Smørgrav 				result = 0;
879462c32cbSDag-Erling Smørgrav 				continue;
880462c32cbSDag-Erling Smørgrav 			}
881462c32cbSDag-Erling Smørgrav 			switch (addr_match_list(ci->laddress, arg)) {
882462c32cbSDag-Erling Smørgrav 			case 1:
883462c32cbSDag-Erling Smørgrav 				debug("connection from %.100s matched "
884462c32cbSDag-Erling Smørgrav 				    "'LocalAddress %.100s' at line %d",
885462c32cbSDag-Erling Smørgrav 				    ci->laddress, arg, line);
886462c32cbSDag-Erling Smørgrav 				break;
887462c32cbSDag-Erling Smørgrav 			case 0:
888462c32cbSDag-Erling Smørgrav 			case -1:
889462c32cbSDag-Erling Smørgrav 				result = 0;
890462c32cbSDag-Erling Smørgrav 				break;
891462c32cbSDag-Erling Smørgrav 			case -2:
892462c32cbSDag-Erling Smørgrav 				return -1;
893462c32cbSDag-Erling Smørgrav 			}
894462c32cbSDag-Erling Smørgrav 		} else if (strcasecmp(attrib, "localport") == 0) {
895462c32cbSDag-Erling Smørgrav 			if ((port = a2port(arg)) == -1) {
896462c32cbSDag-Erling Smørgrav 				error("Invalid LocalPort '%s' on Match line",
897462c32cbSDag-Erling Smørgrav 				    arg);
898462c32cbSDag-Erling Smørgrav 				return -1;
899462c32cbSDag-Erling Smørgrav 			}
900462c32cbSDag-Erling Smørgrav 			if (ci == NULL || ci->lport == 0) {
901462c32cbSDag-Erling Smørgrav 				result = 0;
902462c32cbSDag-Erling Smørgrav 				continue;
903462c32cbSDag-Erling Smørgrav 			}
904462c32cbSDag-Erling Smørgrav 			/* TODO support port lists */
905462c32cbSDag-Erling Smørgrav 			if (port == ci->lport)
906462c32cbSDag-Erling Smørgrav 				debug("connection from %.100s matched "
907462c32cbSDag-Erling Smørgrav 				    "'LocalPort %d' at line %d",
908462c32cbSDag-Erling Smørgrav 				    ci->laddress, port, line);
909462c32cbSDag-Erling Smørgrav 			else
910462c32cbSDag-Erling Smørgrav 				result = 0;
911333ee039SDag-Erling Smørgrav 		} else {
912333ee039SDag-Erling Smørgrav 			error("Unsupported Match attribute %s", attrib);
913333ee039SDag-Erling Smørgrav 			return -1;
914333ee039SDag-Erling Smørgrav 		}
915333ee039SDag-Erling Smørgrav 	}
916f7167e0eSDag-Erling Smørgrav 	if (attributes == 0) {
917f7167e0eSDag-Erling Smørgrav 		error("One or more attributes required for Match");
918f7167e0eSDag-Erling Smørgrav 		return -1;
919f7167e0eSDag-Erling Smørgrav 	}
920462c32cbSDag-Erling Smørgrav 	if (ci != NULL)
921333ee039SDag-Erling Smørgrav 		debug3("match %sfound", result ? "" : "not ");
922333ee039SDag-Erling Smørgrav 	*condition = cp;
923333ee039SDag-Erling Smørgrav 	return result;
924333ee039SDag-Erling Smørgrav }
925333ee039SDag-Erling Smørgrav 
926333ee039SDag-Erling Smørgrav #define WHITESPACE " \t\r\n"
927333ee039SDag-Erling Smørgrav 
928e146993eSDag-Erling Smørgrav /* Multistate option parsing */
929e146993eSDag-Erling Smørgrav struct multistate {
930e146993eSDag-Erling Smørgrav 	char *key;
931e146993eSDag-Erling Smørgrav 	int value;
932e146993eSDag-Erling Smørgrav };
933e146993eSDag-Erling Smørgrav static const struct multistate multistate_addressfamily[] = {
934e146993eSDag-Erling Smørgrav 	{ "inet",			AF_INET },
935e146993eSDag-Erling Smørgrav 	{ "inet6",			AF_INET6 },
936e146993eSDag-Erling Smørgrav 	{ "any",			AF_UNSPEC },
937e146993eSDag-Erling Smørgrav 	{ NULL, -1 }
938e146993eSDag-Erling Smørgrav };
939e146993eSDag-Erling Smørgrav static const struct multistate multistate_permitrootlogin[] = {
940e146993eSDag-Erling Smørgrav 	{ "without-password",		PERMIT_NO_PASSWD },
941eccfee6eSDag-Erling Smørgrav 	{ "prohibit-password",		PERMIT_NO_PASSWD },
942e146993eSDag-Erling Smørgrav 	{ "forced-commands-only",	PERMIT_FORCED_ONLY },
943e146993eSDag-Erling Smørgrav 	{ "yes",			PERMIT_YES },
944e146993eSDag-Erling Smørgrav 	{ "no",				PERMIT_NO },
945e146993eSDag-Erling Smørgrav 	{ NULL, -1 }
946e146993eSDag-Erling Smørgrav };
947e146993eSDag-Erling Smørgrav static const struct multistate multistate_compression[] = {
948e146993eSDag-Erling Smørgrav 	{ "delayed",			COMP_DELAYED },
949e146993eSDag-Erling Smørgrav 	{ "yes",			COMP_ZLIB },
950e146993eSDag-Erling Smørgrav 	{ "no",				COMP_NONE },
951e146993eSDag-Erling Smørgrav 	{ NULL, -1 }
952e146993eSDag-Erling Smørgrav };
953e146993eSDag-Erling Smørgrav static const struct multistate multistate_gatewayports[] = {
954e146993eSDag-Erling Smørgrav 	{ "clientspecified",		2 },
955e146993eSDag-Erling Smørgrav 	{ "yes",			1 },
956e146993eSDag-Erling Smørgrav 	{ "no",				0 },
957e146993eSDag-Erling Smørgrav 	{ NULL, -1 }
958e146993eSDag-Erling Smørgrav };
959e146993eSDag-Erling Smørgrav static const struct multistate multistate_privsep[] = {
960462c32cbSDag-Erling Smørgrav 	{ "yes",			PRIVSEP_NOSANDBOX },
961462c32cbSDag-Erling Smørgrav 	{ "sandbox",			PRIVSEP_ON },
962462c32cbSDag-Erling Smørgrav 	{ "nosandbox",			PRIVSEP_NOSANDBOX },
963e146993eSDag-Erling Smørgrav 	{ "no",				PRIVSEP_OFF },
964e146993eSDag-Erling Smørgrav 	{ NULL, -1 }
965e146993eSDag-Erling Smørgrav };
9666888a9beSDag-Erling Smørgrav static const struct multistate multistate_tcpfwd[] = {
9676888a9beSDag-Erling Smørgrav 	{ "yes",			FORWARD_ALLOW },
9686888a9beSDag-Erling Smørgrav 	{ "all",			FORWARD_ALLOW },
9696888a9beSDag-Erling Smørgrav 	{ "no",				FORWARD_DENY },
9706888a9beSDag-Erling Smørgrav 	{ "remote",			FORWARD_REMOTE },
9716888a9beSDag-Erling Smørgrav 	{ "local",			FORWARD_LOCAL },
9726888a9beSDag-Erling Smørgrav 	{ NULL, -1 }
9736888a9beSDag-Erling Smørgrav };
974e146993eSDag-Erling Smørgrav 
975af12a3e7SDag-Erling Smørgrav int
976af12a3e7SDag-Erling Smørgrav process_server_config_line(ServerOptions *options, char *line,
977462c32cbSDag-Erling Smørgrav     const char *filename, int linenum, int *activep,
978462c32cbSDag-Erling Smørgrav     struct connection_info *connectinfo)
979511b41d2SMark Murray {
980ca3176e7SBrian Feldman 	char *cp, **charptr, *arg, *p;
981e4a9863fSDag-Erling Smørgrav 	int cmdline = 0, *intptr, value, value2, n, port;
982d4af9e69SDag-Erling Smørgrav 	SyslogFacility *log_facility_ptr;
983d4af9e69SDag-Erling Smørgrav 	LogLevel *log_level_ptr;
984511b41d2SMark Murray 	ServerOpCodes opcode;
985333ee039SDag-Erling Smørgrav 	u_int i, flags = 0;
986333ee039SDag-Erling Smørgrav 	size_t len;
987e4a9863fSDag-Erling Smørgrav 	long long val64;
988e146993eSDag-Erling Smørgrav 	const struct multistate *multistate_ptr;
989511b41d2SMark Murray 
990c2d3a559SKris Kennaway 	cp = line;
991333ee039SDag-Erling Smørgrav 	if ((arg = strdelim(&cp)) == NULL)
992333ee039SDag-Erling Smørgrav 		return 0;
993c2d3a559SKris Kennaway 	/* Ignore leading whitespace */
994c2d3a559SKris Kennaway 	if (*arg == '\0')
995c2d3a559SKris Kennaway 		arg = strdelim(&cp);
996ca3176e7SBrian Feldman 	if (!arg || !*arg || *arg == '#')
997af12a3e7SDag-Erling Smørgrav 		return 0;
998ca3176e7SBrian Feldman 	intptr = NULL;
999ca3176e7SBrian Feldman 	charptr = NULL;
1000333ee039SDag-Erling Smørgrav 	opcode = parse_token(arg, filename, linenum, &flags);
1001333ee039SDag-Erling Smørgrav 
1002333ee039SDag-Erling Smørgrav 	if (activep == NULL) { /* We are processing a command line directive */
1003333ee039SDag-Erling Smørgrav 		cmdline = 1;
1004333ee039SDag-Erling Smørgrav 		activep = &cmdline;
1005333ee039SDag-Erling Smørgrav 	}
1006333ee039SDag-Erling Smørgrav 	if (*activep && opcode != sMatch)
1007333ee039SDag-Erling Smørgrav 		debug3("%s:%d setting %s %s", filename, linenum, arg, cp);
1008333ee039SDag-Erling Smørgrav 	if (*activep == 0 && !(flags & SSHCFG_MATCH)) {
1009462c32cbSDag-Erling Smørgrav 		if (connectinfo == NULL) {
1010333ee039SDag-Erling Smørgrav 			fatal("%s line %d: Directive '%s' is not allowed "
1011333ee039SDag-Erling Smørgrav 			    "within a Match block", filename, linenum, arg);
1012333ee039SDag-Erling Smørgrav 		} else { /* this is a directive we have already processed */
1013333ee039SDag-Erling Smørgrav 			while (arg)
1014333ee039SDag-Erling Smørgrav 				arg = strdelim(&cp);
1015333ee039SDag-Erling Smørgrav 			return 0;
1016333ee039SDag-Erling Smørgrav 		}
1017333ee039SDag-Erling Smørgrav 	}
1018333ee039SDag-Erling Smørgrav 
1019511b41d2SMark Murray 	switch (opcode) {
1020989dd127SDag-Erling Smørgrav 	/* Portable-specific options */
1021cf2b5f3bSDag-Erling Smørgrav 	case sUsePAM:
1022cf2b5f3bSDag-Erling Smørgrav 		intptr = &options->use_pam;
1023989dd127SDag-Erling Smørgrav 		goto parse_flag;
1024989dd127SDag-Erling Smørgrav 
1025989dd127SDag-Erling Smørgrav 	/* Standard Options */
1026511b41d2SMark Murray 	case sBadOption:
1027af12a3e7SDag-Erling Smørgrav 		return -1;
1028511b41d2SMark Murray 	case sPort:
1029511b41d2SMark Murray 		/* ignore ports from configfile if cmdline specifies ports */
1030511b41d2SMark Murray 		if (options->ports_from_cmdline)
1031af12a3e7SDag-Erling Smørgrav 			return 0;
1032511b41d2SMark Murray 		if (options->num_ports >= MAX_PORTS)
1033ca3176e7SBrian Feldman 			fatal("%s line %d: too many ports.",
1034511b41d2SMark Murray 			    filename, linenum);
1035c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1036c2d3a559SKris Kennaway 		if (!arg || *arg == '\0')
1037ca3176e7SBrian Feldman 			fatal("%s line %d: missing port number.",
1038511b41d2SMark Murray 			    filename, linenum);
1039ca3176e7SBrian Feldman 		options->ports[options->num_ports++] = a2port(arg);
1040cce7d346SDag-Erling Smørgrav 		if (options->ports[options->num_ports-1] <= 0)
1041ca3176e7SBrian Feldman 			fatal("%s line %d: Badly formatted port number.",
1042ca3176e7SBrian Feldman 			    filename, linenum);
1043511b41d2SMark Murray 		break;
1044511b41d2SMark Murray 
1045511b41d2SMark Murray 	case sServerKeyBits:
1046511b41d2SMark Murray 		intptr = &options->server_key_bits;
1047511b41d2SMark Murray  parse_int:
1048c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1049ca3176e7SBrian Feldman 		if (!arg || *arg == '\0')
1050ca3176e7SBrian Feldman 			fatal("%s line %d: missing integer value.",
1051511b41d2SMark Murray 			    filename, linenum);
1052c2d3a559SKris Kennaway 		value = atoi(arg);
1053333ee039SDag-Erling Smørgrav 		if (*activep && *intptr == -1)
1054511b41d2SMark Murray 			*intptr = value;
1055511b41d2SMark Murray 		break;
1056511b41d2SMark Murray 
1057511b41d2SMark Murray 	case sLoginGraceTime:
1058511b41d2SMark Murray 		intptr = &options->login_grace_time;
1059af12a3e7SDag-Erling Smørgrav  parse_time:
1060af12a3e7SDag-Erling Smørgrav 		arg = strdelim(&cp);
1061af12a3e7SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1062af12a3e7SDag-Erling Smørgrav 			fatal("%s line %d: missing time value.",
1063af12a3e7SDag-Erling Smørgrav 			    filename, linenum);
1064af12a3e7SDag-Erling Smørgrav 		if ((value = convtime(arg)) == -1)
1065af12a3e7SDag-Erling Smørgrav 			fatal("%s line %d: invalid time value.",
1066af12a3e7SDag-Erling Smørgrav 			    filename, linenum);
1067557f75e5SDag-Erling Smørgrav 		if (*activep && *intptr == -1)
1068af12a3e7SDag-Erling Smørgrav 			*intptr = value;
1069af12a3e7SDag-Erling Smørgrav 		break;
1070511b41d2SMark Murray 
1071511b41d2SMark Murray 	case sKeyRegenerationTime:
1072511b41d2SMark Murray 		intptr = &options->key_regeneration_time;
1073af12a3e7SDag-Erling Smørgrav 		goto parse_time;
1074511b41d2SMark Murray 
1075511b41d2SMark Murray 	case sListenAddress:
1076c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1077aa49c926SDag-Erling Smørgrav 		if (arg == NULL || *arg == '\0')
1078aa49c926SDag-Erling Smørgrav 			fatal("%s line %d: missing address",
1079511b41d2SMark Murray 			    filename, linenum);
1080d4ecd108SDag-Erling Smørgrav 		/* check for bare IPv6 address: no "[]" and 2 or more ":" */
1081d4ecd108SDag-Erling Smørgrav 		if (strchr(arg, '[') == NULL && (p = strchr(arg, ':')) != NULL
1082d4ecd108SDag-Erling Smørgrav 		    && strchr(p+1, ':') != NULL) {
1083557f75e5SDag-Erling Smørgrav 			queue_listen_addr(options, arg, 0);
1084d4ecd108SDag-Erling Smørgrav 			break;
1085d4ecd108SDag-Erling Smørgrav 		}
1086aa49c926SDag-Erling Smørgrav 		p = hpdelim(&arg);
1087aa49c926SDag-Erling Smørgrav 		if (p == NULL)
1088aa49c926SDag-Erling Smørgrav 			fatal("%s line %d: bad address:port usage",
1089ca3176e7SBrian Feldman 			    filename, linenum);
1090aa49c926SDag-Erling Smørgrav 		p = cleanhostname(p);
1091aa49c926SDag-Erling Smørgrav 		if (arg == NULL)
1092aa49c926SDag-Erling Smørgrav 			port = 0;
1093cce7d346SDag-Erling Smørgrav 		else if ((port = a2port(arg)) <= 0)
1094aa49c926SDag-Erling Smørgrav 			fatal("%s line %d: bad port number", filename, linenum);
1095ca3176e7SBrian Feldman 
1096557f75e5SDag-Erling Smørgrav 		queue_listen_addr(options, p, port);
1097aa49c926SDag-Erling Smørgrav 
1098aa49c926SDag-Erling Smørgrav 		break;
1099aa49c926SDag-Erling Smørgrav 
1100aa49c926SDag-Erling Smørgrav 	case sAddressFamily:
1101e146993eSDag-Erling Smørgrav 		intptr = &options->address_family;
1102e146993eSDag-Erling Smørgrav 		multistate_ptr = multistate_addressfamily;
1103e146993eSDag-Erling Smørgrav  parse_multistate:
1104aa49c926SDag-Erling Smørgrav 		arg = strdelim(&cp);
1105d4ecd108SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1106e146993eSDag-Erling Smørgrav 			fatal("%s line %d: missing argument.",
1107d4ecd108SDag-Erling Smørgrav 			    filename, linenum);
1108e146993eSDag-Erling Smørgrav 		value = -1;
1109e146993eSDag-Erling Smørgrav 		for (i = 0; multistate_ptr[i].key != NULL; i++) {
1110e146993eSDag-Erling Smørgrav 			if (strcasecmp(arg, multistate_ptr[i].key) == 0) {
1111e146993eSDag-Erling Smørgrav 				value = multistate_ptr[i].value;
1112e146993eSDag-Erling Smørgrav 				break;
1113e146993eSDag-Erling Smørgrav 			}
1114e146993eSDag-Erling Smørgrav 		}
1115e146993eSDag-Erling Smørgrav 		if (value == -1)
1116e146993eSDag-Erling Smørgrav 			fatal("%s line %d: unsupported option \"%s\".",
1117aa49c926SDag-Erling Smørgrav 			    filename, linenum, arg);
1118e146993eSDag-Erling Smørgrav 		if (*activep && *intptr == -1)
1119aa49c926SDag-Erling Smørgrav 			*intptr = value;
1120511b41d2SMark Murray 		break;
1121511b41d2SMark Murray 
1122511b41d2SMark Murray 	case sHostKeyFile:
1123ca3176e7SBrian Feldman 		intptr = &options->num_host_key_files;
1124ca3176e7SBrian Feldman 		if (*intptr >= MAX_HOSTKEYS)
1125ca3176e7SBrian Feldman 			fatal("%s line %d: too many host keys specified (max %d).",
1126ca3176e7SBrian Feldman 			    filename, linenum, MAX_HOSTKEYS);
1127ca3176e7SBrian Feldman 		charptr = &options->host_key_files[*intptr];
1128c2d3a559SKris Kennaway  parse_filename:
1129c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1130ca3176e7SBrian Feldman 		if (!arg || *arg == '\0')
1131ca3176e7SBrian Feldman 			fatal("%s line %d: missing file name.",
1132e8aafc91SKris Kennaway 			    filename, linenum);
1133333ee039SDag-Erling Smørgrav 		if (*activep && *charptr == NULL) {
1134b15c8340SDag-Erling Smørgrav 			*charptr = derelativise_path(arg);
1135ca3176e7SBrian Feldman 			/* increase optional counter */
1136ca3176e7SBrian Feldman 			if (intptr != NULL)
1137ca3176e7SBrian Feldman 				*intptr = *intptr + 1;
1138ca3176e7SBrian Feldman 		}
1139e8aafc91SKris Kennaway 		break;
1140e8aafc91SKris Kennaway 
1141e4a9863fSDag-Erling Smørgrav 	case sHostKeyAgent:
1142e4a9863fSDag-Erling Smørgrav 		charptr = &options->host_key_agent;
1143e4a9863fSDag-Erling Smørgrav 		arg = strdelim(&cp);
1144e4a9863fSDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1145e4a9863fSDag-Erling Smørgrav 			fatal("%s line %d: missing socket name.",
1146e4a9863fSDag-Erling Smørgrav 			    filename, linenum);
1147e4a9863fSDag-Erling Smørgrav 		if (*activep && *charptr == NULL)
1148e4a9863fSDag-Erling Smørgrav 			*charptr = !strcmp(arg, SSH_AUTHSOCKET_ENV_NAME) ?
1149e4a9863fSDag-Erling Smørgrav 			    xstrdup(arg) : derelativise_path(arg);
1150e4a9863fSDag-Erling Smørgrav 		break;
1151e4a9863fSDag-Erling Smørgrav 
1152b15c8340SDag-Erling Smørgrav 	case sHostCertificate:
1153b15c8340SDag-Erling Smørgrav 		intptr = &options->num_host_cert_files;
1154b15c8340SDag-Erling Smørgrav 		if (*intptr >= MAX_HOSTKEYS)
1155b15c8340SDag-Erling Smørgrav 			fatal("%s line %d: too many host certificates "
1156b15c8340SDag-Erling Smørgrav 			    "specified (max %d).", filename, linenum,
1157b15c8340SDag-Erling Smørgrav 			    MAX_HOSTCERTS);
1158b15c8340SDag-Erling Smørgrav 		charptr = &options->host_cert_files[*intptr];
1159b15c8340SDag-Erling Smørgrav 		goto parse_filename;
1160b15c8340SDag-Erling Smørgrav 		break;
1161b15c8340SDag-Erling Smørgrav 
1162e8aafc91SKris Kennaway 	case sPidFile:
1163e8aafc91SKris Kennaway 		charptr = &options->pid_file;
1164c2d3a559SKris Kennaway 		goto parse_filename;
1165511b41d2SMark Murray 
1166511b41d2SMark Murray 	case sPermitRootLogin:
1167511b41d2SMark Murray 		intptr = &options->permit_root_login;
1168e146993eSDag-Erling Smørgrav 		multistate_ptr = multistate_permitrootlogin;
1169e146993eSDag-Erling Smørgrav 		goto parse_multistate;
1170511b41d2SMark Murray 
1171511b41d2SMark Murray 	case sIgnoreRhosts:
1172511b41d2SMark Murray 		intptr = &options->ignore_rhosts;
1173511b41d2SMark Murray  parse_flag:
1174c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1175ca3176e7SBrian Feldman 		if (!arg || *arg == '\0')
1176ca3176e7SBrian Feldman 			fatal("%s line %d: missing yes/no argument.",
1177511b41d2SMark Murray 			    filename, linenum);
1178ca3176e7SBrian Feldman 		value = 0;	/* silence compiler */
1179c2d3a559SKris Kennaway 		if (strcmp(arg, "yes") == 0)
1180511b41d2SMark Murray 			value = 1;
1181c2d3a559SKris Kennaway 		else if (strcmp(arg, "no") == 0)
1182511b41d2SMark Murray 			value = 0;
1183ca3176e7SBrian Feldman 		else
1184ca3176e7SBrian Feldman 			fatal("%s line %d: Bad yes/no argument: %s",
1185c2d3a559SKris Kennaway 				filename, linenum, arg);
1186333ee039SDag-Erling Smørgrav 		if (*activep && *intptr == -1)
1187511b41d2SMark Murray 			*intptr = value;
1188511b41d2SMark Murray 		break;
1189511b41d2SMark Murray 
1190511b41d2SMark Murray 	case sIgnoreUserKnownHosts:
1191511b41d2SMark Murray 		intptr = &options->ignore_user_known_hosts;
1192962a3f4eSSheldon Hearn 		goto parse_flag;
1193511b41d2SMark Murray 
1194511b41d2SMark Murray 	case sRhostsRSAAuthentication:
1195511b41d2SMark Murray 		intptr = &options->rhosts_rsa_authentication;
1196511b41d2SMark Murray 		goto parse_flag;
1197511b41d2SMark Murray 
1198ca3176e7SBrian Feldman 	case sHostbasedAuthentication:
1199ca3176e7SBrian Feldman 		intptr = &options->hostbased_authentication;
1200ca3176e7SBrian Feldman 		goto parse_flag;
1201ca3176e7SBrian Feldman 
1202ca3176e7SBrian Feldman 	case sHostbasedUsesNameFromPacketOnly:
1203ca3176e7SBrian Feldman 		intptr = &options->hostbased_uses_name_from_packet_only;
1204ca3176e7SBrian Feldman 		goto parse_flag;
1205ca3176e7SBrian Feldman 
1206bc5531deSDag-Erling Smørgrav 	case sHostbasedAcceptedKeyTypes:
1207bc5531deSDag-Erling Smørgrav 		charptr = &options->hostbased_key_types;
1208bc5531deSDag-Erling Smørgrav  parse_keytypes:
1209bc5531deSDag-Erling Smørgrav 		arg = strdelim(&cp);
1210bc5531deSDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1211bc5531deSDag-Erling Smørgrav 			fatal("%s line %d: Missing argument.",
1212bc5531deSDag-Erling Smørgrav 			    filename, linenum);
1213eccfee6eSDag-Erling Smørgrav 		if (!sshkey_names_valid2(*arg == '+' ? arg + 1 : arg, 1))
1214bc5531deSDag-Erling Smørgrav 			fatal("%s line %d: Bad key types '%s'.",
1215bc5531deSDag-Erling Smørgrav 			    filename, linenum, arg ? arg : "<NONE>");
1216bc5531deSDag-Erling Smørgrav 		if (*activep && *charptr == NULL)
1217bc5531deSDag-Erling Smørgrav 			*charptr = xstrdup(arg);
1218bc5531deSDag-Erling Smørgrav 		break;
1219bc5531deSDag-Erling Smørgrav 
1220eccfee6eSDag-Erling Smørgrav 	case sHostKeyAlgorithms:
1221eccfee6eSDag-Erling Smørgrav 		charptr = &options->hostkeyalgorithms;
1222eccfee6eSDag-Erling Smørgrav 		goto parse_keytypes;
1223eccfee6eSDag-Erling Smørgrav 
1224511b41d2SMark Murray 	case sRSAAuthentication:
1225511b41d2SMark Murray 		intptr = &options->rsa_authentication;
1226511b41d2SMark Murray 		goto parse_flag;
1227511b41d2SMark Murray 
1228ca3176e7SBrian Feldman 	case sPubkeyAuthentication:
1229ca3176e7SBrian Feldman 		intptr = &options->pubkey_authentication;
1230e8aafc91SKris Kennaway 		goto parse_flag;
1231cf2b5f3bSDag-Erling Smørgrav 
1232bc5531deSDag-Erling Smørgrav 	case sPubkeyAcceptedKeyTypes:
1233bc5531deSDag-Erling Smørgrav 		charptr = &options->pubkey_key_types;
1234bc5531deSDag-Erling Smørgrav 		goto parse_keytypes;
1235bc5531deSDag-Erling Smørgrav 
1236cb96ab36SAssar Westerlund 	case sKerberosAuthentication:
1237cb96ab36SAssar Westerlund 		intptr = &options->kerberos_authentication;
1238511b41d2SMark Murray 		goto parse_flag;
1239511b41d2SMark Murray 
1240af12a3e7SDag-Erling Smørgrav 	case sKerberosOrLocalPasswd:
1241af12a3e7SDag-Erling Smørgrav 		intptr = &options->kerberos_or_local_passwd;
1242511b41d2SMark Murray 		goto parse_flag;
1243511b41d2SMark Murray 
1244af12a3e7SDag-Erling Smørgrav 	case sKerberosTicketCleanup:
1245af12a3e7SDag-Erling Smørgrav 		intptr = &options->kerberos_ticket_cleanup;
1246511b41d2SMark Murray 		goto parse_flag;
1247cf2b5f3bSDag-Erling Smørgrav 
12481ec0d754SDag-Erling Smørgrav 	case sKerberosGetAFSToken:
12491ec0d754SDag-Erling Smørgrav 		intptr = &options->kerberos_get_afs_token;
12501ec0d754SDag-Erling Smørgrav 		goto parse_flag;
12511ec0d754SDag-Erling Smørgrav 
1252cf2b5f3bSDag-Erling Smørgrav 	case sGssAuthentication:
1253cf2b5f3bSDag-Erling Smørgrav 		intptr = &options->gss_authentication;
1254fe5fd017SMark Murray 		goto parse_flag;
1255cf2b5f3bSDag-Erling Smørgrav 
1256cf2b5f3bSDag-Erling Smørgrav 	case sGssCleanupCreds:
1257cf2b5f3bSDag-Erling Smørgrav 		intptr = &options->gss_cleanup_creds;
1258511b41d2SMark Murray 		goto parse_flag;
1259511b41d2SMark Murray 
1260557f75e5SDag-Erling Smørgrav 	case sGssStrictAcceptor:
1261557f75e5SDag-Erling Smørgrav 		intptr = &options->gss_strict_acceptor;
1262557f75e5SDag-Erling Smørgrav 		goto parse_flag;
1263557f75e5SDag-Erling Smørgrav 
1264511b41d2SMark Murray 	case sPasswordAuthentication:
1265511b41d2SMark Murray 		intptr = &options->password_authentication;
1266511b41d2SMark Murray 		goto parse_flag;
1267511b41d2SMark Murray 
126809958426SBrian Feldman 	case sKbdInteractiveAuthentication:
126909958426SBrian Feldman 		intptr = &options->kbd_interactive_authentication;
127009958426SBrian Feldman 		goto parse_flag;
127109958426SBrian Feldman 
1272ca3176e7SBrian Feldman 	case sChallengeResponseAuthentication:
1273af12a3e7SDag-Erling Smørgrav 		intptr = &options->challenge_response_authentication;
1274511b41d2SMark Murray 		goto parse_flag;
1275511b41d2SMark Murray 
1276511b41d2SMark Murray 	case sPrintMotd:
1277511b41d2SMark Murray 		intptr = &options->print_motd;
1278511b41d2SMark Murray 		goto parse_flag;
1279511b41d2SMark Murray 
1280ca3176e7SBrian Feldman 	case sPrintLastLog:
1281ca3176e7SBrian Feldman 		intptr = &options->print_lastlog;
1282ca3176e7SBrian Feldman 		goto parse_flag;
1283ca3176e7SBrian Feldman 
1284511b41d2SMark Murray 	case sX11Forwarding:
1285511b41d2SMark Murray 		intptr = &options->x11_forwarding;
1286511b41d2SMark Murray 		goto parse_flag;
1287511b41d2SMark Murray 
1288511b41d2SMark Murray 	case sX11DisplayOffset:
1289511b41d2SMark Murray 		intptr = &options->x11_display_offset;
1290511b41d2SMark Murray 		goto parse_int;
1291511b41d2SMark Murray 
1292af12a3e7SDag-Erling Smørgrav 	case sX11UseLocalhost:
1293af12a3e7SDag-Erling Smørgrav 		intptr = &options->x11_use_localhost;
1294af12a3e7SDag-Erling Smørgrav 		goto parse_flag;
1295af12a3e7SDag-Erling Smørgrav 
1296c2d3a559SKris Kennaway 	case sXAuthLocation:
1297c2d3a559SKris Kennaway 		charptr = &options->xauth_location;
1298c2d3a559SKris Kennaway 		goto parse_filename;
1299c2d3a559SKris Kennaway 
1300f7167e0eSDag-Erling Smørgrav 	case sPermitTTY:
1301f7167e0eSDag-Erling Smørgrav 		intptr = &options->permit_tty;
1302f7167e0eSDag-Erling Smørgrav 		goto parse_flag;
1303f7167e0eSDag-Erling Smørgrav 
1304a0ee8cc6SDag-Erling Smørgrav 	case sPermitUserRC:
1305a0ee8cc6SDag-Erling Smørgrav 		intptr = &options->permit_user_rc;
1306a0ee8cc6SDag-Erling Smørgrav 		goto parse_flag;
1307a0ee8cc6SDag-Erling Smørgrav 
1308511b41d2SMark Murray 	case sStrictModes:
1309511b41d2SMark Murray 		intptr = &options->strict_modes;
1310511b41d2SMark Murray 		goto parse_flag;
1311511b41d2SMark Murray 
13121ec0d754SDag-Erling Smørgrav 	case sTCPKeepAlive:
13131ec0d754SDag-Erling Smørgrav 		intptr = &options->tcp_keep_alive;
1314511b41d2SMark Murray 		goto parse_flag;
1315511b41d2SMark Murray 
1316511b41d2SMark Murray 	case sEmptyPasswd:
1317511b41d2SMark Murray 		intptr = &options->permit_empty_passwd;
1318511b41d2SMark Murray 		goto parse_flag;
1319511b41d2SMark Murray 
1320f388f5efSDag-Erling Smørgrav 	case sPermitUserEnvironment:
1321f388f5efSDag-Erling Smørgrav 		intptr = &options->permit_user_env;
1322f388f5efSDag-Erling Smørgrav 		goto parse_flag;
1323f388f5efSDag-Erling Smørgrav 
1324511b41d2SMark Murray 	case sUseLogin:
1325511b41d2SMark Murray 		intptr = &options->use_login;
1326511b41d2SMark Murray 		goto parse_flag;
1327511b41d2SMark Murray 
132880628bacSDag-Erling Smørgrav 	case sCompression:
132980628bacSDag-Erling Smørgrav 		intptr = &options->compression;
1330e146993eSDag-Erling Smørgrav 		multistate_ptr = multistate_compression;
1331e146993eSDag-Erling Smørgrav 		goto parse_multistate;
133280628bacSDag-Erling Smørgrav 
1333e4a9863fSDag-Erling Smørgrav 	case sRekeyLimit:
1334e4a9863fSDag-Erling Smørgrav 		arg = strdelim(&cp);
1335e4a9863fSDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1336e4a9863fSDag-Erling Smørgrav 			fatal("%.200s line %d: Missing argument.", filename,
1337e4a9863fSDag-Erling Smørgrav 			    linenum);
1338e4a9863fSDag-Erling Smørgrav 		if (strcmp(arg, "default") == 0) {
1339e4a9863fSDag-Erling Smørgrav 			val64 = 0;
1340e4a9863fSDag-Erling Smørgrav 		} else {
1341e4a9863fSDag-Erling Smørgrav 			if (scan_scaled(arg, &val64) == -1)
1342e4a9863fSDag-Erling Smørgrav 				fatal("%.200s line %d: Bad number '%s': %s",
1343e4a9863fSDag-Erling Smørgrav 				    filename, linenum, arg, strerror(errno));
1344e4a9863fSDag-Erling Smørgrav 			if (val64 != 0 && val64 < 16)
1345e4a9863fSDag-Erling Smørgrav 				fatal("%.200s line %d: RekeyLimit too small",
1346e4a9863fSDag-Erling Smørgrav 				    filename, linenum);
1347e4a9863fSDag-Erling Smørgrav 		}
1348e4a9863fSDag-Erling Smørgrav 		if (*activep && options->rekey_limit == -1)
1349acc1a9efSDag-Erling Smørgrav 			options->rekey_limit = val64;
1350e4a9863fSDag-Erling Smørgrav 		if (cp != NULL) { /* optional rekey interval present */
1351e4a9863fSDag-Erling Smørgrav 			if (strcmp(cp, "none") == 0) {
1352e4a9863fSDag-Erling Smørgrav 				(void)strdelim(&cp);	/* discard */
1353e4a9863fSDag-Erling Smørgrav 				break;
1354e4a9863fSDag-Erling Smørgrav 			}
1355e4a9863fSDag-Erling Smørgrav 			intptr = &options->rekey_interval;
1356e4a9863fSDag-Erling Smørgrav 			goto parse_time;
1357e4a9863fSDag-Erling Smørgrav 		}
1358e4a9863fSDag-Erling Smørgrav 		break;
1359e4a9863fSDag-Erling Smørgrav 
1360e8aafc91SKris Kennaway 	case sGatewayPorts:
1361a0ee8cc6SDag-Erling Smørgrav 		intptr = &options->fwd_opts.gateway_ports;
1362e146993eSDag-Erling Smørgrav 		multistate_ptr = multistate_gatewayports;
1363e146993eSDag-Erling Smørgrav 		goto parse_multistate;
1364e8aafc91SKris Kennaway 
1365cf2b5f3bSDag-Erling Smørgrav 	case sUseDNS:
1366cf2b5f3bSDag-Erling Smørgrav 		intptr = &options->use_dns;
1367ca3176e7SBrian Feldman 		goto parse_flag;
1368ca3176e7SBrian Feldman 
1369511b41d2SMark Murray 	case sLogFacility:
1370d4af9e69SDag-Erling Smørgrav 		log_facility_ptr = &options->log_facility;
1371c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1372c2d3a559SKris Kennaway 		value = log_facility_number(arg);
1373af12a3e7SDag-Erling Smørgrav 		if (value == SYSLOG_FACILITY_NOT_SET)
1374ca3176e7SBrian Feldman 			fatal("%.200s line %d: unsupported log facility '%s'",
1375c2d3a559SKris Kennaway 			    filename, linenum, arg ? arg : "<NONE>");
1376d4af9e69SDag-Erling Smørgrav 		if (*log_facility_ptr == -1)
1377d4af9e69SDag-Erling Smørgrav 			*log_facility_ptr = (SyslogFacility) value;
1378511b41d2SMark Murray 		break;
1379511b41d2SMark Murray 
1380511b41d2SMark Murray 	case sLogLevel:
1381d4af9e69SDag-Erling Smørgrav 		log_level_ptr = &options->log_level;
1382c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1383c2d3a559SKris Kennaway 		value = log_level_number(arg);
1384af12a3e7SDag-Erling Smørgrav 		if (value == SYSLOG_LEVEL_NOT_SET)
1385ca3176e7SBrian Feldman 			fatal("%.200s line %d: unsupported log level '%s'",
1386c2d3a559SKris Kennaway 			    filename, linenum, arg ? arg : "<NONE>");
1387d4af9e69SDag-Erling Smørgrav 		if (*log_level_ptr == -1)
1388d4af9e69SDag-Erling Smørgrav 			*log_level_ptr = (LogLevel) value;
1389511b41d2SMark Murray 		break;
1390511b41d2SMark Murray 
139109958426SBrian Feldman 	case sAllowTcpForwarding:
139209958426SBrian Feldman 		intptr = &options->allow_tcp_forwarding;
13936888a9beSDag-Erling Smørgrav 		multistate_ptr = multistate_tcpfwd;
13946888a9beSDag-Erling Smørgrav 		goto parse_multistate;
139509958426SBrian Feldman 
1396a0ee8cc6SDag-Erling Smørgrav 	case sAllowStreamLocalForwarding:
1397a0ee8cc6SDag-Erling Smørgrav 		intptr = &options->allow_streamlocal_forwarding;
1398a0ee8cc6SDag-Erling Smørgrav 		multistate_ptr = multistate_tcpfwd;
1399a0ee8cc6SDag-Erling Smørgrav 		goto parse_multistate;
1400a0ee8cc6SDag-Erling Smørgrav 
1401d4af9e69SDag-Erling Smørgrav 	case sAllowAgentForwarding:
1402d4af9e69SDag-Erling Smørgrav 		intptr = &options->allow_agent_forwarding;
1403d4af9e69SDag-Erling Smørgrav 		goto parse_flag;
1404d4af9e69SDag-Erling Smørgrav 
140580628bacSDag-Erling Smørgrav 	case sUsePrivilegeSeparation:
140680628bacSDag-Erling Smørgrav 		intptr = &use_privsep;
1407e146993eSDag-Erling Smørgrav 		multistate_ptr = multistate_privsep;
1408e146993eSDag-Erling Smørgrav 		goto parse_multistate;
140980628bacSDag-Erling Smørgrav 
1410511b41d2SMark Murray 	case sAllowUsers:
1411c2d3a559SKris Kennaway 		while ((arg = strdelim(&cp)) && *arg != '\0') {
141242f71286SMark Murray 			if (options->num_allow_users >= MAX_ALLOW_USERS)
1413af12a3e7SDag-Erling Smørgrav 				fatal("%s line %d: too many allow users.",
1414e8aafc91SKris Kennaway 				    filename, linenum);
1415462c32cbSDag-Erling Smørgrav 			if (!*activep)
1416462c32cbSDag-Erling Smørgrav 				continue;
1417a82e551fSDag-Erling Smørgrav 			options->allow_users[options->num_allow_users++] =
1418a82e551fSDag-Erling Smørgrav 			    xstrdup(arg);
1419511b41d2SMark Murray 		}
1420511b41d2SMark Murray 		break;
1421511b41d2SMark Murray 
1422511b41d2SMark Murray 	case sDenyUsers:
1423c2d3a559SKris Kennaway 		while ((arg = strdelim(&cp)) && *arg != '\0') {
14242803b77eSBrian Feldman 			if (options->num_deny_users >= MAX_DENY_USERS)
1425af12a3e7SDag-Erling Smørgrav 				fatal("%s line %d: too many deny users.",
1426e8aafc91SKris Kennaway 				    filename, linenum);
1427462c32cbSDag-Erling Smørgrav 			if (!*activep)
1428462c32cbSDag-Erling Smørgrav 				continue;
1429a82e551fSDag-Erling Smørgrav 			options->deny_users[options->num_deny_users++] =
1430a82e551fSDag-Erling Smørgrav 			    xstrdup(arg);
1431511b41d2SMark Murray 		}
1432511b41d2SMark Murray 		break;
1433511b41d2SMark Murray 
1434511b41d2SMark Murray 	case sAllowGroups:
1435c2d3a559SKris Kennaway 		while ((arg = strdelim(&cp)) && *arg != '\0') {
143642f71286SMark Murray 			if (options->num_allow_groups >= MAX_ALLOW_GROUPS)
1437af12a3e7SDag-Erling Smørgrav 				fatal("%s line %d: too many allow groups.",
1438e8aafc91SKris Kennaway 				    filename, linenum);
1439462c32cbSDag-Erling Smørgrav 			if (!*activep)
1440462c32cbSDag-Erling Smørgrav 				continue;
1441a82e551fSDag-Erling Smørgrav 			options->allow_groups[options->num_allow_groups++] =
1442a82e551fSDag-Erling Smørgrav 			    xstrdup(arg);
1443511b41d2SMark Murray 		}
1444511b41d2SMark Murray 		break;
1445511b41d2SMark Murray 
1446511b41d2SMark Murray 	case sDenyGroups:
1447c2d3a559SKris Kennaway 		while ((arg = strdelim(&cp)) && *arg != '\0') {
144842f71286SMark Murray 			if (options->num_deny_groups >= MAX_DENY_GROUPS)
1449af12a3e7SDag-Erling Smørgrav 				fatal("%s line %d: too many deny groups.",
1450e8aafc91SKris Kennaway 				    filename, linenum);
1451462c32cbSDag-Erling Smørgrav 			if (!*activep)
1452462c32cbSDag-Erling Smørgrav 				continue;
1453462c32cbSDag-Erling Smørgrav 			options->deny_groups[options->num_deny_groups++] =
1454462c32cbSDag-Erling Smørgrav 			    xstrdup(arg);
1455511b41d2SMark Murray 		}
1456511b41d2SMark Murray 		break;
1457511b41d2SMark Murray 
1458e8aafc91SKris Kennaway 	case sCiphers:
1459c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1460c2d3a559SKris Kennaway 		if (!arg || *arg == '\0')
1461c322fe35SKris Kennaway 			fatal("%s line %d: Missing argument.", filename, linenum);
1462eccfee6eSDag-Erling Smørgrav 		if (!ciphers_valid(*arg == '+' ? arg + 1 : arg))
1463e8aafc91SKris Kennaway 			fatal("%s line %d: Bad SSH2 cipher spec '%s'.",
1464c2d3a559SKris Kennaway 			    filename, linenum, arg ? arg : "<NONE>");
1465e8aafc91SKris Kennaway 		if (options->ciphers == NULL)
1466c2d3a559SKris Kennaway 			options->ciphers = xstrdup(arg);
1467e8aafc91SKris Kennaway 		break;
1468e8aafc91SKris Kennaway 
1469ca3176e7SBrian Feldman 	case sMacs:
1470ca3176e7SBrian Feldman 		arg = strdelim(&cp);
1471ca3176e7SBrian Feldman 		if (!arg || *arg == '\0')
1472ca3176e7SBrian Feldman 			fatal("%s line %d: Missing argument.", filename, linenum);
1473eccfee6eSDag-Erling Smørgrav 		if (!mac_valid(*arg == '+' ? arg + 1 : arg))
1474ca3176e7SBrian Feldman 			fatal("%s line %d: Bad SSH2 mac spec '%s'.",
1475ca3176e7SBrian Feldman 			    filename, linenum, arg ? arg : "<NONE>");
1476ca3176e7SBrian Feldman 		if (options->macs == NULL)
1477ca3176e7SBrian Feldman 			options->macs = xstrdup(arg);
1478ca3176e7SBrian Feldman 		break;
1479ca3176e7SBrian Feldman 
14804a421b63SDag-Erling Smørgrav 	case sKexAlgorithms:
14814a421b63SDag-Erling Smørgrav 		arg = strdelim(&cp);
14824a421b63SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
14834a421b63SDag-Erling Smørgrav 			fatal("%s line %d: Missing argument.",
14844a421b63SDag-Erling Smørgrav 			    filename, linenum);
1485eccfee6eSDag-Erling Smørgrav 		if (!kex_names_valid(*arg == '+' ? arg + 1 : arg))
14864a421b63SDag-Erling Smørgrav 			fatal("%s line %d: Bad SSH2 KexAlgorithms '%s'.",
14874a421b63SDag-Erling Smørgrav 			    filename, linenum, arg ? arg : "<NONE>");
14884a421b63SDag-Erling Smørgrav 		if (options->kex_algorithms == NULL)
14894a421b63SDag-Erling Smørgrav 			options->kex_algorithms = xstrdup(arg);
14904a421b63SDag-Erling Smørgrav 		break;
14914a421b63SDag-Erling Smørgrav 
1492e8aafc91SKris Kennaway 	case sProtocol:
1493e8aafc91SKris Kennaway 		intptr = &options->protocol;
1494c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1495c2d3a559SKris Kennaway 		if (!arg || *arg == '\0')
1496c322fe35SKris Kennaway 			fatal("%s line %d: Missing argument.", filename, linenum);
1497c2d3a559SKris Kennaway 		value = proto_spec(arg);
1498e8aafc91SKris Kennaway 		if (value == SSH_PROTO_UNKNOWN)
1499e8aafc91SKris Kennaway 			fatal("%s line %d: Bad protocol spec '%s'.",
1500c2d3a559SKris Kennaway 			    filename, linenum, arg ? arg : "<NONE>");
1501e8aafc91SKris Kennaway 		if (*intptr == SSH_PROTO_UNKNOWN)
1502e8aafc91SKris Kennaway 			*intptr = value;
1503e8aafc91SKris Kennaway 		break;
1504e8aafc91SKris Kennaway 
1505c2d3a559SKris Kennaway 	case sSubsystem:
1506c2d3a559SKris Kennaway 		if (options->num_subsystems >= MAX_SUBSYSTEMS) {
1507c2d3a559SKris Kennaway 			fatal("%s line %d: too many subsystems defined.",
1508c2d3a559SKris Kennaway 			    filename, linenum);
1509c2d3a559SKris Kennaway 		}
1510c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1511c2d3a559SKris Kennaway 		if (!arg || *arg == '\0')
1512c2d3a559SKris Kennaway 			fatal("%s line %d: Missing subsystem name.",
1513c2d3a559SKris Kennaway 			    filename, linenum);
1514333ee039SDag-Erling Smørgrav 		if (!*activep) {
1515333ee039SDag-Erling Smørgrav 			arg = strdelim(&cp);
1516333ee039SDag-Erling Smørgrav 			break;
1517333ee039SDag-Erling Smørgrav 		}
1518c2d3a559SKris Kennaway 		for (i = 0; i < options->num_subsystems; i++)
1519c2d3a559SKris Kennaway 			if (strcmp(arg, options->subsystem_name[i]) == 0)
1520c2d3a559SKris Kennaway 				fatal("%s line %d: Subsystem '%s' already defined.",
1521c2d3a559SKris Kennaway 				    filename, linenum, arg);
1522c2d3a559SKris Kennaway 		options->subsystem_name[options->num_subsystems] = xstrdup(arg);
1523c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1524c2d3a559SKris Kennaway 		if (!arg || *arg == '\0')
1525c2d3a559SKris Kennaway 			fatal("%s line %d: Missing subsystem command.",
1526c2d3a559SKris Kennaway 			    filename, linenum);
1527c2d3a559SKris Kennaway 		options->subsystem_command[options->num_subsystems] = xstrdup(arg);
1528333ee039SDag-Erling Smørgrav 
1529333ee039SDag-Erling Smørgrav 		/* Collect arguments (separate to executable) */
1530333ee039SDag-Erling Smørgrav 		p = xstrdup(arg);
1531333ee039SDag-Erling Smørgrav 		len = strlen(p) + 1;
1532333ee039SDag-Erling Smørgrav 		while ((arg = strdelim(&cp)) != NULL && *arg != '\0') {
1533333ee039SDag-Erling Smørgrav 			len += 1 + strlen(arg);
1534557f75e5SDag-Erling Smørgrav 			p = xreallocarray(p, 1, len);
1535333ee039SDag-Erling Smørgrav 			strlcat(p, " ", len);
1536333ee039SDag-Erling Smørgrav 			strlcat(p, arg, len);
1537333ee039SDag-Erling Smørgrav 		}
1538333ee039SDag-Erling Smørgrav 		options->subsystem_args[options->num_subsystems] = p;
1539c2d3a559SKris Kennaway 		options->num_subsystems++;
1540c2d3a559SKris Kennaway 		break;
1541c2d3a559SKris Kennaway 
1542c2d3a559SKris Kennaway 	case sMaxStartups:
1543c2d3a559SKris Kennaway 		arg = strdelim(&cp);
1544c2d3a559SKris Kennaway 		if (!arg || *arg == '\0')
1545c2d3a559SKris Kennaway 			fatal("%s line %d: Missing MaxStartups spec.",
1546c2d3a559SKris Kennaway 			    filename, linenum);
1547af12a3e7SDag-Erling Smørgrav 		if ((n = sscanf(arg, "%d:%d:%d",
1548c2d3a559SKris Kennaway 		    &options->max_startups_begin,
1549c2d3a559SKris Kennaway 		    &options->max_startups_rate,
1550af12a3e7SDag-Erling Smørgrav 		    &options->max_startups)) == 3) {
1551c2d3a559SKris Kennaway 			if (options->max_startups_begin >
1552c2d3a559SKris Kennaway 			    options->max_startups ||
1553c2d3a559SKris Kennaway 			    options->max_startups_rate > 100 ||
1554c2d3a559SKris Kennaway 			    options->max_startups_rate < 1)
1555c2d3a559SKris Kennaway 				fatal("%s line %d: Illegal MaxStartups spec.",
1556c2d3a559SKris Kennaway 				    filename, linenum);
1557af12a3e7SDag-Erling Smørgrav 		} else if (n != 1)
1558af12a3e7SDag-Erling Smørgrav 			fatal("%s line %d: Illegal MaxStartups spec.",
1559af12a3e7SDag-Erling Smørgrav 			    filename, linenum);
1560af12a3e7SDag-Erling Smørgrav 		else
1561af12a3e7SDag-Erling Smørgrav 			options->max_startups = options->max_startups_begin;
1562933ca70fSBrian Feldman 		break;
1563933ca70fSBrian Feldman 
156421e764dfSDag-Erling Smørgrav 	case sMaxAuthTries:
156521e764dfSDag-Erling Smørgrav 		intptr = &options->max_authtries;
156621e764dfSDag-Erling Smørgrav 		goto parse_int;
156721e764dfSDag-Erling Smørgrav 
1568d4af9e69SDag-Erling Smørgrav 	case sMaxSessions:
1569d4af9e69SDag-Erling Smørgrav 		intptr = &options->max_sessions;
1570d4af9e69SDag-Erling Smørgrav 		goto parse_int;
1571d4af9e69SDag-Erling Smørgrav 
1572ca3176e7SBrian Feldman 	case sBanner:
1573ca3176e7SBrian Feldman 		charptr = &options->banner;
1574ca3176e7SBrian Feldman 		goto parse_filename;
1575d4af9e69SDag-Erling Smørgrav 
1576af12a3e7SDag-Erling Smørgrav 	/*
1577af12a3e7SDag-Erling Smørgrav 	 * These options can contain %X options expanded at
1578af12a3e7SDag-Erling Smørgrav 	 * connect time, so that you can specify paths like:
1579af12a3e7SDag-Erling Smørgrav 	 *
1580af12a3e7SDag-Erling Smørgrav 	 * AuthorizedKeysFile	/etc/ssh_keys/%u
1581af12a3e7SDag-Erling Smørgrav 	 */
1582af12a3e7SDag-Erling Smørgrav 	case sAuthorizedKeysFile:
1583e146993eSDag-Erling Smørgrav 		if (*activep && options->num_authkeys_files == 0) {
1584e146993eSDag-Erling Smørgrav 			while ((arg = strdelim(&cp)) && *arg != '\0') {
1585e146993eSDag-Erling Smørgrav 				if (options->num_authkeys_files >=
1586e146993eSDag-Erling Smørgrav 				    MAX_AUTHKEYS_FILES)
1587e146993eSDag-Erling Smørgrav 					fatal("%s line %d: "
1588e146993eSDag-Erling Smørgrav 					    "too many authorized keys files.",
1589e146993eSDag-Erling Smørgrav 					    filename, linenum);
1590e146993eSDag-Erling Smørgrav 				options->authorized_keys_files[
1591e146993eSDag-Erling Smørgrav 				    options->num_authkeys_files++] =
1592e146993eSDag-Erling Smørgrav 				    tilde_expand_filename(arg, getuid());
1593e146993eSDag-Erling Smørgrav 			}
1594e146993eSDag-Erling Smørgrav 		}
1595e146993eSDag-Erling Smørgrav 		return 0;
1596e146993eSDag-Erling Smørgrav 
1597e2f6069cSDag-Erling Smørgrav 	case sAuthorizedPrincipalsFile:
1598e2f6069cSDag-Erling Smørgrav 		charptr = &options->authorized_principals_file;
15998ad9b54aSDag-Erling Smørgrav 		arg = strdelim(&cp);
16008ad9b54aSDag-Erling Smørgrav 		if (!arg || *arg == '\0')
16018ad9b54aSDag-Erling Smørgrav 			fatal("%s line %d: missing file name.",
16028ad9b54aSDag-Erling Smørgrav 			    filename, linenum);
16038ad9b54aSDag-Erling Smørgrav 		if (*activep && *charptr == NULL) {
16048ad9b54aSDag-Erling Smørgrav 			*charptr = tilde_expand_filename(arg, getuid());
16058ad9b54aSDag-Erling Smørgrav 			/* increase optional counter */
16068ad9b54aSDag-Erling Smørgrav 			if (intptr != NULL)
16078ad9b54aSDag-Erling Smørgrav 				*intptr = *intptr + 1;
16088ad9b54aSDag-Erling Smørgrav 		}
16098ad9b54aSDag-Erling Smørgrav 		break;
1610af12a3e7SDag-Erling Smørgrav 
1611ca3176e7SBrian Feldman 	case sClientAliveInterval:
1612ca3176e7SBrian Feldman 		intptr = &options->client_alive_interval;
1613af12a3e7SDag-Erling Smørgrav 		goto parse_time;
1614af12a3e7SDag-Erling Smørgrav 
1615ca3176e7SBrian Feldman 	case sClientAliveCountMax:
1616ca3176e7SBrian Feldman 		intptr = &options->client_alive_count_max;
1617ca3176e7SBrian Feldman 		goto parse_int;
1618af12a3e7SDag-Erling Smørgrav 
161921e764dfSDag-Erling Smørgrav 	case sAcceptEnv:
162021e764dfSDag-Erling Smørgrav 		while ((arg = strdelim(&cp)) && *arg != '\0') {
162121e764dfSDag-Erling Smørgrav 			if (strchr(arg, '=') != NULL)
162221e764dfSDag-Erling Smørgrav 				fatal("%s line %d: Invalid environment name.",
162321e764dfSDag-Erling Smørgrav 				    filename, linenum);
162421e764dfSDag-Erling Smørgrav 			if (options->num_accept_env >= MAX_ACCEPT_ENV)
162521e764dfSDag-Erling Smørgrav 				fatal("%s line %d: too many allow env.",
162621e764dfSDag-Erling Smørgrav 				    filename, linenum);
1627333ee039SDag-Erling Smørgrav 			if (!*activep)
1628462c32cbSDag-Erling Smørgrav 				continue;
162921e764dfSDag-Erling Smørgrav 			options->accept_env[options->num_accept_env++] =
163021e764dfSDag-Erling Smørgrav 			    xstrdup(arg);
163121e764dfSDag-Erling Smørgrav 		}
163221e764dfSDag-Erling Smørgrav 		break;
163321e764dfSDag-Erling Smørgrav 
1634b74df5b2SDag-Erling Smørgrav 	case sPermitTunnel:
1635b74df5b2SDag-Erling Smørgrav 		intptr = &options->permit_tun;
1636b74df5b2SDag-Erling Smørgrav 		arg = strdelim(&cp);
1637b74df5b2SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1638b74df5b2SDag-Erling Smørgrav 			fatal("%s line %d: Missing yes/point-to-point/"
1639b74df5b2SDag-Erling Smørgrav 			    "ethernet/no argument.", filename, linenum);
1640d4af9e69SDag-Erling Smørgrav 		value = -1;
1641d4af9e69SDag-Erling Smørgrav 		for (i = 0; tunmode_desc[i].val != -1; i++)
1642d4af9e69SDag-Erling Smørgrav 			if (strcmp(tunmode_desc[i].text, arg) == 0) {
1643d4af9e69SDag-Erling Smørgrav 				value = tunmode_desc[i].val;
1644d4af9e69SDag-Erling Smørgrav 				break;
1645d4af9e69SDag-Erling Smørgrav 			}
1646d4af9e69SDag-Erling Smørgrav 		if (value == -1)
1647b74df5b2SDag-Erling Smørgrav 			fatal("%s line %d: Bad yes/point-to-point/ethernet/"
1648b74df5b2SDag-Erling Smørgrav 			    "no argument: %s", filename, linenum, arg);
1649557f75e5SDag-Erling Smørgrav 		if (*activep && *intptr == -1)
1650b74df5b2SDag-Erling Smørgrav 			*intptr = value;
1651b74df5b2SDag-Erling Smørgrav 		break;
1652b74df5b2SDag-Erling Smørgrav 
1653333ee039SDag-Erling Smørgrav 	case sMatch:
1654333ee039SDag-Erling Smørgrav 		if (cmdline)
1655333ee039SDag-Erling Smørgrav 			fatal("Match directive not supported as a command-line "
1656333ee039SDag-Erling Smørgrav 			   "option");
1657462c32cbSDag-Erling Smørgrav 		value = match_cfg_line(&cp, linenum, connectinfo);
1658333ee039SDag-Erling Smørgrav 		if (value < 0)
1659333ee039SDag-Erling Smørgrav 			fatal("%s line %d: Bad Match condition", filename,
1660333ee039SDag-Erling Smørgrav 			    linenum);
1661333ee039SDag-Erling Smørgrav 		*activep = value;
1662333ee039SDag-Erling Smørgrav 		break;
1663333ee039SDag-Erling Smørgrav 
1664333ee039SDag-Erling Smørgrav 	case sPermitOpen:
1665333ee039SDag-Erling Smørgrav 		arg = strdelim(&cp);
1666333ee039SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1667333ee039SDag-Erling Smørgrav 			fatal("%s line %d: missing PermitOpen specification",
1668333ee039SDag-Erling Smørgrav 			    filename, linenum);
1669d4af9e69SDag-Erling Smørgrav 		n = options->num_permitted_opens;	/* modified later */
1670333ee039SDag-Erling Smørgrav 		if (strcmp(arg, "any") == 0) {
1671d4af9e69SDag-Erling Smørgrav 			if (*activep && n == -1) {
1672333ee039SDag-Erling Smørgrav 				channel_clear_adm_permitted_opens();
1673333ee039SDag-Erling Smørgrav 				options->num_permitted_opens = 0;
1674333ee039SDag-Erling Smørgrav 			}
1675333ee039SDag-Erling Smørgrav 			break;
1676333ee039SDag-Erling Smørgrav 		}
1677462c32cbSDag-Erling Smørgrav 		if (strcmp(arg, "none") == 0) {
1678462c32cbSDag-Erling Smørgrav 			if (*activep && n == -1) {
1679462c32cbSDag-Erling Smørgrav 				options->num_permitted_opens = 1;
1680462c32cbSDag-Erling Smørgrav 				channel_disable_adm_local_opens();
1681462c32cbSDag-Erling Smørgrav 			}
1682462c32cbSDag-Erling Smørgrav 			break;
1683462c32cbSDag-Erling Smørgrav 		}
1684d4af9e69SDag-Erling Smørgrav 		if (*activep && n == -1)
1685d4af9e69SDag-Erling Smørgrav 			channel_clear_adm_permitted_opens();
1686333ee039SDag-Erling Smørgrav 		for (; arg != NULL && *arg != '\0'; arg = strdelim(&cp)) {
1687333ee039SDag-Erling Smørgrav 			p = hpdelim(&arg);
1688333ee039SDag-Erling Smørgrav 			if (p == NULL)
1689333ee039SDag-Erling Smørgrav 				fatal("%s line %d: missing host in PermitOpen",
1690333ee039SDag-Erling Smørgrav 				    filename, linenum);
1691333ee039SDag-Erling Smørgrav 			p = cleanhostname(p);
1692462c32cbSDag-Erling Smørgrav 			if (arg == NULL || ((port = permitopen_port(arg)) < 0))
1693333ee039SDag-Erling Smørgrav 				fatal("%s line %d: bad port number in "
1694333ee039SDag-Erling Smørgrav 				    "PermitOpen", filename, linenum);
1695d4af9e69SDag-Erling Smørgrav 			if (*activep && n == -1)
1696333ee039SDag-Erling Smørgrav 				options->num_permitted_opens =
1697333ee039SDag-Erling Smørgrav 				    channel_add_adm_permitted_opens(p, port);
1698333ee039SDag-Erling Smørgrav 		}
1699333ee039SDag-Erling Smørgrav 		break;
1700333ee039SDag-Erling Smørgrav 
1701333ee039SDag-Erling Smørgrav 	case sForceCommand:
1702557f75e5SDag-Erling Smørgrav 		if (cp == NULL || *cp == '\0')
1703333ee039SDag-Erling Smørgrav 			fatal("%.200s line %d: Missing argument.", filename,
1704333ee039SDag-Erling Smørgrav 			    linenum);
1705333ee039SDag-Erling Smørgrav 		len = strspn(cp, WHITESPACE);
1706333ee039SDag-Erling Smørgrav 		if (*activep && options->adm_forced_command == NULL)
1707333ee039SDag-Erling Smørgrav 			options->adm_forced_command = xstrdup(cp + len);
1708333ee039SDag-Erling Smørgrav 		return 0;
1709333ee039SDag-Erling Smørgrav 
1710d4af9e69SDag-Erling Smørgrav 	case sChrootDirectory:
1711d4af9e69SDag-Erling Smørgrav 		charptr = &options->chroot_directory;
1712d4af9e69SDag-Erling Smørgrav 
1713d4af9e69SDag-Erling Smørgrav 		arg = strdelim(&cp);
1714d4af9e69SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1715d4af9e69SDag-Erling Smørgrav 			fatal("%s line %d: missing file name.",
1716d4af9e69SDag-Erling Smørgrav 			    filename, linenum);
1717d4af9e69SDag-Erling Smørgrav 		if (*activep && *charptr == NULL)
1718d4af9e69SDag-Erling Smørgrav 			*charptr = xstrdup(arg);
1719d4af9e69SDag-Erling Smørgrav 		break;
1720d4af9e69SDag-Erling Smørgrav 
1721b15c8340SDag-Erling Smørgrav 	case sTrustedUserCAKeys:
1722b15c8340SDag-Erling Smørgrav 		charptr = &options->trusted_user_ca_keys;
1723b15c8340SDag-Erling Smørgrav 		goto parse_filename;
1724b15c8340SDag-Erling Smørgrav 
1725b15c8340SDag-Erling Smørgrav 	case sRevokedKeys:
1726b15c8340SDag-Erling Smørgrav 		charptr = &options->revoked_keys_file;
1727b15c8340SDag-Erling Smørgrav 		goto parse_filename;
1728b15c8340SDag-Erling Smørgrav 
17294a421b63SDag-Erling Smørgrav 	case sIPQoS:
17304a421b63SDag-Erling Smørgrav 		arg = strdelim(&cp);
17314a421b63SDag-Erling Smørgrav 		if ((value = parse_ipqos(arg)) == -1)
17324a421b63SDag-Erling Smørgrav 			fatal("%s line %d: Bad IPQoS value: %s",
17334a421b63SDag-Erling Smørgrav 			    filename, linenum, arg);
17344a421b63SDag-Erling Smørgrav 		arg = strdelim(&cp);
17354a421b63SDag-Erling Smørgrav 		if (arg == NULL)
17364a421b63SDag-Erling Smørgrav 			value2 = value;
17374a421b63SDag-Erling Smørgrav 		else if ((value2 = parse_ipqos(arg)) == -1)
17384a421b63SDag-Erling Smørgrav 			fatal("%s line %d: Bad IPQoS value: %s",
17394a421b63SDag-Erling Smørgrav 			    filename, linenum, arg);
17404a421b63SDag-Erling Smørgrav 		if (*activep) {
17414a421b63SDag-Erling Smørgrav 			options->ip_qos_interactive = value;
17424a421b63SDag-Erling Smørgrav 			options->ip_qos_bulk = value2;
17434a421b63SDag-Erling Smørgrav 		}
17444a421b63SDag-Erling Smørgrav 		break;
17454a421b63SDag-Erling Smørgrav 
1746db58a8e4SDag-Erling Smørgrav 	case sVersionAddendum:
1747557f75e5SDag-Erling Smørgrav 		if (cp == NULL || *cp == '\0')
1748462c32cbSDag-Erling Smørgrav 			fatal("%.200s line %d: Missing argument.", filename,
1749462c32cbSDag-Erling Smørgrav 			    linenum);
1750462c32cbSDag-Erling Smørgrav 		len = strspn(cp, WHITESPACE);
1751462c32cbSDag-Erling Smørgrav 		if (*activep && options->version_addendum == NULL) {
1752462c32cbSDag-Erling Smørgrav 			if (strcasecmp(cp + len, "none") == 0)
1753462c32cbSDag-Erling Smørgrav 				options->version_addendum = xstrdup("");
1754462c32cbSDag-Erling Smørgrav 			else if (strchr(cp + len, '\r') != NULL)
1755462c32cbSDag-Erling Smørgrav 				fatal("%.200s line %d: Invalid argument",
1756462c32cbSDag-Erling Smørgrav 				    filename, linenum);
1757462c32cbSDag-Erling Smørgrav 			else
1758462c32cbSDag-Erling Smørgrav 				options->version_addendum = xstrdup(cp + len);
1759462c32cbSDag-Erling Smørgrav 		}
1760462c32cbSDag-Erling Smørgrav 		return 0;
1761db58a8e4SDag-Erling Smørgrav 
17626888a9beSDag-Erling Smørgrav 	case sAuthorizedKeysCommand:
1763bc5531deSDag-Erling Smørgrav 		if (cp == NULL)
1764bc5531deSDag-Erling Smørgrav 			fatal("%.200s line %d: Missing argument.", filename,
1765bc5531deSDag-Erling Smørgrav 			    linenum);
17666888a9beSDag-Erling Smørgrav 		len = strspn(cp, WHITESPACE);
17676888a9beSDag-Erling Smørgrav 		if (*activep && options->authorized_keys_command == NULL) {
17686888a9beSDag-Erling Smørgrav 			if (cp[len] != '/' && strcasecmp(cp + len, "none") != 0)
17696888a9beSDag-Erling Smørgrav 				fatal("%.200s line %d: AuthorizedKeysCommand "
17706888a9beSDag-Erling Smørgrav 				    "must be an absolute path",
17716888a9beSDag-Erling Smørgrav 				    filename, linenum);
17726888a9beSDag-Erling Smørgrav 			options->authorized_keys_command = xstrdup(cp + len);
17736888a9beSDag-Erling Smørgrav 		}
17746888a9beSDag-Erling Smørgrav 		return 0;
17756888a9beSDag-Erling Smørgrav 
17766888a9beSDag-Erling Smørgrav 	case sAuthorizedKeysCommandUser:
17776888a9beSDag-Erling Smørgrav 		charptr = &options->authorized_keys_command_user;
17786888a9beSDag-Erling Smørgrav 
17796888a9beSDag-Erling Smørgrav 		arg = strdelim(&cp);
1780bc5531deSDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1781bc5531deSDag-Erling Smørgrav 			fatal("%s line %d: missing AuthorizedKeysCommandUser "
1782bc5531deSDag-Erling Smørgrav 			    "argument.", filename, linenum);
17836888a9beSDag-Erling Smørgrav 		if (*activep && *charptr == NULL)
17846888a9beSDag-Erling Smørgrav 			*charptr = xstrdup(arg);
17856888a9beSDag-Erling Smørgrav 		break;
17866888a9beSDag-Erling Smørgrav 
1787557f75e5SDag-Erling Smørgrav 	case sAuthorizedPrincipalsCommand:
1788557f75e5SDag-Erling Smørgrav 		if (cp == NULL)
1789557f75e5SDag-Erling Smørgrav 			fatal("%.200s line %d: Missing argument.", filename,
1790557f75e5SDag-Erling Smørgrav 			    linenum);
1791557f75e5SDag-Erling Smørgrav 		len = strspn(cp, WHITESPACE);
1792557f75e5SDag-Erling Smørgrav 		if (*activep &&
1793557f75e5SDag-Erling Smørgrav 		    options->authorized_principals_command == NULL) {
1794557f75e5SDag-Erling Smørgrav 			if (cp[len] != '/' && strcasecmp(cp + len, "none") != 0)
1795557f75e5SDag-Erling Smørgrav 				fatal("%.200s line %d: "
1796557f75e5SDag-Erling Smørgrav 				    "AuthorizedPrincipalsCommand must be "
1797557f75e5SDag-Erling Smørgrav 				    "an absolute path", filename, linenum);
1798557f75e5SDag-Erling Smørgrav 			options->authorized_principals_command =
1799557f75e5SDag-Erling Smørgrav 			    xstrdup(cp + len);
1800557f75e5SDag-Erling Smørgrav 		}
1801557f75e5SDag-Erling Smørgrav 		return 0;
1802557f75e5SDag-Erling Smørgrav 
1803557f75e5SDag-Erling Smørgrav 	case sAuthorizedPrincipalsCommandUser:
1804557f75e5SDag-Erling Smørgrav 		charptr = &options->authorized_principals_command_user;
1805557f75e5SDag-Erling Smørgrav 
1806557f75e5SDag-Erling Smørgrav 		arg = strdelim(&cp);
1807557f75e5SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1808557f75e5SDag-Erling Smørgrav 			fatal("%s line %d: missing "
1809557f75e5SDag-Erling Smørgrav 			    "AuthorizedPrincipalsCommandUser argument.",
1810557f75e5SDag-Erling Smørgrav 			    filename, linenum);
1811557f75e5SDag-Erling Smørgrav 		if (*activep && *charptr == NULL)
1812557f75e5SDag-Erling Smørgrav 			*charptr = xstrdup(arg);
1813557f75e5SDag-Erling Smørgrav 		break;
1814557f75e5SDag-Erling Smørgrav 
18156888a9beSDag-Erling Smørgrav 	case sAuthenticationMethods:
1816557f75e5SDag-Erling Smørgrav 		if (options->num_auth_methods == 0) {
18176888a9beSDag-Erling Smørgrav 			while ((arg = strdelim(&cp)) && *arg != '\0') {
18186888a9beSDag-Erling Smørgrav 				if (options->num_auth_methods >=
18196888a9beSDag-Erling Smørgrav 				    MAX_AUTH_METHODS)
18206888a9beSDag-Erling Smørgrav 					fatal("%s line %d: "
18216888a9beSDag-Erling Smørgrav 					    "too many authentication methods.",
18226888a9beSDag-Erling Smørgrav 					    filename, linenum);
18236888a9beSDag-Erling Smørgrav 				if (auth2_methods_valid(arg, 0) != 0)
18246888a9beSDag-Erling Smørgrav 					fatal("%s line %d: invalid "
18256888a9beSDag-Erling Smørgrav 					    "authentication method list.",
18266888a9beSDag-Erling Smørgrav 					    filename, linenum);
1827557f75e5SDag-Erling Smørgrav 				if (!*activep)
1828557f75e5SDag-Erling Smørgrav 					continue;
18296888a9beSDag-Erling Smørgrav 				options->auth_methods[
18306888a9beSDag-Erling Smørgrav 				    options->num_auth_methods++] = xstrdup(arg);
18316888a9beSDag-Erling Smørgrav 			}
18326888a9beSDag-Erling Smørgrav 		}
18336888a9beSDag-Erling Smørgrav 		return 0;
18346888a9beSDag-Erling Smørgrav 
1835a0ee8cc6SDag-Erling Smørgrav 	case sStreamLocalBindMask:
1836a0ee8cc6SDag-Erling Smørgrav 		arg = strdelim(&cp);
1837a0ee8cc6SDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1838557f75e5SDag-Erling Smørgrav 			fatal("%s line %d: missing StreamLocalBindMask "
1839557f75e5SDag-Erling Smørgrav 			    "argument.", filename, linenum);
1840a0ee8cc6SDag-Erling Smørgrav 		/* Parse mode in octal format */
1841a0ee8cc6SDag-Erling Smørgrav 		value = strtol(arg, &p, 8);
1842a0ee8cc6SDag-Erling Smørgrav 		if (arg == p || value < 0 || value > 0777)
1843a0ee8cc6SDag-Erling Smørgrav 			fatal("%s line %d: Bad mask.", filename, linenum);
1844557f75e5SDag-Erling Smørgrav 		if (*activep)
1845a0ee8cc6SDag-Erling Smørgrav 			options->fwd_opts.streamlocal_bind_mask = (mode_t)value;
1846a0ee8cc6SDag-Erling Smørgrav 		break;
1847a0ee8cc6SDag-Erling Smørgrav 
1848a0ee8cc6SDag-Erling Smørgrav 	case sStreamLocalBindUnlink:
1849a0ee8cc6SDag-Erling Smørgrav 		intptr = &options->fwd_opts.streamlocal_bind_unlink;
1850a0ee8cc6SDag-Erling Smørgrav 		goto parse_flag;
1851a0ee8cc6SDag-Erling Smørgrav 
1852bc5531deSDag-Erling Smørgrav 	case sFingerprintHash:
1853bc5531deSDag-Erling Smørgrav 		arg = strdelim(&cp);
1854bc5531deSDag-Erling Smørgrav 		if (!arg || *arg == '\0')
1855bc5531deSDag-Erling Smørgrav 			fatal("%.200s line %d: Missing argument.",
1856bc5531deSDag-Erling Smørgrav 			    filename, linenum);
1857bc5531deSDag-Erling Smørgrav 		if ((value = ssh_digest_alg_by_name(arg)) == -1)
1858bc5531deSDag-Erling Smørgrav 			fatal("%.200s line %d: Invalid hash algorithm \"%s\".",
1859bc5531deSDag-Erling Smørgrav 			    filename, linenum, arg);
1860bc5531deSDag-Erling Smørgrav 		if (*activep)
1861bc5531deSDag-Erling Smørgrav 			options->fingerprint_hash = value;
1862bc5531deSDag-Erling Smørgrav 		break;
1863bc5531deSDag-Erling Smørgrav 
1864af12a3e7SDag-Erling Smørgrav 	case sDeprecated:
1865cf2b5f3bSDag-Erling Smørgrav 		logit("%s line %d: Deprecated option %s",
1866cf2b5f3bSDag-Erling Smørgrav 		    filename, linenum, arg);
1867cf2b5f3bSDag-Erling Smørgrav 		while (arg)
1868cf2b5f3bSDag-Erling Smørgrav 		    arg = strdelim(&cp);
1869cf2b5f3bSDag-Erling Smørgrav 		break;
1870cf2b5f3bSDag-Erling Smørgrav 
1871cf2b5f3bSDag-Erling Smørgrav 	case sUnsupported:
1872cf2b5f3bSDag-Erling Smørgrav 		logit("%s line %d: Unsupported option %s",
1873af12a3e7SDag-Erling Smørgrav 		    filename, linenum, arg);
1874af12a3e7SDag-Erling Smørgrav 		while (arg)
1875af12a3e7SDag-Erling Smørgrav 		    arg = strdelim(&cp);
1876af12a3e7SDag-Erling Smørgrav 		break;
1877af12a3e7SDag-Erling Smørgrav 
187842f71286SMark Murray 	default:
1879af12a3e7SDag-Erling Smørgrav 		fatal("%s line %d: Missing handler for opcode %s (%d)",
1880c2d3a559SKris Kennaway 		    filename, linenum, arg, opcode);
1881511b41d2SMark Murray 	}
1882ca3176e7SBrian Feldman 	if ((arg = strdelim(&cp)) != NULL && *arg != '\0')
1883ca3176e7SBrian Feldman 		fatal("%s line %d: garbage at end of line; \"%.200s\".",
1884c2d3a559SKris Kennaway 		    filename, linenum, arg);
1885af12a3e7SDag-Erling Smørgrav 	return 0;
1886af12a3e7SDag-Erling Smørgrav }
1887af12a3e7SDag-Erling Smørgrav 
1888af12a3e7SDag-Erling Smørgrav /* Reads the server configuration file. */
1889af12a3e7SDag-Erling Smørgrav 
1890af12a3e7SDag-Erling Smørgrav void
189121e764dfSDag-Erling Smørgrav load_server_config(const char *filename, Buffer *conf)
1892af12a3e7SDag-Erling Smørgrav {
1893462c32cbSDag-Erling Smørgrav 	char line[4096], *cp;
1894a82e551fSDag-Erling Smørgrav 	FILE *f;
1895462c32cbSDag-Erling Smørgrav 	int lineno = 0;
1896af12a3e7SDag-Erling Smørgrav 
189721e764dfSDag-Erling Smørgrav 	debug2("%s: filename %s", __func__, filename);
189821e764dfSDag-Erling Smørgrav 	if ((f = fopen(filename, "r")) == NULL) {
1899af12a3e7SDag-Erling Smørgrav 		perror(filename);
1900af12a3e7SDag-Erling Smørgrav 		exit(1);
1901af12a3e7SDag-Erling Smørgrav 	}
190221e764dfSDag-Erling Smørgrav 	buffer_clear(conf);
1903af12a3e7SDag-Erling Smørgrav 	while (fgets(line, sizeof(line), f)) {
1904462c32cbSDag-Erling Smørgrav 		lineno++;
1905462c32cbSDag-Erling Smørgrav 		if (strlen(line) == sizeof(line) - 1)
1906462c32cbSDag-Erling Smørgrav 			fatal("%s line %d too long", filename, lineno);
190721e764dfSDag-Erling Smørgrav 		/*
190821e764dfSDag-Erling Smørgrav 		 * Trim out comments and strip whitespace
190921e764dfSDag-Erling Smørgrav 		 * NB - preserve newlines, they are needed to reproduce
191021e764dfSDag-Erling Smørgrav 		 * line numbers later for error messages
191121e764dfSDag-Erling Smørgrav 		 */
191221e764dfSDag-Erling Smørgrav 		if ((cp = strchr(line, '#')) != NULL)
191321e764dfSDag-Erling Smørgrav 			memcpy(cp, "\n", 2);
191421e764dfSDag-Erling Smørgrav 		cp = line + strspn(line, " \t\r");
191521e764dfSDag-Erling Smørgrav 
191621e764dfSDag-Erling Smørgrav 		buffer_append(conf, cp, strlen(cp));
191721e764dfSDag-Erling Smørgrav 	}
191821e764dfSDag-Erling Smørgrav 	buffer_append(conf, "\0", 1);
191921e764dfSDag-Erling Smørgrav 	fclose(f);
192021e764dfSDag-Erling Smørgrav 	debug2("%s: done config len = %d", __func__, buffer_len(conf));
192121e764dfSDag-Erling Smørgrav }
192221e764dfSDag-Erling Smørgrav 
192321e764dfSDag-Erling Smørgrav void
1924462c32cbSDag-Erling Smørgrav parse_server_match_config(ServerOptions *options,
1925462c32cbSDag-Erling Smørgrav    struct connection_info *connectinfo)
192621e764dfSDag-Erling Smørgrav {
1927333ee039SDag-Erling Smørgrav 	ServerOptions mo;
1928333ee039SDag-Erling Smørgrav 
1929333ee039SDag-Erling Smørgrav 	initialize_server_options(&mo);
1930462c32cbSDag-Erling Smørgrav 	parse_server_config(&mo, "reprocess config", &cfg, connectinfo);
1931d4af9e69SDag-Erling Smørgrav 	copy_set_server_options(options, &mo, 0);
1932333ee039SDag-Erling Smørgrav }
1933333ee039SDag-Erling Smørgrav 
1934462c32cbSDag-Erling Smørgrav int parse_server_match_testspec(struct connection_info *ci, char *spec)
1935462c32cbSDag-Erling Smørgrav {
1936462c32cbSDag-Erling Smørgrav 	char *p;
1937462c32cbSDag-Erling Smørgrav 
1938462c32cbSDag-Erling Smørgrav 	while ((p = strsep(&spec, ",")) && *p != '\0') {
1939462c32cbSDag-Erling Smørgrav 		if (strncmp(p, "addr=", 5) == 0) {
1940462c32cbSDag-Erling Smørgrav 			ci->address = xstrdup(p + 5);
1941462c32cbSDag-Erling Smørgrav 		} else if (strncmp(p, "host=", 5) == 0) {
1942462c32cbSDag-Erling Smørgrav 			ci->host = xstrdup(p + 5);
1943462c32cbSDag-Erling Smørgrav 		} else if (strncmp(p, "user=", 5) == 0) {
1944462c32cbSDag-Erling Smørgrav 			ci->user = xstrdup(p + 5);
1945462c32cbSDag-Erling Smørgrav 		} else if (strncmp(p, "laddr=", 6) == 0) {
1946462c32cbSDag-Erling Smørgrav 			ci->laddress = xstrdup(p + 6);
1947462c32cbSDag-Erling Smørgrav 		} else if (strncmp(p, "lport=", 6) == 0) {
1948462c32cbSDag-Erling Smørgrav 			ci->lport = a2port(p + 6);
1949462c32cbSDag-Erling Smørgrav 			if (ci->lport == -1) {
1950462c32cbSDag-Erling Smørgrav 				fprintf(stderr, "Invalid port '%s' in test mode"
1951462c32cbSDag-Erling Smørgrav 				   " specification %s\n", p+6, p);
1952462c32cbSDag-Erling Smørgrav 				return -1;
1953462c32cbSDag-Erling Smørgrav 			}
1954462c32cbSDag-Erling Smørgrav 		} else {
1955462c32cbSDag-Erling Smørgrav 			fprintf(stderr, "Invalid test mode specification %s\n",
1956462c32cbSDag-Erling Smørgrav 			   p);
1957462c32cbSDag-Erling Smørgrav 			return -1;
1958462c32cbSDag-Erling Smørgrav 		}
1959462c32cbSDag-Erling Smørgrav 	}
1960462c32cbSDag-Erling Smørgrav 	return 0;
1961462c32cbSDag-Erling Smørgrav }
1962462c32cbSDag-Erling Smørgrav 
1963462c32cbSDag-Erling Smørgrav /*
1964462c32cbSDag-Erling Smørgrav  * returns 1 for a complete spec, 0 for partial spec and -1 for an
1965462c32cbSDag-Erling Smørgrav  * empty spec.
1966462c32cbSDag-Erling Smørgrav  */
1967462c32cbSDag-Erling Smørgrav int server_match_spec_complete(struct connection_info *ci)
1968462c32cbSDag-Erling Smørgrav {
1969462c32cbSDag-Erling Smørgrav 	if (ci->user && ci->host && ci->address)
1970462c32cbSDag-Erling Smørgrav 		return 1;	/* complete */
1971462c32cbSDag-Erling Smørgrav 	if (!ci->user && !ci->host && !ci->address)
1972462c32cbSDag-Erling Smørgrav 		return -1;	/* empty */
1973462c32cbSDag-Erling Smørgrav 	return 0;	/* partial */
1974462c32cbSDag-Erling Smørgrav }
1975462c32cbSDag-Erling Smørgrav 
1976d4af9e69SDag-Erling Smørgrav /*
1977d4af9e69SDag-Erling Smørgrav  * Copy any supported values that are set.
1978d4af9e69SDag-Erling Smørgrav  *
19797aee6ffeSDag-Erling Smørgrav  * If the preauth flag is set, we do not bother copying the string or
1980d4af9e69SDag-Erling Smørgrav  * array values that are not used pre-authentication, because any that we
1981d4af9e69SDag-Erling Smørgrav  * do use must be explictly sent in mm_getpwnamallow().
1982d4af9e69SDag-Erling Smørgrav  */
1983333ee039SDag-Erling Smørgrav void
1984d4af9e69SDag-Erling Smørgrav copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth)
1985333ee039SDag-Erling Smørgrav {
1986f7167e0eSDag-Erling Smørgrav #define M_CP_INTOPT(n) do {\
1987f7167e0eSDag-Erling Smørgrav 	if (src->n != -1) \
1988f7167e0eSDag-Erling Smørgrav 		dst->n = src->n; \
1989f7167e0eSDag-Erling Smørgrav } while (0)
1990f7167e0eSDag-Erling Smørgrav 
1991d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(password_authentication);
1992d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(gss_authentication);
1993d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(rsa_authentication);
1994d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(pubkey_authentication);
1995d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(kerberos_authentication);
1996d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(hostbased_authentication);
1997e2f6069cSDag-Erling Smørgrav 	M_CP_INTOPT(hostbased_uses_name_from_packet_only);
1998d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(kbd_interactive_authentication);
1999d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(permit_root_login);
2000cce7d346SDag-Erling Smørgrav 	M_CP_INTOPT(permit_empty_passwd);
2001d4af9e69SDag-Erling Smørgrav 
2002d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(allow_tcp_forwarding);
2003a0ee8cc6SDag-Erling Smørgrav 	M_CP_INTOPT(allow_streamlocal_forwarding);
2004d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(allow_agent_forwarding);
2005e2f6069cSDag-Erling Smørgrav 	M_CP_INTOPT(permit_tun);
2006a0ee8cc6SDag-Erling Smørgrav 	M_CP_INTOPT(fwd_opts.gateway_ports);
2007d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(x11_display_offset);
2008d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(x11_forwarding);
2009d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(x11_use_localhost);
2010f7167e0eSDag-Erling Smørgrav 	M_CP_INTOPT(permit_tty);
2011a0ee8cc6SDag-Erling Smørgrav 	M_CP_INTOPT(permit_user_rc);
2012d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(max_sessions);
2013d4af9e69SDag-Erling Smørgrav 	M_CP_INTOPT(max_authtries);
20144a421b63SDag-Erling Smørgrav 	M_CP_INTOPT(ip_qos_interactive);
20154a421b63SDag-Erling Smørgrav 	M_CP_INTOPT(ip_qos_bulk);
2016e4a9863fSDag-Erling Smørgrav 	M_CP_INTOPT(rekey_limit);
2017e4a9863fSDag-Erling Smørgrav 	M_CP_INTOPT(rekey_interval);
2018d4af9e69SDag-Erling Smørgrav 
2019f7167e0eSDag-Erling Smørgrav 	/* M_CP_STROPT and M_CP_STRARRAYOPT should not appear before here */
2020f7167e0eSDag-Erling Smørgrav #define M_CP_STROPT(n) do {\
2021f7167e0eSDag-Erling Smørgrav 	if (src->n != NULL && dst->n != src->n) { \
2022f7167e0eSDag-Erling Smørgrav 		free(dst->n); \
2023f7167e0eSDag-Erling Smørgrav 		dst->n = src->n; \
2024f7167e0eSDag-Erling Smørgrav 	} \
2025f7167e0eSDag-Erling Smørgrav } while(0)
2026f7167e0eSDag-Erling Smørgrav #define M_CP_STRARRAYOPT(n, num_n) do {\
2027f7167e0eSDag-Erling Smørgrav 	if (src->num_n != 0) { \
2028f7167e0eSDag-Erling Smørgrav 		for (dst->num_n = 0; dst->num_n < src->num_n; dst->num_n++) \
2029f7167e0eSDag-Erling Smørgrav 			dst->n[dst->num_n] = xstrdup(src->n[dst->num_n]); \
2030f7167e0eSDag-Erling Smørgrav 	} \
2031f7167e0eSDag-Erling Smørgrav } while(0)
2032f7167e0eSDag-Erling Smørgrav 
2033e146993eSDag-Erling Smørgrav 	/* See comment in servconf.h */
2034e146993eSDag-Erling Smørgrav 	COPY_MATCH_STRING_OPTS();
2035e146993eSDag-Erling Smørgrav 
2036acc1a9efSDag-Erling Smørgrav 	/* Arguments that accept '+...' need to be expanded */
2037acc1a9efSDag-Erling Smørgrav 	assemble_algorithms(dst);
2038acc1a9efSDag-Erling Smørgrav 
2039e146993eSDag-Erling Smørgrav 	/*
2040e146993eSDag-Erling Smørgrav 	 * The only things that should be below this point are string options
2041e146993eSDag-Erling Smørgrav 	 * which are only used after authentication.
2042e146993eSDag-Erling Smørgrav 	 */
2043d4af9e69SDag-Erling Smørgrav 	if (preauth)
2044d4af9e69SDag-Erling Smørgrav 		return;
2045e146993eSDag-Erling Smørgrav 
2046acc1a9efSDag-Erling Smørgrav 	/* These options may be "none" to clear a global setting */
2047d4af9e69SDag-Erling Smørgrav 	M_CP_STROPT(adm_forced_command);
2048acc1a9efSDag-Erling Smørgrav 	if (option_clear_or_none(dst->adm_forced_command)) {
2049acc1a9efSDag-Erling Smørgrav 		free(dst->adm_forced_command);
2050acc1a9efSDag-Erling Smørgrav 		dst->adm_forced_command = NULL;
2051acc1a9efSDag-Erling Smørgrav 	}
2052d4af9e69SDag-Erling Smørgrav 	M_CP_STROPT(chroot_directory);
2053acc1a9efSDag-Erling Smørgrav 	if (option_clear_or_none(dst->chroot_directory)) {
2054acc1a9efSDag-Erling Smørgrav 		free(dst->chroot_directory);
2055acc1a9efSDag-Erling Smørgrav 		dst->chroot_directory = NULL;
2056acc1a9efSDag-Erling Smørgrav 	}
2057333ee039SDag-Erling Smørgrav }
2058d4af9e69SDag-Erling Smørgrav 
2059d4af9e69SDag-Erling Smørgrav #undef M_CP_INTOPT
2060d4af9e69SDag-Erling Smørgrav #undef M_CP_STROPT
2061e146993eSDag-Erling Smørgrav #undef M_CP_STRARRAYOPT
2062333ee039SDag-Erling Smørgrav 
2063333ee039SDag-Erling Smørgrav void
2064333ee039SDag-Erling Smørgrav parse_server_config(ServerOptions *options, const char *filename, Buffer *conf,
2065462c32cbSDag-Erling Smørgrav     struct connection_info *connectinfo)
2066333ee039SDag-Erling Smørgrav {
2067333ee039SDag-Erling Smørgrav 	int active, linenum, bad_options = 0;
206821e764dfSDag-Erling Smørgrav 	char *cp, *obuf, *cbuf;
206921e764dfSDag-Erling Smørgrav 
207021e764dfSDag-Erling Smørgrav 	debug2("%s: config %s len %d", __func__, filename, buffer_len(conf));
207121e764dfSDag-Erling Smørgrav 
207221e764dfSDag-Erling Smørgrav 	obuf = cbuf = xstrdup(buffer_ptr(conf));
2073462c32cbSDag-Erling Smørgrav 	active = connectinfo ? 0 : 1;
207421e764dfSDag-Erling Smørgrav 	linenum = 1;
207521e764dfSDag-Erling Smørgrav 	while ((cp = strsep(&cbuf, "\n")) != NULL) {
207621e764dfSDag-Erling Smørgrav 		if (process_server_config_line(options, cp, filename,
2077462c32cbSDag-Erling Smørgrav 		    linenum++, &active, connectinfo) != 0)
2078af12a3e7SDag-Erling Smørgrav 			bad_options++;
2079511b41d2SMark Murray 	}
2080e4a9863fSDag-Erling Smørgrav 	free(obuf);
2081ca3176e7SBrian Feldman 	if (bad_options > 0)
2082af12a3e7SDag-Erling Smørgrav 		fatal("%s: terminating, %d bad configuration options",
2083511b41d2SMark Murray 		    filename, bad_options);
2084557f75e5SDag-Erling Smørgrav 	process_queued_listen_addrs(options);
2085511b41d2SMark Murray }
2086d4af9e69SDag-Erling Smørgrav 
2087d4af9e69SDag-Erling Smørgrav static const char *
2088e146993eSDag-Erling Smørgrav fmt_multistate_int(int val, const struct multistate *m)
2089d4af9e69SDag-Erling Smørgrav {
2090e146993eSDag-Erling Smørgrav 	u_int i;
2091e146993eSDag-Erling Smørgrav 
2092e146993eSDag-Erling Smørgrav 	for (i = 0; m[i].key != NULL; i++) {
2093e146993eSDag-Erling Smørgrav 		if (m[i].value == val)
2094e146993eSDag-Erling Smørgrav 			return m[i].key;
2095e146993eSDag-Erling Smørgrav 	}
2096d4af9e69SDag-Erling Smørgrav 	return "UNKNOWN";
2097d4af9e69SDag-Erling Smørgrav }
2098e146993eSDag-Erling Smørgrav 
2099e146993eSDag-Erling Smørgrav static const char *
2100e146993eSDag-Erling Smørgrav fmt_intarg(ServerOpCodes code, int val)
2101e146993eSDag-Erling Smørgrav {
2102e146993eSDag-Erling Smørgrav 	if (val == -1)
2103e146993eSDag-Erling Smørgrav 		return "unset";
2104e146993eSDag-Erling Smørgrav 	switch (code) {
2105e146993eSDag-Erling Smørgrav 	case sAddressFamily:
2106e146993eSDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_addressfamily);
2107e146993eSDag-Erling Smørgrav 	case sPermitRootLogin:
2108e146993eSDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_permitrootlogin);
2109e146993eSDag-Erling Smørgrav 	case sGatewayPorts:
2110e146993eSDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_gatewayports);
2111e146993eSDag-Erling Smørgrav 	case sCompression:
2112e146993eSDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_compression);
2113e146993eSDag-Erling Smørgrav 	case sUsePrivilegeSeparation:
2114e146993eSDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_privsep);
21156888a9beSDag-Erling Smørgrav 	case sAllowTcpForwarding:
21166888a9beSDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_tcpfwd);
2117a0ee8cc6SDag-Erling Smørgrav 	case sAllowStreamLocalForwarding:
2118a0ee8cc6SDag-Erling Smørgrav 		return fmt_multistate_int(val, multistate_tcpfwd);
2119bc5531deSDag-Erling Smørgrav 	case sFingerprintHash:
2120bc5531deSDag-Erling Smørgrav 		return ssh_digest_alg_name(val);
2121e146993eSDag-Erling Smørgrav 	case sProtocol:
2122d4af9e69SDag-Erling Smørgrav 		switch (val) {
2123d4af9e69SDag-Erling Smørgrav 		case SSH_PROTO_1:
2124d4af9e69SDag-Erling Smørgrav 			return "1";
2125d4af9e69SDag-Erling Smørgrav 		case SSH_PROTO_2:
2126d4af9e69SDag-Erling Smørgrav 			return "2";
2127d4af9e69SDag-Erling Smørgrav 		case (SSH_PROTO_1|SSH_PROTO_2):
2128d4af9e69SDag-Erling Smørgrav 			return "2,1";
2129d4af9e69SDag-Erling Smørgrav 		default:
2130d4af9e69SDag-Erling Smørgrav 			return "UNKNOWN";
2131d4af9e69SDag-Erling Smørgrav 		}
2132e146993eSDag-Erling Smørgrav 	default:
2133d4af9e69SDag-Erling Smørgrav 		switch (val) {
2134d4af9e69SDag-Erling Smørgrav 		case 0:
2135d4af9e69SDag-Erling Smørgrav 			return "no";
2136d4af9e69SDag-Erling Smørgrav 		case 1:
2137d4af9e69SDag-Erling Smørgrav 			return "yes";
2138e146993eSDag-Erling Smørgrav 		default:
2139d4af9e69SDag-Erling Smørgrav 			return "UNKNOWN";
2140d4af9e69SDag-Erling Smørgrav 		}
2141e146993eSDag-Erling Smørgrav 	}
2142e146993eSDag-Erling Smørgrav }
2143d4af9e69SDag-Erling Smørgrav 
2144d4af9e69SDag-Erling Smørgrav static const char *
2145d4af9e69SDag-Erling Smørgrav lookup_opcode_name(ServerOpCodes code)
2146d4af9e69SDag-Erling Smørgrav {
2147d4af9e69SDag-Erling Smørgrav 	u_int i;
2148d4af9e69SDag-Erling Smørgrav 
2149d4af9e69SDag-Erling Smørgrav 	for (i = 0; keywords[i].name != NULL; i++)
2150d4af9e69SDag-Erling Smørgrav 		if (keywords[i].opcode == code)
2151d4af9e69SDag-Erling Smørgrav 			return(keywords[i].name);
2152d4af9e69SDag-Erling Smørgrav 	return "UNKNOWN";
2153d4af9e69SDag-Erling Smørgrav }
2154d4af9e69SDag-Erling Smørgrav 
2155d4af9e69SDag-Erling Smørgrav static void
2156d4af9e69SDag-Erling Smørgrav dump_cfg_int(ServerOpCodes code, int val)
2157d4af9e69SDag-Erling Smørgrav {
2158d4af9e69SDag-Erling Smørgrav 	printf("%s %d\n", lookup_opcode_name(code), val);
2159d4af9e69SDag-Erling Smørgrav }
2160d4af9e69SDag-Erling Smørgrav 
2161d4af9e69SDag-Erling Smørgrav static void
2162557f75e5SDag-Erling Smørgrav dump_cfg_oct(ServerOpCodes code, int val)
2163557f75e5SDag-Erling Smørgrav {
2164557f75e5SDag-Erling Smørgrav 	printf("%s 0%o\n", lookup_opcode_name(code), val);
2165557f75e5SDag-Erling Smørgrav }
2166557f75e5SDag-Erling Smørgrav 
2167557f75e5SDag-Erling Smørgrav static void
2168d4af9e69SDag-Erling Smørgrav dump_cfg_fmtint(ServerOpCodes code, int val)
2169d4af9e69SDag-Erling Smørgrav {
2170d4af9e69SDag-Erling Smørgrav 	printf("%s %s\n", lookup_opcode_name(code), fmt_intarg(code, val));
2171d4af9e69SDag-Erling Smørgrav }
2172d4af9e69SDag-Erling Smørgrav 
2173d4af9e69SDag-Erling Smørgrav static void
2174d4af9e69SDag-Erling Smørgrav dump_cfg_string(ServerOpCodes code, const char *val)
2175d4af9e69SDag-Erling Smørgrav {
2176d4af9e69SDag-Erling Smørgrav 	if (val == NULL)
2177d4af9e69SDag-Erling Smørgrav 		return;
2178bc5531deSDag-Erling Smørgrav 	printf("%s %s\n", lookup_opcode_name(code),
2179bc5531deSDag-Erling Smørgrav 	    val == NULL ? "none" : val);
2180d4af9e69SDag-Erling Smørgrav }
2181d4af9e69SDag-Erling Smørgrav 
2182d4af9e69SDag-Erling Smørgrav static void
2183d4af9e69SDag-Erling Smørgrav dump_cfg_strarray(ServerOpCodes code, u_int count, char **vals)
2184d4af9e69SDag-Erling Smørgrav {
2185d4af9e69SDag-Erling Smørgrav 	u_int i;
2186d4af9e69SDag-Erling Smørgrav 
2187d4af9e69SDag-Erling Smørgrav 	for (i = 0; i < count; i++)
2188d4af9e69SDag-Erling Smørgrav 		printf("%s %s\n", lookup_opcode_name(code), vals[i]);
2189d4af9e69SDag-Erling Smørgrav }
2190d4af9e69SDag-Erling Smørgrav 
2191e146993eSDag-Erling Smørgrav static void
2192e146993eSDag-Erling Smørgrav dump_cfg_strarray_oneline(ServerOpCodes code, u_int count, char **vals)
2193e146993eSDag-Erling Smørgrav {
2194e146993eSDag-Erling Smørgrav 	u_int i;
2195e146993eSDag-Erling Smørgrav 
2196557f75e5SDag-Erling Smørgrav 	if (count <= 0)
2197557f75e5SDag-Erling Smørgrav 		return;
2198e146993eSDag-Erling Smørgrav 	printf("%s", lookup_opcode_name(code));
2199e146993eSDag-Erling Smørgrav 	for (i = 0; i < count; i++)
2200e146993eSDag-Erling Smørgrav 		printf(" %s",  vals[i]);
2201e146993eSDag-Erling Smørgrav 	printf("\n");
2202e146993eSDag-Erling Smørgrav }
2203e146993eSDag-Erling Smørgrav 
2204d4af9e69SDag-Erling Smørgrav void
2205d4af9e69SDag-Erling Smørgrav dump_config(ServerOptions *o)
2206d4af9e69SDag-Erling Smørgrav {
2207d4af9e69SDag-Erling Smørgrav 	u_int i;
2208d4af9e69SDag-Erling Smørgrav 	int ret;
2209d4af9e69SDag-Erling Smørgrav 	struct addrinfo *ai;
2210d4af9e69SDag-Erling Smørgrav 	char addr[NI_MAXHOST], port[NI_MAXSERV], *s = NULL;
2211557f75e5SDag-Erling Smørgrav 	char *laddr1 = xstrdup(""), *laddr2 = NULL;
2212d4af9e69SDag-Erling Smørgrav 
2213d4af9e69SDag-Erling Smørgrav 	/* these are usually at the top of the config */
2214d4af9e69SDag-Erling Smørgrav 	for (i = 0; i < o->num_ports; i++)
2215d4af9e69SDag-Erling Smørgrav 		printf("port %d\n", o->ports[i]);
2216d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sProtocol, o->protocol);
2217d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sAddressFamily, o->address_family);
2218d4af9e69SDag-Erling Smørgrav 
2219557f75e5SDag-Erling Smørgrav 	/*
2220557f75e5SDag-Erling Smørgrav 	 * ListenAddress must be after Port.  add_one_listen_addr pushes
2221557f75e5SDag-Erling Smørgrav 	 * addresses onto a stack, so to maintain ordering we need to
2222557f75e5SDag-Erling Smørgrav 	 * print these in reverse order.
2223557f75e5SDag-Erling Smørgrav 	 */
2224d4af9e69SDag-Erling Smørgrav 	for (ai = o->listen_addrs; ai; ai = ai->ai_next) {
2225d4af9e69SDag-Erling Smørgrav 		if ((ret = getnameinfo(ai->ai_addr, ai->ai_addrlen, addr,
2226d4af9e69SDag-Erling Smørgrav 		    sizeof(addr), port, sizeof(port),
2227d4af9e69SDag-Erling Smørgrav 		    NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
2228d4af9e69SDag-Erling Smørgrav 			error("getnameinfo failed: %.100s",
2229d4af9e69SDag-Erling Smørgrav 			    (ret != EAI_SYSTEM) ? gai_strerror(ret) :
2230d4af9e69SDag-Erling Smørgrav 			    strerror(errno));
2231d4af9e69SDag-Erling Smørgrav 		} else {
2232557f75e5SDag-Erling Smørgrav 			laddr2 = laddr1;
2233d4af9e69SDag-Erling Smørgrav 			if (ai->ai_family == AF_INET6)
2234557f75e5SDag-Erling Smørgrav 				xasprintf(&laddr1, "listenaddress [%s]:%s\n%s",
2235557f75e5SDag-Erling Smørgrav 				    addr, port, laddr2);
2236d4af9e69SDag-Erling Smørgrav 			else
2237557f75e5SDag-Erling Smørgrav 				xasprintf(&laddr1, "listenaddress %s:%s\n%s",
2238557f75e5SDag-Erling Smørgrav 				    addr, port, laddr2);
2239557f75e5SDag-Erling Smørgrav 			free(laddr2);
2240d4af9e69SDag-Erling Smørgrav 		}
2241d4af9e69SDag-Erling Smørgrav 	}
2242557f75e5SDag-Erling Smørgrav 	printf("%s", laddr1);
2243557f75e5SDag-Erling Smørgrav 	free(laddr1);
2244d4af9e69SDag-Erling Smørgrav 
2245d4af9e69SDag-Erling Smørgrav 	/* integer arguments */
2246cce7d346SDag-Erling Smørgrav #ifdef USE_PAM
2247557f75e5SDag-Erling Smørgrav 	dump_cfg_fmtint(sUsePAM, o->use_pam);
2248cce7d346SDag-Erling Smørgrav #endif
2249d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sServerKeyBits, o->server_key_bits);
2250d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sLoginGraceTime, o->login_grace_time);
2251d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sKeyRegenerationTime, o->key_regeneration_time);
2252d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sX11DisplayOffset, o->x11_display_offset);
2253d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sMaxAuthTries, o->max_authtries);
2254cce7d346SDag-Erling Smørgrav 	dump_cfg_int(sMaxSessions, o->max_sessions);
2255d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sClientAliveInterval, o->client_alive_interval);
2256d4af9e69SDag-Erling Smørgrav 	dump_cfg_int(sClientAliveCountMax, o->client_alive_count_max);
2257557f75e5SDag-Erling Smørgrav 	dump_cfg_oct(sStreamLocalBindMask, o->fwd_opts.streamlocal_bind_mask);
2258d4af9e69SDag-Erling Smørgrav 
2259d4af9e69SDag-Erling Smørgrav 	/* formatted integer arguments */
2260d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sPermitRootLogin, o->permit_root_login);
2261d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sIgnoreRhosts, o->ignore_rhosts);
2262d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sIgnoreUserKnownHosts, o->ignore_user_known_hosts);
2263d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sRhostsRSAAuthentication, o->rhosts_rsa_authentication);
2264d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sHostbasedAuthentication, o->hostbased_authentication);
2265d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sHostbasedUsesNameFromPacketOnly,
2266d4af9e69SDag-Erling Smørgrav 	    o->hostbased_uses_name_from_packet_only);
2267d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sRSAAuthentication, o->rsa_authentication);
2268d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sPubkeyAuthentication, o->pubkey_authentication);
2269cce7d346SDag-Erling Smørgrav #ifdef KRB5
2270d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sKerberosAuthentication, o->kerberos_authentication);
2271d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sKerberosOrLocalPasswd, o->kerberos_or_local_passwd);
2272d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sKerberosTicketCleanup, o->kerberos_ticket_cleanup);
2273cce7d346SDag-Erling Smørgrav # ifdef USE_AFS
2274d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sKerberosGetAFSToken, o->kerberos_get_afs_token);
2275cce7d346SDag-Erling Smørgrav # endif
2276cce7d346SDag-Erling Smørgrav #endif
2277cce7d346SDag-Erling Smørgrav #ifdef GSSAPI
2278d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sGssAuthentication, o->gss_authentication);
2279d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sGssCleanupCreds, o->gss_cleanup_creds);
2280cce7d346SDag-Erling Smørgrav #endif
2281d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sPasswordAuthentication, o->password_authentication);
2282d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sKbdInteractiveAuthentication,
2283d4af9e69SDag-Erling Smørgrav 	    o->kbd_interactive_authentication);
2284d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sChallengeResponseAuthentication,
2285d4af9e69SDag-Erling Smørgrav 	    o->challenge_response_authentication);
2286d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sPrintMotd, o->print_motd);
2287acc1a9efSDag-Erling Smørgrav #ifndef DISABLE_LASTLOG
2288d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sPrintLastLog, o->print_lastlog);
2289acc1a9efSDag-Erling Smørgrav #endif
2290d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sX11Forwarding, o->x11_forwarding);
2291d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sX11UseLocalhost, o->x11_use_localhost);
2292f7167e0eSDag-Erling Smørgrav 	dump_cfg_fmtint(sPermitTTY, o->permit_tty);
2293a0ee8cc6SDag-Erling Smørgrav 	dump_cfg_fmtint(sPermitUserRC, o->permit_user_rc);
2294d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sStrictModes, o->strict_modes);
2295d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sTCPKeepAlive, o->tcp_keep_alive);
2296d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sEmptyPasswd, o->permit_empty_passwd);
2297d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env);
2298d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sUseLogin, o->use_login);
2299d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sCompression, o->compression);
2300a0ee8cc6SDag-Erling Smørgrav 	dump_cfg_fmtint(sGatewayPorts, o->fwd_opts.gateway_ports);
2301d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sUseDNS, o->use_dns);
2302d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sAllowTcpForwarding, o->allow_tcp_forwarding);
2303557f75e5SDag-Erling Smørgrav 	dump_cfg_fmtint(sAllowAgentForwarding, o->allow_agent_forwarding);
2304a0ee8cc6SDag-Erling Smørgrav 	dump_cfg_fmtint(sAllowStreamLocalForwarding, o->allow_streamlocal_forwarding);
2305d4af9e69SDag-Erling Smørgrav 	dump_cfg_fmtint(sUsePrivilegeSeparation, use_privsep);
2306bc5531deSDag-Erling Smørgrav 	dump_cfg_fmtint(sFingerprintHash, o->fingerprint_hash);
2307d4af9e69SDag-Erling Smørgrav 
2308d4af9e69SDag-Erling Smørgrav 	/* string arguments */
2309d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sPidFile, o->pid_file);
2310d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sXAuthLocation, o->xauth_location);
2311bc5531deSDag-Erling Smørgrav 	dump_cfg_string(sCiphers, o->ciphers ? o->ciphers : KEX_SERVER_ENCRYPT);
2312bc5531deSDag-Erling Smørgrav 	dump_cfg_string(sMacs, o->macs ? o->macs : KEX_SERVER_MAC);
2313d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sBanner, o->banner);
2314d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sForceCommand, o->adm_forced_command);
2315b15c8340SDag-Erling Smørgrav 	dump_cfg_string(sChrootDirectory, o->chroot_directory);
2316b15c8340SDag-Erling Smørgrav 	dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys);
2317b15c8340SDag-Erling Smørgrav 	dump_cfg_string(sRevokedKeys, o->revoked_keys_file);
2318e2f6069cSDag-Erling Smørgrav 	dump_cfg_string(sAuthorizedPrincipalsFile,
2319e2f6069cSDag-Erling Smørgrav 	    o->authorized_principals_file);
2320557f75e5SDag-Erling Smørgrav 	dump_cfg_string(sVersionAddendum, *o->version_addendum == '\0'
2321557f75e5SDag-Erling Smørgrav 	    ? "none" : o->version_addendum);
23226888a9beSDag-Erling Smørgrav 	dump_cfg_string(sAuthorizedKeysCommand, o->authorized_keys_command);
23236888a9beSDag-Erling Smørgrav 	dump_cfg_string(sAuthorizedKeysCommandUser, o->authorized_keys_command_user);
2324557f75e5SDag-Erling Smørgrav 	dump_cfg_string(sAuthorizedPrincipalsCommand, o->authorized_principals_command);
2325557f75e5SDag-Erling Smørgrav 	dump_cfg_string(sAuthorizedPrincipalsCommandUser, o->authorized_principals_command_user);
2326e4a9863fSDag-Erling Smørgrav 	dump_cfg_string(sHostKeyAgent, o->host_key_agent);
2327bc5531deSDag-Erling Smørgrav 	dump_cfg_string(sKexAlgorithms,
2328bc5531deSDag-Erling Smørgrav 	    o->kex_algorithms ? o->kex_algorithms : KEX_SERVER_KEX);
2329bc5531deSDag-Erling Smørgrav 	dump_cfg_string(sHostbasedAcceptedKeyTypes, o->hostbased_key_types ?
2330bc5531deSDag-Erling Smørgrav 	    o->hostbased_key_types : KEX_DEFAULT_PK_ALG);
2331eccfee6eSDag-Erling Smørgrav 	dump_cfg_string(sHostKeyAlgorithms, o->hostkeyalgorithms ?
2332eccfee6eSDag-Erling Smørgrav 	    o->hostkeyalgorithms : KEX_DEFAULT_PK_ALG);
2333bc5531deSDag-Erling Smørgrav 	dump_cfg_string(sPubkeyAcceptedKeyTypes, o->pubkey_key_types ?
2334bc5531deSDag-Erling Smørgrav 	    o->pubkey_key_types : KEX_DEFAULT_PK_ALG);
2335d4af9e69SDag-Erling Smørgrav 
2336d4af9e69SDag-Erling Smørgrav 	/* string arguments requiring a lookup */
2337d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sLogLevel, log_level_name(o->log_level));
2338d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sLogFacility, log_facility_name(o->log_facility));
2339d4af9e69SDag-Erling Smørgrav 
2340d4af9e69SDag-Erling Smørgrav 	/* string array arguments */
2341e146993eSDag-Erling Smørgrav 	dump_cfg_strarray_oneline(sAuthorizedKeysFile, o->num_authkeys_files,
2342e146993eSDag-Erling Smørgrav 	    o->authorized_keys_files);
2343d4af9e69SDag-Erling Smørgrav 	dump_cfg_strarray(sHostKeyFile, o->num_host_key_files,
2344d4af9e69SDag-Erling Smørgrav 	     o->host_key_files);
2345557f75e5SDag-Erling Smørgrav 	dump_cfg_strarray(sHostCertificate, o->num_host_cert_files,
2346b15c8340SDag-Erling Smørgrav 	     o->host_cert_files);
2347d4af9e69SDag-Erling Smørgrav 	dump_cfg_strarray(sAllowUsers, o->num_allow_users, o->allow_users);
2348d4af9e69SDag-Erling Smørgrav 	dump_cfg_strarray(sDenyUsers, o->num_deny_users, o->deny_users);
2349d4af9e69SDag-Erling Smørgrav 	dump_cfg_strarray(sAllowGroups, o->num_allow_groups, o->allow_groups);
2350d4af9e69SDag-Erling Smørgrav 	dump_cfg_strarray(sDenyGroups, o->num_deny_groups, o->deny_groups);
2351d4af9e69SDag-Erling Smørgrav 	dump_cfg_strarray(sAcceptEnv, o->num_accept_env, o->accept_env);
23526888a9beSDag-Erling Smørgrav 	dump_cfg_strarray_oneline(sAuthenticationMethods,
23536888a9beSDag-Erling Smørgrav 	    o->num_auth_methods, o->auth_methods);
2354d4af9e69SDag-Erling Smørgrav 
2355d4af9e69SDag-Erling Smørgrav 	/* other arguments */
2356d4af9e69SDag-Erling Smørgrav 	for (i = 0; i < o->num_subsystems; i++)
2357d4af9e69SDag-Erling Smørgrav 		printf("subsystem %s %s\n", o->subsystem_name[i],
2358d4af9e69SDag-Erling Smørgrav 		    o->subsystem_args[i]);
2359d4af9e69SDag-Erling Smørgrav 
2360d4af9e69SDag-Erling Smørgrav 	printf("maxstartups %d:%d:%d\n", o->max_startups_begin,
2361d4af9e69SDag-Erling Smørgrav 	    o->max_startups_rate, o->max_startups);
2362d4af9e69SDag-Erling Smørgrav 
2363d4af9e69SDag-Erling Smørgrav 	for (i = 0; tunmode_desc[i].val != -1; i++)
2364d4af9e69SDag-Erling Smørgrav 		if (tunmode_desc[i].val == o->permit_tun) {
2365d4af9e69SDag-Erling Smørgrav 			s = tunmode_desc[i].text;
2366d4af9e69SDag-Erling Smørgrav 			break;
2367d4af9e69SDag-Erling Smørgrav 		}
2368d4af9e69SDag-Erling Smørgrav 	dump_cfg_string(sPermitTunnel, s);
2369d4af9e69SDag-Erling Smørgrav 
2370e146993eSDag-Erling Smørgrav 	printf("ipqos %s ", iptos2str(o->ip_qos_interactive));
2371e146993eSDag-Erling Smørgrav 	printf("%s\n", iptos2str(o->ip_qos_bulk));
23724a421b63SDag-Erling Smørgrav 
2373acc1a9efSDag-Erling Smørgrav 	printf("rekeylimit %llu %d\n", (unsigned long long)o->rekey_limit,
2374e4a9863fSDag-Erling Smørgrav 	    o->rekey_interval);
2375e4a9863fSDag-Erling Smørgrav 
2376d4af9e69SDag-Erling Smørgrav 	channel_print_adm_permitted_opens();
2377d4af9e69SDag-Erling Smørgrav }
2378