xref: /titanic_50/usr/src/cmd/ssh/libssh/common/readconf.c (revision abc79d9dd51e98eafb6fc25b4a0b4f66bef40b00)
1 /*
2  * Author: Tatu Ylonen <ylo@cs.hut.fi>
3  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4  *                    All rights reserved
5  * Functions for reading the configuration files.
6  *
7  * As far as I am concerned, the code I have written for this software
8  * can be used freely for any purpose.  Any derived versions of this
9  * software must be clearly marked as such, and if the derived work is
10  * incompatible with the protocol description in the RFC file, it must be
11  * called by a name other than "ssh" or "Secure Shell".
12  */
13 /*
14  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
15  * Use is subject to license terms.
16  * Copyright 2013 Joyent, Inc.  All rights reserved.
17  */
18 
19 #include "includes.h"
20 RCSID("$OpenBSD: readconf.c,v 1.100 2002/06/19 00:27:55 deraadt Exp $");
21 
22 #include "ssh.h"
23 #include "xmalloc.h"
24 #include "compat.h"
25 #include "cipher.h"
26 #include "pathnames.h"
27 #include "log.h"
28 #include "readconf.h"
29 #include "match.h"
30 #include "misc.h"
31 #include "kex.h"
32 #include "mac.h"
33 
34 /* Format of the configuration file:
35 
36    # Configuration data is parsed as follows:
37    #  1. command line options
38    #  2. user-specific file
39    #  3. system-wide file
40    # Any configuration value is only changed the first time it is set.
41    # Thus, host-specific definitions should be at the beginning of the
42    # configuration file, and defaults at the end.
43 
44    # Host-specific declarations.  These may override anything above.  A single
45    # host may match multiple declarations; these are processed in the order
46    # that they are given in.
47 
48    Host *.ngs.fi ngs.fi
49      User foo
50 
51    Host fake.com
52      HostName another.host.name.real.org
53      User blaah
54      Port 34289
55      ForwardX11 no
56      ForwardAgent no
57 
58    Host books.com
59      RemoteForward 9999 shadows.cs.hut.fi:9999
60      Cipher 3des
61 
62    Host fascist.blob.com
63      Port 23123
64      User tylonen
65      RhostsAuthentication no
66      PasswordAuthentication no
67 
68    Host puukko.hut.fi
69      User t35124p
70      ProxyCommand ssh-proxy %h %p
71 
72    Host *.fr
73      PublicKeyAuthentication no
74 
75    Host *.su
76      Cipher none
77      PasswordAuthentication no
78 
79    # Defaults for various options
80    Host *
81      ForwardAgent no
82      ForwardX11 no
83      RhostsAuthentication yes
84      PasswordAuthentication yes
85      RSAAuthentication yes
86      RhostsRSAAuthentication yes
87      StrictHostKeyChecking yes
88      KeepAlives no
89      IdentityFile ~/.ssh/identity
90      Port 22
91      EscapeChar ~
92 
93 */
94 
95 /* Keyword tokens. */
96 
97 typedef enum {
98 	oBadOption,
99 	oForwardAgent, oForwardX11, oForwardX11Trusted, oGatewayPorts,
100 	oRhostsAuthentication,
101 	oPasswordAuthentication, oRSAAuthentication,
102 	oChallengeResponseAuthentication, oXAuthLocation,
103 #if defined(KRB4) || defined(KRB5)
104 	oKerberosAuthentication,
105 #endif
106 #ifdef GSSAPI
107 	oGssKeyEx, oGssAuthentication, oGssDelegateCreds,
108 #ifdef GSI
109 	oGssGlobusDelegateLimitedCreds,
110 #endif /* GSI */
111 #endif /* GSSAPI */
112 #if defined(AFS) || defined(KRB5)
113 	oKerberosTgtPassing,
114 #endif
115 #ifdef AFS
116 	oAFSTokenPassing,
117 #endif
118 	oIdentityFile, oHostName, oPort, oCipher, oRemoteForward, oLocalForward,
119 	oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand,
120 	oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
121 	oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
122 	oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts,
123 	oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs,
124 	oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication,
125 	oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
126 	oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication,
127 	oHostKeyAlgorithms, oBindAddress, oSmartcardDevice,
128 	oClearAllForwardings, oNoHostAuthenticationForLocalhost,
129 	oFallBackToRsh, oUseRsh, oConnectTimeout, oHashKnownHosts,
130 	oServerAliveInterval, oServerAliveCountMax, oDisableBanner,
131 	oIgnoreIfUnknown, oRekeyLimit, oUseOpenSSLEngine,
132 	oDeprecated
133 } OpCodes;
134 
135 /* Textual representations of the tokens. */
136 
137 static struct {
138 	const char *name;
139 	OpCodes opcode;
140 } keywords[] = {
141 	{ "forwardagent", oForwardAgent },
142 	{ "forwardx11", oForwardX11 },
143 	{ "forwardx11trusted", oForwardX11Trusted },
144 	{ "xauthlocation", oXAuthLocation },
145 	{ "gatewayports", oGatewayPorts },
146 	{ "useprivilegedport", oUsePrivilegedPort },
147 	{ "rhostsauthentication", oRhostsAuthentication },
148 	{ "passwordauthentication", oPasswordAuthentication },
149 	{ "kbdinteractiveauthentication", oKbdInteractiveAuthentication },
150 	{ "kbdinteractivedevices", oKbdInteractiveDevices },
151 	{ "rsaauthentication", oRSAAuthentication },
152 	{ "pubkeyauthentication", oPubkeyAuthentication },
153 	{ "dsaauthentication", oPubkeyAuthentication },		    /* alias */
154 	{ "rhostsrsaauthentication", oRhostsRSAAuthentication },
155 	{ "hostbasedauthentication", oHostbasedAuthentication },
156 	{ "challengeresponseauthentication", oChallengeResponseAuthentication },
157 	{ "skeyauthentication", oChallengeResponseAuthentication }, /* alias */
158 	{ "tisauthentication", oChallengeResponseAuthentication },  /* alias */
159 #if defined(KRB4) || defined(KRB5)
160 	{ "kerberosauthentication", oKerberosAuthentication },
161 #endif
162 #ifdef GSSAPI
163 	{ "gssapikeyexchange", oGssKeyEx },
164 	{ "gssapiauthentication", oGssAuthentication },
165 	{ "gssapidelegatecredentials", oGssDelegateCreds },
166 	{ "gsskeyex", oGssKeyEx },				/* alias */
167 	{ "gssauthentication", oGssAuthentication },		/* alias */
168 	{ "gssdelegatecreds", oGssDelegateCreds },		/* alias */
169 #ifdef GSI
170 	/* For backwards compatability with old 1.2.27 client code */
171 	{ "forwardgssapiglobusproxy", oGssDelegateCreds }, /* alias */
172 	{ "forwardgssapiglobuslimitedproxy", oGssGlobusDelegateLimitedCreds },
173 #endif /* GSI */
174 #endif /* GSSAPI */
175 #if defined(AFS) || defined(KRB5)
176 	{ "kerberostgtpassing", oKerberosTgtPassing },
177 #endif
178 #ifdef AFS
179 	{ "afstokenpassing", oAFSTokenPassing },
180 #endif
181 	{ "fallbacktorsh", oFallBackToRsh },
182 	{ "usersh", oUseRsh },
183 	{ "identityfile", oIdentityFile },
184 	{ "identityfile2", oIdentityFile },			/* alias */
185 	{ "hostname", oHostName },
186 	{ "hostkeyalias", oHostKeyAlias },
187 	{ "proxycommand", oProxyCommand },
188 	{ "port", oPort },
189 	{ "cipher", oCipher },
190 	{ "ciphers", oCiphers },
191 	{ "macs", oMacs },
192 	{ "protocol", oProtocol },
193 	{ "remoteforward", oRemoteForward },
194 	{ "localforward", oLocalForward },
195 	{ "user", oUser },
196 	{ "host", oHost },
197 	{ "escapechar", oEscapeChar },
198 	{ "globalknownhostsfile", oGlobalKnownHostsFile },
199 	{ "userknownhostsfile", oUserKnownHostsFile },		/* obsolete */
200 	{ "globalknownhostsfile2", oGlobalKnownHostsFile2 },
201 	{ "userknownhostsfile2", oUserKnownHostsFile2 },	/* obsolete */
202 	{ "connectionattempts", oConnectionAttempts },
203 	{ "batchmode", oBatchMode },
204 	{ "checkhostip", oCheckHostIP },
205 	{ "stricthostkeychecking", oStrictHostKeyChecking },
206 	{ "compression", oCompression },
207 	{ "compressionlevel", oCompressionLevel },
208 	{ "tcpkeepalive", oKeepAlives },
209 	{ "keepalive", oKeepAlives },				/* obsolete */
210 	{ "numberofpasswordprompts", oNumberOfPasswordPrompts },
211 	{ "loglevel", oLogLevel },
212 	{ "dynamicforward", oDynamicForward },
213 	{ "preferredauthentications", oPreferredAuthentications },
214 	{ "hostkeyalgorithms", oHostKeyAlgorithms },
215 	{ "bindaddress", oBindAddress },
216 	{ "smartcarddevice", oSmartcardDevice },
217 	{ "clearallforwardings", oClearAllForwardings },
218 	{ "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost },
219 	{ "rekeylimit", oRekeyLimit },
220 	{ "connecttimeout", oConnectTimeout },
221 	{ "serveraliveinterval", oServerAliveInterval },
222 	{ "serveralivecountmax", oServerAliveCountMax },
223 	{ "disablebanner", oDisableBanner },
224 	{ "hashknownhosts", oHashKnownHosts },
225 	{ "ignoreifunknown", oIgnoreIfUnknown },
226 	{ "useopensslengine", oUseOpenSSLEngine },
227 	{ NULL, oBadOption }
228 };
229 
230 /*
231  * Adds a local TCP/IP port forward to options.  Never returns if there is an
232  * error.
233  */
234 
235 void
236 add_local_forward(Options *options, const Forward *newfwd)
237 {
238 	Forward *fwd;
239 #ifndef NO_IPPORT_RESERVED_CONCEPT
240 	extern uid_t original_real_uid;
241 	if (newfwd->listen_port < IPPORT_RESERVED && original_real_uid != 0)
242 		fatal("Privileged ports can only be forwarded by root.");
243 #endif
244 	if (options->num_local_forwards >= SSH_MAX_FORWARDS_PER_DIRECTION)
245 		fatal("Too many local forwards (max %d).", SSH_MAX_FORWARDS_PER_DIRECTION);
246 	fwd = &options->local_forwards[options->num_local_forwards++];
247 
248 	fwd->listen_host = (newfwd->listen_host == NULL) ?
249 	    NULL : xstrdup(newfwd->listen_host);
250 	fwd->listen_port = newfwd->listen_port;
251 	fwd->connect_host = xstrdup(newfwd->connect_host);
252 	fwd->connect_port = newfwd->connect_port;
253 }
254 
255 /*
256  * Adds a remote TCP/IP port forward to options.  Never returns if there is
257  * an error.
258  */
259 
260 void
261 add_remote_forward(Options *options, const Forward *newfwd)
262 {
263 	Forward *fwd;
264 	if (options->num_remote_forwards >= SSH_MAX_FORWARDS_PER_DIRECTION)
265 		fatal("Too many remote forwards (max %d).",
266 		    SSH_MAX_FORWARDS_PER_DIRECTION);
267 	fwd = &options->remote_forwards[options->num_remote_forwards++];
268 
269 	fwd->listen_host = (newfwd->listen_host == NULL) ?
270 	    NULL : xstrdup(newfwd->listen_host);
271 	fwd->listen_port = newfwd->listen_port;
272 	fwd->connect_host = xstrdup(newfwd->connect_host);
273 	fwd->connect_port = newfwd->connect_port;
274 }
275 
276 static void
277 clear_forwardings(Options *options)
278 {
279 	int i;
280 
281 	for (i = 0; i < options->num_local_forwards; i++) {
282 		if (options->local_forwards[i].listen_host != NULL)
283 			xfree(options->local_forwards[i].listen_host);
284 		xfree(options->local_forwards[i].connect_host);
285 	}
286 	options->num_local_forwards = 0;
287 	for (i = 0; i < options->num_remote_forwards; i++) {
288 		if (options->remote_forwards[i].listen_host != NULL)
289 			xfree(options->remote_forwards[i].listen_host);
290 		xfree(options->remote_forwards[i].connect_host);
291 	}
292 	options->num_remote_forwards = 0;
293 }
294 
295 /*
296  * Returns the number of the token pointed to by cp or oBadOption.
297  */
298 
299 static OpCodes
300 parse_token(const char *cp, const char *filename, int linenum)
301 {
302 	u_int i;
303 
304 	for (i = 0; keywords[i].name; i++)
305 		if (strcasecmp(cp, keywords[i].name) == 0)
306 			return keywords[i].opcode;
307 
308 	debug("%s: line %d: unknown configuration option: %s",
309 	    filename, linenum, cp);
310 	return oBadOption;
311 }
312 
313 /*
314  * Processes a single option line as used in the configuration files. This
315  * only sets those values that have not already been set.
316  */
317 
318 int
319 process_config_line(Options *options, const char *host,
320 		    char *line, const char *filename, int linenum,
321 		    int *activep)
322 {
323 	char *s, *string, **charptr, *endofnumber, *keyword, *arg, *arg2, fwdarg[256];
324 	int opcode, *intptr, value, scale, i;
325 	long long orig, val64;
326 	StoredOption *so;
327 	Forward fwd;
328 
329 	s = line;
330 	/* Get the keyword. (Each line is supposed to begin with a keyword). */
331 	keyword = strdelim(&s);
332 	/* Ignore leading whitespace. */
333 	if (*keyword == '\0')
334 		keyword = strdelim(&s);
335 	if (keyword == NULL || !*keyword || *keyword == '\n' || *keyword == '#')
336 		return 0;
337 
338 	opcode = parse_token(keyword, filename, linenum);
339 
340 	switch (opcode) {
341 	case oBadOption:
342 		if (options->unknown_opts_num == MAX_UNKNOWN_OPTIONS) {
343 			error("we can't have more than %d unknown options:",
344 			    MAX_UNKNOWN_OPTIONS);
345 			for (i = 0; i < MAX_UNKNOWN_OPTIONS; ++i) {
346 				so = &options->unknown_opts[i];
347 				error("%s:%d:%s",
348 				    so->filename, so->linenum, so->keyword);
349 				xfree(so->keyword);
350 				xfree(so->filename);
351 			}
352 			fatal("too many unknown options found, can't continue");
353 		}
354 
355 		/* unknown options will be processed later */
356 		so = &options->unknown_opts[options->unknown_opts_num];
357 		so->keyword = xstrdup(keyword);
358 		so->filename = xstrdup(filename);
359 		so->linenum = linenum;
360 		options->unknown_opts_num++;
361 		return (0);
362 
363 		/* NOTREACHED */
364 	case oConnectTimeout:
365 		intptr = &options->connection_timeout;
366 parse_time:
367 		arg = strdelim(&s);
368 		if (!arg || *arg == '\0')
369 			fatal("%s line %d: missing time value.",
370 			    filename, linenum);
371 		if ((value = convtime(arg)) == -1)
372 			fatal("%s line %d: invalid time value.",
373 			    filename, linenum);
374 		if (*activep && *intptr == -1)
375 			*intptr = value;
376 		break;
377 
378 	case oForwardAgent:
379 		intptr = &options->forward_agent;
380 parse_flag:
381 		arg = strdelim(&s);
382 		if (!arg || *arg == '\0')
383 			fatal("%.200s line %d: Missing yes/no argument.", filename, linenum);
384 		value = 0;	/* To avoid compiler warning... */
385 		if (strcmp(arg, "yes") == 0 || strcmp(arg, "true") == 0)
386 			value = 1;
387 		else if (strcmp(arg, "no") == 0 || strcmp(arg, "false") == 0)
388 			value = 0;
389 		else
390 			fatal("%.200s line %d: Bad yes/no argument.", filename, linenum);
391 		if (*activep && *intptr == -1)
392 			*intptr = value;
393 		break;
394 
395 	case oForwardX11:
396 		intptr = &options->forward_x11;
397 		goto parse_flag;
398 
399 	case oForwardX11Trusted:
400 		intptr = &options->forward_x11_trusted;
401 		goto parse_flag;
402 
403 	case oGatewayPorts:
404 		intptr = &options->gateway_ports;
405 		goto parse_flag;
406 
407 	case oUsePrivilegedPort:
408 		intptr = &options->use_privileged_port;
409 		goto parse_flag;
410 
411 	case oRhostsAuthentication:
412 		intptr = &options->rhosts_authentication;
413 		goto parse_flag;
414 
415 	case oPasswordAuthentication:
416 		intptr = &options->password_authentication;
417 		goto parse_flag;
418 
419 	case oKbdInteractiveAuthentication:
420 		intptr = &options->kbd_interactive_authentication;
421 		goto parse_flag;
422 
423 	case oKbdInteractiveDevices:
424 		charptr = &options->kbd_interactive_devices;
425 		goto parse_string;
426 
427 	case oPubkeyAuthentication:
428 		intptr = &options->pubkey_authentication;
429 		goto parse_flag;
430 
431 	case oRSAAuthentication:
432 		intptr = &options->rsa_authentication;
433 		goto parse_flag;
434 
435 	case oRhostsRSAAuthentication:
436 		intptr = &options->rhosts_rsa_authentication;
437 		goto parse_flag;
438 
439 	case oHostbasedAuthentication:
440 		intptr = &options->hostbased_authentication;
441 		goto parse_flag;
442 
443 	case oChallengeResponseAuthentication:
444 		intptr = &options->challenge_response_authentication;
445 		goto parse_flag;
446 #if defined(KRB4) || defined(KRB5)
447 	case oKerberosAuthentication:
448 		intptr = &options->kerberos_authentication;
449 		goto parse_flag;
450 #endif
451 #ifdef GSSAPI
452 	case oGssKeyEx:
453 		intptr = &options->gss_keyex;
454 		goto parse_flag;
455 
456 	case oGssAuthentication:
457 		intptr = &options->gss_authentication;
458 		goto parse_flag;
459 
460 	case oGssDelegateCreds:
461 		intptr = &options->gss_deleg_creds;
462 		goto parse_flag;
463 
464 #ifdef GSI
465 	case oGssGlobusDelegateLimitedCreds:
466 		intptr = &options->gss_globus_deleg_limited_proxy;
467 		goto parse_flag;
468 #endif /* GSI */
469 
470 #endif /* GSSAPI */
471 
472 #if defined(AFS) || defined(KRB5)
473 	case oKerberosTgtPassing:
474 		intptr = &options->kerberos_tgt_passing;
475 		goto parse_flag;
476 #endif
477 #ifdef AFS
478 	case oAFSTokenPassing:
479 		intptr = &options->afs_token_passing;
480 		goto parse_flag;
481 #endif
482 	case oFallBackToRsh:
483 		intptr = &options->fallback_to_rsh;
484 		goto parse_flag;
485 
486 	case oUseRsh:
487 		intptr = &options->use_rsh;
488 		goto parse_flag;
489 
490 	case oBatchMode:
491 		intptr = &options->batch_mode;
492 		goto parse_flag;
493 
494 	case oCheckHostIP:
495 		intptr = &options->check_host_ip;
496 		goto parse_flag;
497 
498 	case oStrictHostKeyChecking:
499 		intptr = &options->strict_host_key_checking;
500 		arg = strdelim(&s);
501 		if (!arg || *arg == '\0')
502 			fatal("%.200s line %d: Missing yes/no/ask argument.",
503 			    filename, linenum);
504 		value = 0;	/* To avoid compiler warning... */
505 		if (strcmp(arg, "yes") == 0 || strcmp(arg, "true") == 0)
506 			value = 1;
507 		else if (strcmp(arg, "no") == 0 || strcmp(arg, "false") == 0)
508 			value = 0;
509 		else if (strcmp(arg, "ask") == 0)
510 			value = 2;
511 		else
512 			fatal("%.200s line %d: Bad yes/no/ask argument.", filename, linenum);
513 		if (*activep && *intptr == -1)
514 			*intptr = value;
515 		break;
516 
517 	case oCompression:
518 		intptr = &options->compression;
519 		goto parse_flag;
520 
521 	case oKeepAlives:
522 		intptr = &options->keepalives;
523 		goto parse_flag;
524 
525 	case oNoHostAuthenticationForLocalhost:
526 		intptr = &options->no_host_authentication_for_localhost;
527 		goto parse_flag;
528 
529 	case oNumberOfPasswordPrompts:
530 		intptr = &options->number_of_password_prompts;
531 		goto parse_int;
532 
533 	case oCompressionLevel:
534 		intptr = &options->compression_level;
535 		goto parse_int;
536 
537 	case oRekeyLimit:
538 		arg = strdelim(&s);
539 		if (!arg || *arg == '\0')
540 			fatal("%.200s line %d: Missing argument.", filename, linenum);
541 		if (arg[0] < '0' || arg[0] > '9')
542 			fatal("%.200s line %d: Bad number.", filename, linenum);
543 		orig = val64 = strtoll(arg, &endofnumber, 10);
544 		if (arg == endofnumber)
545 			fatal("%.200s line %d: Bad number.", filename, linenum);
546 		switch (toupper(*endofnumber)) {
547 		case '\0':
548 			scale = 1;
549 			break;
550 		case 'K':
551 			scale = 1<<10;
552 			break;
553 		case 'M':
554 			scale = 1<<20;
555 			break;
556 		case 'G':
557 			scale = 1<<30;
558 			break;
559 		default:
560 			fatal("%.200s line %d: Invalid RekeyLimit suffix",
561 			    filename, linenum);
562 		}
563 		val64 *= scale;
564 		/* detect integer wrap and too-large limits */
565 		if ((val64 / scale) != orig || val64 > UINT_MAX)
566 			fatal("%.200s line %d: RekeyLimit too large",
567 			    filename, linenum);
568 		if (val64 < 16)
569 			fatal("%.200s line %d: RekeyLimit too small",
570 			    filename, linenum);
571 		if (*activep && options->rekey_limit == -1)
572 			options->rekey_limit = (u_int32_t)val64;
573 		break;
574 
575 	case oIdentityFile:
576 		arg = strdelim(&s);
577 		if (!arg || *arg == '\0')
578 			fatal("%.200s line %d: Missing argument.", filename, linenum);
579 		if (*activep) {
580 			intptr = &options->num_identity_files;
581 			if (*intptr >= SSH_MAX_IDENTITY_FILES)
582 				fatal("%.200s line %d: Too many identity files specified (max %d).",
583 				    filename, linenum, SSH_MAX_IDENTITY_FILES);
584 			charptr =  &options->identity_files[*intptr];
585 			*charptr = xstrdup(arg);
586 			*intptr = *intptr + 1;
587 		}
588 		break;
589 
590 	case oXAuthLocation:
591 		charptr=&options->xauth_location;
592 		goto parse_string;
593 
594 	case oUser:
595 		charptr = &options->user;
596 parse_string:
597 		arg = strdelim(&s);
598 		if (!arg || *arg == '\0')
599 			fatal("%.200s line %d: Missing argument.", filename, linenum);
600 		if (*activep && *charptr == NULL)
601 			*charptr = xstrdup(arg);
602 		break;
603 
604 	case oGlobalKnownHostsFile:
605 		charptr = &options->system_hostfile;
606 		goto parse_string;
607 
608 	case oUserKnownHostsFile:
609 		charptr = &options->user_hostfile;
610 		goto parse_string;
611 
612 	case oGlobalKnownHostsFile2:
613 		charptr = &options->system_hostfile2;
614 		goto parse_string;
615 
616 	case oUserKnownHostsFile2:
617 		charptr = &options->user_hostfile2;
618 		goto parse_string;
619 
620 	case oHostName:
621 		charptr = &options->hostname;
622 		goto parse_string;
623 
624 	case oHostKeyAlias:
625 		charptr = &options->host_key_alias;
626 		goto parse_string;
627 
628 	case oPreferredAuthentications:
629 		charptr = &options->preferred_authentications;
630 		goto parse_string;
631 
632 	case oBindAddress:
633 		charptr = &options->bind_address;
634 		goto parse_string;
635 
636 	case oSmartcardDevice:
637 		charptr = &options->smartcard_device;
638 		goto parse_string;
639 
640 	case oProxyCommand:
641 		charptr = &options->proxy_command;
642 		string = xstrdup("");
643 		while ((arg = strdelim(&s)) != NULL && *arg != '\0') {
644 			string = xrealloc(string, strlen(string) + strlen(arg) + 2);
645 			strcat(string, " ");
646 			strcat(string, arg);
647 		}
648 		if (*activep && *charptr == NULL)
649 			*charptr = string;
650 		else
651 			xfree(string);
652 		return 0;
653 
654 	case oPort:
655 		intptr = &options->port;
656 parse_int:
657 		arg = strdelim(&s);
658 		if (!arg || *arg == '\0')
659 			fatal("%.200s line %d: Missing argument.", filename, linenum);
660 		if (arg[0] < '0' || arg[0] > '9')
661 			fatal("%.200s line %d: Bad number.", filename, linenum);
662 
663 		/* Octal, decimal, or hex format? */
664 		value = strtol(arg, &endofnumber, 0);
665 		if (arg == endofnumber)
666 			fatal("%.200s line %d: Bad number.", filename, linenum);
667 		if (*activep && *intptr == -1)
668 			*intptr = value;
669 		break;
670 
671 	case oConnectionAttempts:
672 		intptr = &options->connection_attempts;
673 		goto parse_int;
674 
675 	case oCipher:
676 		intptr = &options->cipher;
677 		arg = strdelim(&s);
678 		if (!arg || *arg == '\0')
679 			fatal("%.200s line %d: Missing argument.", filename, linenum);
680 		value = cipher_number(arg);
681 		if (value == -1)
682 			fatal("%.200s line %d: Bad cipher '%s'.",
683 			    filename, linenum, arg ? arg : "<NONE>");
684 		if (*activep && *intptr == -1)
685 			*intptr = value;
686 		break;
687 
688 	case oCiphers:
689 		arg = strdelim(&s);
690 		if (!arg || *arg == '\0')
691 			fatal("%.200s line %d: Missing argument.", filename, linenum);
692 		if (!ciphers_valid(arg))
693 			fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.",
694 			    filename, linenum, arg ? arg : "<NONE>");
695 		if (*activep && options->ciphers == NULL)
696 			options->ciphers = xstrdup(arg);
697 		break;
698 
699 	case oMacs:
700 		arg = strdelim(&s);
701 		if (!arg || *arg == '\0')
702 			fatal("%.200s line %d: Missing argument.", filename, linenum);
703 		if (!mac_valid(arg))
704 			fatal("%.200s line %d: Bad SSH2 Mac spec '%s'.",
705 			    filename, linenum, arg ? arg : "<NONE>");
706 		if (*activep && options->macs == NULL)
707 			options->macs = xstrdup(arg);
708 		break;
709 
710 	case oHostKeyAlgorithms:
711 		arg = strdelim(&s);
712 		if (!arg || *arg == '\0')
713 			fatal("%.200s line %d: Missing argument.", filename, linenum);
714 		if (!key_names_valid2(arg))
715 			fatal("%.200s line %d: Bad protocol 2 host key algorithms '%s'.",
716 			    filename, linenum, arg ? arg : "<NONE>");
717 		if (*activep && options->hostkeyalgorithms == NULL)
718 			options->hostkeyalgorithms = xstrdup(arg);
719 		break;
720 
721 	case oProtocol:
722 		intptr = &options->protocol;
723 		arg = strdelim(&s);
724 		if (!arg || *arg == '\0')
725 			fatal("%.200s line %d: Missing argument.", filename, linenum);
726 		value = proto_spec(arg);
727 		if (value == SSH_PROTO_UNKNOWN)
728 			fatal("%.200s line %d: Bad protocol spec '%s'.",
729 			    filename, linenum, arg ? arg : "<NONE>");
730 		if (*activep && *intptr == SSH_PROTO_UNKNOWN)
731 			*intptr = value;
732 		break;
733 
734 	case oLogLevel:
735 		intptr = (int *) &options->log_level;
736 		arg = strdelim(&s);
737 		value = log_level_number(arg);
738 		if (value == SYSLOG_LEVEL_NOT_SET)
739 			fatal("%.200s line %d: unsupported log level '%s'",
740 			    filename, linenum, arg ? arg : "<NONE>");
741 		if (*activep && (LogLevel) *intptr == SYSLOG_LEVEL_NOT_SET)
742 			*intptr = (LogLevel) value;
743 		break;
744 
745 	case oLocalForward:
746 	case oRemoteForward:
747 		arg = strdelim(&s);
748 		if (arg == NULL || *arg == '\0')
749 			fatal("%.200s line %d: Missing port argument.",
750 			    filename, linenum);
751 		arg2 = strdelim(&s);
752 		if (arg2 == NULL || *arg2 == '\0')
753 			fatal("%.200s line %d: Missing target argument.",
754 			    filename, linenum);
755 
756 		/* construct a string for parse_forward */
757 		snprintf(fwdarg, sizeof(fwdarg), "%s:%s", arg, arg2);
758 
759 		if (parse_forward(1, &fwd, fwdarg) == 0)
760 			fatal("%.200s line %d: Bad forwarding specification.",
761 			    filename, linenum);
762 
763 		if (*activep) {
764 			if (opcode == oLocalForward)
765 				add_local_forward(options, &fwd);
766 			else if (opcode == oRemoteForward)
767 				add_remote_forward(options, &fwd);
768 		}
769 		break;
770 
771 	case oDynamicForward:
772 		arg = strdelim(&s);
773 		if (!arg || *arg == '\0')
774 			fatal("%.200s line %d: Missing port argument.",
775 			    filename, linenum);
776 
777 		if (parse_forward(0, &fwd, arg) == 0) {
778 			fatal("%.200s line %d: Bad dynamic forwarding specification.",
779 			    filename, linenum);
780 		}
781 
782 		if (*activep) {
783 			fwd.connect_host = "socks";
784 			add_local_forward(options, &fwd);
785 		}
786 		break;
787 
788 	case oClearAllForwardings:
789 		intptr = &options->clear_forwardings;
790 		goto parse_flag;
791 
792 	case oHost:
793 		*activep = 0;
794 		while ((arg = strdelim(&s)) != NULL && *arg != '\0')
795 			if (match_pattern(host, arg)) {
796 				debug("Applying options for %.100s", arg);
797 				*activep = 1;
798 				break;
799 			}
800 		/* Avoid garbage check below, as strdelim is done. */
801 		return 0;
802 
803 	case oEscapeChar:
804 		intptr = &options->escape_char;
805 		arg = strdelim(&s);
806 		if (!arg || *arg == '\0')
807 			fatal("%.200s line %d: Missing argument.", filename, linenum);
808 		if (arg[0] == '^' && arg[2] == 0 &&
809 		    (u_char) arg[1] >= 64 && (u_char) arg[1] < 128)
810 			value = (u_char) arg[1] & 31;
811 		else if (strlen(arg) == 1)
812 			value = (u_char) arg[0];
813 		else if (strcmp(arg, "none") == 0)
814 			value = SSH_ESCAPECHAR_NONE;
815 		else {
816 			fatal("%.200s line %d: Bad escape character.",
817 			    filename, linenum);
818 			/* NOTREACHED */
819 			value = 0;	/* Avoid compiler warning. */
820 		}
821 		if (*activep && *intptr == -1)
822 			*intptr = value;
823 		break;
824 
825 	case oServerAliveInterval:
826 		intptr = &options->server_alive_interval;
827 		goto parse_time;
828 
829 	case oServerAliveCountMax:
830 		intptr = &options->server_alive_count_max;
831 		goto parse_int;
832 
833 	case oHashKnownHosts:
834 		intptr = &options->hash_known_hosts;
835 		goto parse_flag;
836 
837 	case oDisableBanner:
838 		arg = strdelim(&s);
839 		if (get_yes_no_flag(&options->disable_banner, arg, filename,
840 		    linenum, *activep) == 1)
841 			break;
842 
843 		if (strcmp(arg, "in-exec-mode") == 0)
844 			options->disable_banner = SSH_NO_BANNER_IN_EXEC_MODE;
845 		else
846 			fatal("%.200s line %d: Bad yes/no/in-exec-mode "
847 			    "argument.", filename, linenum);
848 		break;
849 
850 	case oIgnoreIfUnknown:
851 		charptr = &options->ignore_if_unknown;
852 		goto parse_string;
853 
854 	case oUseOpenSSLEngine:
855 		intptr = &options->use_openssl_engine;
856 		goto parse_flag;
857 
858 	case oDeprecated:
859 		debug("%s line %d: Deprecated option \"%s\"",
860 		    filename, linenum, keyword);
861 		return 0;
862 
863 	default:
864 		fatal("process_config_line: Unimplemented opcode %d", opcode);
865 	}
866 
867 	/* Check that there is no garbage at end of line. */
868 	if ((arg = strdelim(&s)) != NULL && *arg != '\0') {
869 		fatal("%.200s line %d: garbage at end of line; \"%.200s\".",
870 		     filename, linenum, arg);
871 	}
872 	return 0;
873 }
874 
875 
876 /*
877  * Reads the config file and modifies the options accordingly.  Options
878  * should already be initialized before this call.  This never returns if
879  * there is an error.  If the file does not exist, this returns 0.
880  */
881 
882 int
883 read_config_file(const char *filename, const char *host, Options *options)
884 {
885 	FILE *f;
886 	char line[1024];
887 	int active, linenum;
888 
889 	/* Open the file. */
890 	f = fopen(filename, "r");
891 	if (!f)
892 		return 0;
893 
894 	debug("Reading configuration data %.200s", filename);
895 
896 	/*
897 	 * Mark that we are now processing the options.  This flag is turned
898 	 * on/off by Host specifications.
899 	 */
900 	active = 1;
901 	linenum = 0;
902 	while (fgets(line, sizeof(line), f)) {
903 		/* Update line number counter. */
904 		linenum++;
905 		process_config_line(options, host, line, filename, linenum, &active);
906 	}
907 	fclose(f);
908 	return 1;
909 }
910 
911 /*
912  * Initializes options to special values that indicate that they have not yet
913  * been set.  Read_config_file will only set options with this value. Options
914  * are processed in the following order: command line, user config file,
915  * system config file.  Last, fill_default_options is called.
916  */
917 
918 void
919 initialize_options(Options * options)
920 {
921 	memset(options, 'X', sizeof(*options));
922 	options->forward_agent = -1;
923 	options->forward_x11 = -1;
924 	options->forward_x11_trusted = -1;
925 	options->xauth_location = NULL;
926 	options->gateway_ports = -1;
927 	options->use_privileged_port = -1;
928 	options->rhosts_authentication = -1;
929 	options->rsa_authentication = -1;
930 	options->pubkey_authentication = -1;
931 	options->challenge_response_authentication = -1;
932 #ifdef GSSAPI
933         options->gss_keyex = -1;
934         options->gss_authentication = -1;
935         options->gss_deleg_creds = -1;
936 #ifdef GSI
937         options->gss_globus_deleg_limited_proxy = -1;
938 #endif /* GSI */
939 #endif /* GSSAPI */
940 
941 #if defined(KRB4) || defined(KRB5)
942 	options->kerberos_authentication = -1;
943 #endif
944 #if defined(AFS) || defined(KRB5)
945 	options->kerberos_tgt_passing = -1;
946 #endif
947 #ifdef AFS
948 	options->afs_token_passing = -1;
949 #endif
950 	options->password_authentication = -1;
951 	options->kbd_interactive_authentication = -1;
952 	options->kbd_interactive_devices = NULL;
953 	options->rhosts_rsa_authentication = -1;
954 	options->hostbased_authentication = -1;
955 	options->batch_mode = -1;
956 	options->check_host_ip = -1;
957 	options->strict_host_key_checking = -1;
958 	options->compression = -1;
959 	options->keepalives = -1;
960 	options->compression_level = -1;
961 	options->port = -1;
962 	options->connection_attempts = -1;
963 	options->connection_timeout = -1;
964 	options->number_of_password_prompts = -1;
965 	options->cipher = -1;
966 	options->ciphers = NULL;
967 	options->macs = NULL;
968 	options->hostkeyalgorithms = NULL;
969 	options->protocol = SSH_PROTO_UNKNOWN;
970 	options->num_identity_files = 0;
971 	options->hostname = NULL;
972 	options->host_key_alias = NULL;
973 	options->proxy_command = NULL;
974 	options->user = NULL;
975 	options->escape_char = -1;
976 	options->system_hostfile = NULL;
977 	options->user_hostfile = NULL;
978 	options->system_hostfile2 = NULL;
979 	options->user_hostfile2 = NULL;
980 	options->num_local_forwards = 0;
981 	options->num_remote_forwards = 0;
982 	options->clear_forwardings = -1;
983 	options->log_level = SYSLOG_LEVEL_NOT_SET;
984 	options->preferred_authentications = NULL;
985 	options->bind_address = NULL;
986 	options->smartcard_device = NULL;
987 	options->no_host_authentication_for_localhost = -1;
988 	options->rekey_limit = -1;
989 	options->fallback_to_rsh = -1;
990 	options->use_rsh = -1;
991 	options->server_alive_interval = -1;
992 	options->server_alive_count_max = -1;
993 	options->hash_known_hosts = -1;
994 	options->ignore_if_unknown = NULL;
995 	options->unknown_opts_num = 0;
996 	options->disable_banner = -1;
997 	options->use_openssl_engine = -1;
998 }
999 
1000 /*
1001  * Called after processing other sources of option data, this fills those
1002  * options for which no value has been specified with their default values.
1003  */
1004 
1005 void
1006 fill_default_options(Options * options)
1007 {
1008 	int len;
1009 
1010 	if (options->forward_agent == -1)
1011 		options->forward_agent = 0;
1012 	if (options->forward_x11 == -1)
1013 		options->forward_x11 = 0;
1014 	/*
1015 	 * Unlike OpenSSH, we keep backward compatibility for '-X' option
1016 	 * which means that X11 forwarding is trusted by default.
1017 	 */
1018 	if (options->forward_x11_trusted == -1)
1019 		options->forward_x11_trusted = 1;
1020 	if (options->xauth_location == NULL)
1021 		options->xauth_location = _PATH_XAUTH;
1022 	if (options->gateway_ports == -1)
1023 		options->gateway_ports = 0;
1024 	if (options->use_privileged_port == -1)
1025 		options->use_privileged_port = 0;
1026 	if (options->rhosts_authentication == -1)
1027 		options->rhosts_authentication = 0;
1028 	if (options->rsa_authentication == -1)
1029 		options->rsa_authentication = 1;
1030 	if (options->pubkey_authentication == -1)
1031 		options->pubkey_authentication = 1;
1032 	if (options->challenge_response_authentication == -1)
1033 		options->challenge_response_authentication = 1;
1034 #ifdef GSSAPI
1035 	if (options->gss_keyex == -1)
1036 		options->gss_keyex = 1;
1037 	if (options->gss_authentication == -1)
1038 		options->gss_authentication = 1;
1039 	if (options->gss_deleg_creds == -1)
1040 		options->gss_deleg_creds = 0;
1041 #ifdef GSI
1042 	if (options->gss_globus_deleg_limited_proxy == -1)
1043 		options->gss_globus_deleg_limited_proxy = 0;
1044 #endif /* GSI */
1045 #endif /* GSSAPI */
1046 #if defined(KRB4) || defined(KRB5)
1047 	if (options->kerberos_authentication == -1)
1048 		options->kerberos_authentication = 1;
1049 #endif
1050 #if defined(AFS) || defined(KRB5)
1051 	if (options->kerberos_tgt_passing == -1)
1052 		options->kerberos_tgt_passing = 1;
1053 #endif
1054 #ifdef AFS
1055 	if (options->afs_token_passing == -1)
1056 		options->afs_token_passing = 1;
1057 #endif
1058 	if (options->password_authentication == -1)
1059 		options->password_authentication = 1;
1060 	if (options->kbd_interactive_authentication == -1)
1061 		options->kbd_interactive_authentication = 1;
1062 	if (options->rhosts_rsa_authentication == -1)
1063 		options->rhosts_rsa_authentication = 0;
1064 	if (options->hostbased_authentication == -1)
1065 		options->hostbased_authentication = 0;
1066 	if (options->batch_mode == -1)
1067 		options->batch_mode = 0;
1068 	if (options->check_host_ip == -1)
1069 		options->check_host_ip = 1;
1070 	if (options->strict_host_key_checking == -1)
1071 		options->strict_host_key_checking = 2;	/* 2 is default */
1072 	if (options->compression == -1)
1073 		options->compression = 0;
1074 	if (options->keepalives == -1)
1075 		options->keepalives = 1;
1076 	if (options->compression_level == -1)
1077 		options->compression_level = 6;
1078 	if (options->port == -1)
1079 		options->port = 0;	/* Filled in ssh_connect. */
1080 	if (options->connection_attempts == -1)
1081 		options->connection_attempts = 1;
1082 	if (options->number_of_password_prompts == -1)
1083 		options->number_of_password_prompts = 3;
1084 	/* Selected in ssh_login(). */
1085 	if (options->cipher == -1)
1086 		options->cipher = SSH_CIPHER_NOT_SET;
1087 	/* options->ciphers, default set in myproposals.h */
1088 	/* options->macs, default set in myproposals.h */
1089 	/* options->hostkeyalgorithms, default set in myproposals.h */
1090 	if (options->protocol == SSH_PROTO_UNKNOWN)
1091 		options->protocol = SSH_PROTO_1|SSH_PROTO_2;
1092 	if (options->num_identity_files == 0) {
1093 		if (options->protocol & SSH_PROTO_1) {
1094 			len = 2 + strlen(_PATH_SSH_CLIENT_IDENTITY) + 1;
1095 			options->identity_files[options->num_identity_files] =
1096 			    xmalloc(len);
1097 			snprintf(options->identity_files[options->num_identity_files++],
1098 			    len, "~/%.100s", _PATH_SSH_CLIENT_IDENTITY);
1099 		}
1100 		if (options->protocol & SSH_PROTO_2) {
1101 			len = 2 + strlen(_PATH_SSH_CLIENT_ID_RSA) + 1;
1102 			options->identity_files[options->num_identity_files] =
1103 			    xmalloc(len);
1104 			snprintf(options->identity_files[options->num_identity_files++],
1105 			    len, "~/%.100s", _PATH_SSH_CLIENT_ID_RSA);
1106 
1107 			len = 2 + strlen(_PATH_SSH_CLIENT_ID_DSA) + 1;
1108 			options->identity_files[options->num_identity_files] =
1109 			    xmalloc(len);
1110 			snprintf(options->identity_files[options->num_identity_files++],
1111 			    len, "~/%.100s", _PATH_SSH_CLIENT_ID_DSA);
1112 		}
1113 	}
1114 	if (options->escape_char == -1)
1115 		options->escape_char = '~';
1116 	if (options->system_hostfile == NULL)
1117 		options->system_hostfile = _PATH_SSH_SYSTEM_HOSTFILE;
1118 	if (options->user_hostfile == NULL)
1119 		options->user_hostfile = _PATH_SSH_USER_HOSTFILE;
1120 	if (options->system_hostfile2 == NULL)
1121 		options->system_hostfile2 = _PATH_SSH_SYSTEM_HOSTFILE2;
1122 	if (options->user_hostfile2 == NULL)
1123 		options->user_hostfile2 = _PATH_SSH_USER_HOSTFILE2;
1124 	if (options->log_level == SYSLOG_LEVEL_NOT_SET)
1125 		options->log_level = SYSLOG_LEVEL_INFO;
1126 	if (options->clear_forwardings == 1)
1127 		clear_forwardings(options);
1128 	if (options->no_host_authentication_for_localhost == -1)
1129 		options->no_host_authentication_for_localhost = 0;
1130 	if (options->rekey_limit == -1)
1131 		options->rekey_limit = 0;
1132 	if (options->fallback_to_rsh == -1)
1133 		options->fallback_to_rsh = 0;
1134 	if (options->use_rsh == -1)
1135 		options->use_rsh = 0;
1136 	if (options->server_alive_interval == -1)
1137 		options->server_alive_interval = 0;
1138 	if (options->server_alive_count_max == -1)
1139 		options->server_alive_count_max = 3;
1140 	if (options->hash_known_hosts == -1)
1141 		options->hash_known_hosts = 0;
1142 	if (options->disable_banner == -1)
1143 		options->disable_banner = 0;
1144 	if (options->use_openssl_engine == -1)
1145 		options->use_openssl_engine = 1;
1146 	/* options->proxy_command should not be set by default */
1147 	/* options->user will be set in the main program if appropriate */
1148 	/* options->hostname will be set in the main program if appropriate */
1149 	/* options->host_key_alias should not be set by default */
1150 	/* options->preferred_authentications will be set in ssh */
1151 	/* options->ignore_if_unknown should not be set by default */
1152 }
1153 
1154 /*
1155  * Parses a string containing a port forwarding specification of one of the
1156  * two forms, short or long:
1157  *
1158  *	[listenhost:]listenport
1159  *	[listenhost:]listenport:connecthost:connectport
1160  *
1161  * short forwarding specification is used for dynamic port forwarding and for
1162  * port forwarding cancelation in process_cmdline(). The function returns number
1163  * of arguments parsed or zero on any error.
1164  */
1165 int
1166 parse_forward(int long_form, Forward *fwd, const char *fwdspec)
1167 {
1168 	int i;
1169 	char *p, *cp, *fwdarg[5];
1170 
1171 	memset(fwd, '\0', sizeof(*fwd));
1172 
1173 	cp = p = xstrdup(fwdspec);
1174 
1175 	/* skip leading spaces */
1176 	while (isspace(*cp))
1177 		cp++;
1178 
1179 	for (i = 0; i < 5; ++i)
1180 		if ((fwdarg[i] = hpdelim(&cp)) == NULL)
1181 			break;
1182 
1183 	if ((long_form == 0 && i > 2) || (long_form == 1 && i < 3) || (i == 5))
1184 		goto fail_free;
1185 
1186 	switch (i) {
1187 	case 0:
1188 		goto fail_free;
1189 
1190 	case 1:
1191 		fwd->listen_host = NULL;
1192 		fwd->listen_port = a2port(fwdarg[0]);
1193 		break;
1194 
1195 	case 2:
1196 		fwd->listen_host = xstrdup(cleanhostname(fwdarg[0]));
1197 		fwd->listen_port = a2port(fwdarg[1]);
1198 		break;
1199 
1200 	case 3:
1201 		fwd->listen_host = NULL;
1202 		fwd->listen_port = a2port(fwdarg[0]);
1203 		fwd->connect_host = xstrdup(cleanhostname(fwdarg[1]));
1204 		fwd->connect_port = a2port(fwdarg[2]);
1205 		break;
1206 
1207 	case 4:
1208 		fwd->listen_host = xstrdup(cleanhostname(fwdarg[0]));
1209 		fwd->listen_port = a2port(fwdarg[1]);
1210 		fwd->connect_host = xstrdup(cleanhostname(fwdarg[2]));
1211 		fwd->connect_port = a2port(fwdarg[3]);
1212 		break;
1213 	}
1214 
1215 	if (fwd->listen_port == 0 || (fwd->connect_port == 0 && i > 2))
1216 		goto fail_free;
1217 
1218 	xfree(p);
1219 	return (i);
1220 
1221 fail_free:
1222 	if (p != NULL)
1223 		xfree(p);
1224 	if (fwd->connect_host != NULL)
1225 		xfree(fwd->connect_host);
1226 	if (fwd->listen_host != NULL)
1227 		xfree(fwd->listen_host);
1228 	return (0);
1229 }
1230 
1231 /*
1232  * Process previously stored unknown options. When this function is called we
1233  * already have IgnoreIfUnknown set so finally we can decide whether each
1234  * unknown option is to be ignored or not.
1235  */
1236 void
1237 process_unknown_options(Options *options)
1238 {
1239 	StoredOption *so;
1240 	int m, i, bad_options = 0;
1241 
1242 	/* if there is no unknown option we are done */
1243 	if (options->unknown_opts_num == 0)
1244 		return;
1245 
1246 	/*
1247 	 * Now go through the list of unknown options and report any one that
1248 	 * is not explicitly listed in IgnoreIfUnknown option. If at least one
1249 	 * such as that is found it's a show stopper.
1250 	 */
1251 	for (i = 0; i < options->unknown_opts_num; ++i) {
1252 		so = &options->unknown_opts[i];
1253 		if (options->ignore_if_unknown == NULL)
1254 			m = 0;
1255 		else
1256 			m = match_pattern_list(tolowercase(so->keyword),
1257 			    options->ignore_if_unknown,
1258 			    strlen(options->ignore_if_unknown), 1);
1259 		if (m == 1) {
1260 			debug("%s: line %d: ignoring unknown option: %s",
1261 			    so->filename, so->linenum, so->keyword);
1262 		}
1263 		else {
1264 			error("%s: line %d: unknown configuration option: %s",
1265 			    so->filename, so->linenum, so->keyword);
1266 			bad_options++;
1267 		}
1268 		xfree(so->keyword);
1269 		xfree(so->filename);
1270 	}
1271 
1272 	/* exit if we found at least one unignored unknown option */
1273 	if (bad_options > 0)
1274 		fatal("terminating, %d bad configuration option(s)",
1275 		    bad_options);
1276 }
1277