|
Lines 100-105
Link Here
|
| 100 |
options->client_alive_count_max = -1; |
100 |
options->client_alive_count_max = -1; |
| 101 |
options->authorized_keys_file = NULL; |
101 |
options->authorized_keys_file = NULL; |
| 102 |
options->authorized_keys_file2 = NULL; |
102 |
options->authorized_keys_file2 = NULL; |
|
|
103 |
options->deny_locked_accounts = -1; |
| 103 |
|
104 |
|
| 104 |
/* Needs to be accessable in many places */ |
105 |
/* Needs to be accessable in many places */ |
| 105 |
use_privsep = -1; |
106 |
use_privsep = -1; |
|
Lines 225-230
Link Here
|
| 225 |
if (options->authorized_keys_file == NULL) |
226 |
if (options->authorized_keys_file == NULL) |
| 226 |
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS; |
227 |
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS; |
| 227 |
|
228 |
|
|
|
229 |
if (options->deny_locked_accounts == -1) |
| 230 |
options->deny_locked_accounts = 1; |
| 231 |
|
| 228 |
/* Turn privilege separation on by default */ |
232 |
/* Turn privilege separation on by default */ |
| 229 |
if (use_privsep == -1) |
233 |
if (use_privsep == -1) |
| 230 |
use_privsep = 1; |
234 |
use_privsep = 1; |
|
Lines 264-269
Link Here
|
| 264 |
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2, |
268 |
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2, |
| 265 |
sGssAuthentication, sGssCleanupCreds, |
269 |
sGssAuthentication, sGssCleanupCreds, |
| 266 |
sUsePrivilegeSeparation, |
270 |
sUsePrivilegeSeparation, |
|
|
271 |
sDenyLockedAccounts, |
| 267 |
sDeprecated, sUnsupported |
272 |
sDeprecated, sUnsupported |
| 268 |
} ServerOpCodes; |
273 |
} ServerOpCodes; |
| 269 |
|
274 |
|
|
Lines 355-360
Link Here
|
| 355 |
{ "authorizedkeysfile", sAuthorizedKeysFile }, |
360 |
{ "authorizedkeysfile", sAuthorizedKeysFile }, |
| 356 |
{ "authorizedkeysfile2", sAuthorizedKeysFile2 }, |
361 |
{ "authorizedkeysfile2", sAuthorizedKeysFile2 }, |
| 357 |
{ "useprivilegeseparation", sUsePrivilegeSeparation}, |
362 |
{ "useprivilegeseparation", sUsePrivilegeSeparation}, |
|
|
363 |
{ "denylockedaccounts", sDenyLockedAccounts }, |
| 358 |
{ NULL, sBadOption } |
364 |
{ NULL, sBadOption } |
| 359 |
}; |
365 |
}; |
| 360 |
|
366 |
|
|
Lines 731-736
Link Here
|
| 731 |
intptr = &options->allow_tcp_forwarding; |
737 |
intptr = &options->allow_tcp_forwarding; |
| 732 |
goto parse_flag; |
738 |
goto parse_flag; |
| 733 |
|
739 |
|
|
|
740 |
case sDenyLockedAccounts: |
| 741 |
intptr = &options->deny_locked_accounts; |
| 742 |
goto parse_flag; |
| 743 |
|
| 734 |
case sUsePrivilegeSeparation: |
744 |
case sUsePrivilegeSeparation: |
| 735 |
intptr = &use_privsep; |
745 |
intptr = &use_privsep; |
| 736 |
goto parse_flag; |
746 |
goto parse_flag; |