diff options
author | djm <djm> | 2008-05-19 04:57:41 +0000 |
---|---|---|
committer | djm <djm> | 2008-05-19 04:57:41 +0000 |
commit | 7ea8c1448529a36b991feb24841cbe8e0915d0e6 (patch) | |
tree | bd1c6ef1f6fd368178ff5a5a9cb0ba360ef60fb2 /servconf.h | |
parent | 2598aa143e6e403579c89f65de2067b8adad7707 (diff) | |
download | openssh-7ea8c1448529a36b991feb24841cbe8e0915d0e6.tar.gz |
- pyr@cvs.openbsd.org 2008/05/07 05:49:37
[servconf.c servconf.h session.c sshd_config.5]
Enable the AllowAgentForwarding option in sshd_config (global and match
context), to specify if agents should be permitted on the server.
As the man page states:
``Note that disabling Agent forwarding does not improve security
unless users are also denied shell access, as they can always install
their own forwarders.''
ok djm@, ok and a mild frown markus@
Diffstat (limited to 'servconf.h')
-rw-r--r-- | servconf.h | 3 |
1 files changed, 2 insertions, 1 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: servconf.h,v 1.82 2008/02/13 22:38:17 djm Exp $ */ +/* $OpenBSD: servconf.h,v 1.83 2008/05/07 05:49:37 pyr Exp $ */ /* * Author: Tatu Ylonen <ylo@cs.hut.fi> @@ -101,6 +101,7 @@ typedef struct { int use_login; /* If true, login(1) is used */ int compression; /* If true, compression is allowed */ int allow_tcp_forwarding; + int allow_agent_forwarding; u_int num_allow_users; char *allow_users[MAX_ALLOW_USERS]; u_int num_deny_users; |