2018-02-27 19:20:58 +00:00
|
|
|
/*-
|
2015-02-24 18:19:20 +00:00
|
|
|
* SSLsplit - transparent SSL/TLS interception
|
2018-02-27 19:20:58 +00:00
|
|
|
* https://www.roe.ch/SSLsplit
|
|
|
|
*
|
|
|
|
* Copyright (c) 2009-2018, Daniel Roethlisberger <daniel@roe.ch>.
|
2014-11-25 22:45:40 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
2018-02-27 19:20:58 +00:00
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
2014-11-25 22:45:40 +00:00
|
|
|
*
|
2018-02-27 19:20:58 +00:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS ``AS IS''
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
2014-11-25 22:45:40 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef DEFAULTS_H
|
|
|
|
#define DEFAULTS_H
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Defaults for convenient tweaking or patching.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
2018-08-03 20:36:51 +00:00
|
|
|
* User to drop privileges to by default. This user needs to be allowed to
|
|
|
|
* create outbound TCP connections, and in some configurations, perform DNS
|
|
|
|
* resolution.
|
|
|
|
*
|
2014-11-25 22:45:40 +00:00
|
|
|
* Packagers may want to use a specific service user account instead of
|
|
|
|
* overloading nobody with yet another use case. Using nobody for source
|
2018-08-03 20:36:51 +00:00
|
|
|
* builds makes sense because chances are high that it exists. Good practice
|
|
|
|
* is to create a dedicated user for sslsplit.
|
|
|
|
*
|
|
|
|
* Make sure to also patch the manual page if you patch this.
|
2014-11-25 22:45:40 +00:00
|
|
|
*/
|
|
|
|
#define DFLT_DROPUSER "nobody"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Default file and directory modes for newly created files and directories
|
|
|
|
* created as part of e.g. logging. The default is to use full permissions
|
|
|
|
* subject to the system's umask, as is the default for system utilities.
|
|
|
|
* Use a more restrictive mode for the PID file.
|
|
|
|
*/
|
|
|
|
#define DFLT_DIRMODE 0777
|
|
|
|
#define DFLT_FILEMODE 0666
|
|
|
|
#define DFLT_PIDFMODE 0644
|
|
|
|
|
2014-11-30 21:29:40 +00:00
|
|
|
/*
|
|
|
|
* Default cipher suite spec.
|
|
|
|
* Use 'openssl ciphers -v spec' to see what ciphers are effectively enabled
|
|
|
|
* by a cipher suite spec with a given version of OpenSSL.
|
|
|
|
*/
|
|
|
|
#define DFLT_CIPHERS "ALL:-aNULL"
|
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
/*
|
|
|
|
* Default elliptic curve for EC cipher suites.
|
|
|
|
*/
|
2016-03-25 15:28:30 +00:00
|
|
|
#define DFLT_CURVE "prime256v1"
|
2014-11-25 22:45:40 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
/*
|
|
|
|
* Default leaf key RSA keysize in bits.
|
|
|
|
*
|
|
|
|
* While browsers still generally accept it, use a leaf key size of 1024 bit
|
|
|
|
* for leaf keys. When browsers start to sunset 1024 bit RSA in leaf keys, we
|
|
|
|
* will need to make this value bigger, and/or configurable.
|
|
|
|
* Until then, users who want a different size can always use their own
|
|
|
|
* pre-generated leaf key instead of generating one automatically.
|
2019-03-26 15:31:51 +00:00
|
|
|
* OpenSSL security level of 2+ does not accept key size of 1024 bits, giving
|
|
|
|
* a "key too small" error while loading forged cert into SSL ctx.
|
2018-11-03 15:23:31 +00:00
|
|
|
*/
|
2019-08-03 20:40:38 +00:00
|
|
|
#define DFLT_LEAFKEY_RSABITS 2048
|
2018-11-03 15:23:31 +00:00
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
#endif /* !DEFAULTS_H */
|
|
|
|
|
|
|
|
/* vim: set noet ft=c: */
|