]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config
Import of OpenSSH 4.9p1
[gssapi-openssh.git] / openssh / sshd_config
CommitLineData
47686178 1# $OpenBSD: sshd_config,v 1.77 2008/02/08 23:24:07 djm Exp $
3c0ef626 2
f5799ae1 3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
3c0ef626 5
e9a17296 6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
996d5e62 14#AddressFamily any
3c0ef626 15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
d4487008 18# Disable legacy (protocol version 1) support in the server for new
19# installations. In future the default will change to require explicit
20# activation of protocol 1
21Protocol 2
22
3c0ef626 23# HostKey for protocol version 1
e9a17296 24#HostKey /etc/ssh/ssh_host_key
3c0ef626 25# HostKeys for protocol version 2
e9a17296 26#HostKey /etc/ssh/ssh_host_rsa_key
27#HostKey /etc/ssh/ssh_host_dsa_key
3c0ef626 28
29# Lifetime and size of ephemeral version 1 server key
0fff78ff 30#KeyRegenerationInterval 1h
e9a17296 31#ServerKeyBits 768
3c0ef626 32
33# Logging
665a873d 34# obsoletes QuietMode and FascistLogging
e9a17296 35#SyslogFacility AUTH
36#LogLevel INFO
3c0ef626 37
38# Authentication:
39
0fff78ff 40#LoginGraceTime 2m
e9a17296 41#PermitRootLogin yes
42#StrictModes yes
c9f39d2c 43#MaxAuthTries 6
3c0ef626 44
e9a17296 45#RSAAuthentication yes
46#PubkeyAuthentication yes
47#AuthorizedKeysFile .ssh/authorized_keys
3c0ef626 48
e9a17296 49# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
50#RhostsRSAAuthentication no
3c0ef626 51# similar for protocol version 2
e9a17296 52#HostbasedAuthentication no
53# Change to yes if you don't trust ~/.ssh/known_hosts for
54# RhostsRSAAuthentication and HostbasedAuthentication
55#IgnoreUserKnownHosts no
0fff78ff 56# Don't read the user's ~/.rhosts and ~/.shosts files
57#IgnoreRhosts yes
3c0ef626 58
59# To disable tunneled clear text passwords, change to no here!
e9a17296 60#PasswordAuthentication yes
61#PermitEmptyPasswords no
3c0ef626 62
e9a17296 63# Change to no to disable s/key passwords
64#ChallengeResponseAuthentication yes
3c0ef626 65
e9a17296 66# Kerberos options
700318f3 67#KerberosAuthentication no
3c0ef626 68#KerberosOrLocalPasswd yes
e9a17296 69#KerberosTicketCleanup yes
cdd66111 70#KerberosGetAFSToken no
e9a17296 71
0fff78ff 72# GSSAPI options
73#GSSAPIAuthentication no
cdd66111 74#GSSAPICleanupCredentials yes
3c0ef626 75
c9f39d2c 76# Set this to 'yes' to enable PAM authentication, account processing,
77# and session processing. If this is enabled, PAM authentication will
9108f8d9 78# be allowed through the ChallengeResponseAuthentication and
79# PasswordAuthentication. Depending on your PAM configuration,
80# PAM authentication via ChallengeResponseAuthentication may bypass
81# the setting of "PermitRootLogin without-password".
82# If you just want the PAM account and session checks to run without
83# PAM authentication, then enable this but set PasswordAuthentication
84# and ChallengeResponseAuthentication to 'no'.
cdd66111 85#UsePAM no
3c0ef626 86
0fff78ff 87#AllowTcpForwarding yes
88#GatewayPorts no
e9a17296 89#X11Forwarding no
90#X11DisplayOffset 10
91#X11UseLocalhost yes
92#PrintMotd yes
93#PrintLastLog yes
cdd66111 94#TCPKeepAlive yes
3c0ef626 95#UseLogin no
f5799ae1 96#UsePrivilegeSeparation yes
41b2f314 97#PermitUserEnvironment no
665a873d 98#Compression delayed
0fff78ff 99#ClientAliveInterval 0
100#ClientAliveCountMax 3
101#UseDNS yes
102#PidFile /var/run/sshd.pid
e9a17296 103#MaxStartups 10
2c06c99b 104#PermitTunnel no
47686178 105#ChrootDirectory none
0fff78ff 106
e9a17296 107# no default banner path
47686178 108#Banner none
3c0ef626 109
e9a17296 110# override default of no subsystems
3c0ef626 111Subsystem sftp /usr/libexec/sftp-server
9108f8d9 112
113# Example of overriding settings on a per-user basis
114#Match User anoncvs
115# X11Forwarding no
116# AllowTcpForwarding no
117# ForceCommand cvs server
This page took 0.115985 seconds and 5 git commands to generate.