]> andersk Git - gssapi-openssh.git/blame - setup/sshd_config.in
The man2html from jbasney on pkilab2 works whereas the standard one doesn't.
[gssapi-openssh.git] / setup / sshd_config.in
CommitLineData
382d31f1 1# $OpenBSD: sshd_config,v 1.80 2008/07/02 02:24:18 djm Exp $
5b105785 2
120de672 3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
5b105785 5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
351aa434 14#AddressFamily any
5b105785 15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
e11c8e4c 18# Disable legacy (protocol version 1) support in the server for new
19# installations. In future the default will change to require explicit
20# activation of protocol 1
21Protocol 2
22
5b105785 23# HostKey for protocol version 1
24#HostKey /etc/ssh/ssh_host_key
25# HostKeys for protocol version 2
26#HostKey /etc/ssh/ssh_host_rsa_key
27#HostKey /etc/ssh/ssh_host_dsa_key
28
29# Lifetime and size of ephemeral version 1 server key
da07627e 30#KeyRegenerationInterval 1h
382d31f1 31#ServerKeyBits 1024
5b105785 32
33# Logging
351aa434 34# obsoletes QuietMode and FascistLogging
5b105785 35#SyslogFacility AUTH
36#LogLevel INFO
37
38# Authentication:
39
da07627e 40#LoginGraceTime 2m
5b105785 41#PermitRootLogin yes
42#StrictModes yes
8acc5688 43#MaxAuthTries 6
382d31f1 44#MaxSessions 10
5b105785 45
46#RSAAuthentication yes
47#PubkeyAuthentication yes
48#AuthorizedKeysFile .ssh/authorized_keys
49
5b105785 50# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
51#RhostsRSAAuthentication no
52# similar for protocol version 2
53#HostbasedAuthentication no
54# Change to yes if you don't trust ~/.ssh/known_hosts for
55# RhostsRSAAuthentication and HostbasedAuthentication
56#IgnoreUserKnownHosts no
da07627e 57# Don't read the user's ~/.rhosts and ~/.shosts files
58#IgnoreRhosts yes
5b105785 59
60# To disable tunneled clear text passwords, change to no here!
61#PasswordAuthentication yes
62#PermitEmptyPasswords no
63
64# Change to no to disable s/key passwords
65#ChallengeResponseAuthentication yes
66
67# Kerberos options
68#KerberosAuthentication no
69#KerberosOrLocalPasswd yes
70#KerberosTicketCleanup yes
ec629a6d 71#KerberosGetAFSToken no
5b105785 72
140715a2 73# Session hooks: if allowed, specify the commands to execute
74#AllowSessionHooks yes
75#SessionHookStartupCmd /bin/true
76#SessionHookShutdownCmd /bin/true
77
da07627e 78# GSSAPI options
79#GSSAPIAuthentication yes
382d31f1 80#GSSAPIDelegateCredentials yes
ec629a6d 81#GSSAPICleanupCredentials yes
20ba2feb 82#GSSAPIStrictAcceptorCheck yes
83#GSSAPIKeyExchange yes
da07627e 84
8acc5688 85# Set this to 'yes' to enable PAM authentication, account processing,
86# and session processing. If this is enabled, PAM authentication will
20ba2feb 87# be allowed through the ChallengeResponseAuthentication and
88# PasswordAuthentication. Depending on your PAM configuration,
89# PAM authentication via ChallengeResponseAuthentication may bypass
90# the setting of "PermitRootLogin without-password".
91# If you just want the PAM account and session checks to run without
92# PAM authentication, then enable this but set PasswordAuthentication
93# and ChallengeResponseAuthentication to 'no'.
94#UsePAM yes
5b105785 95
fe0c9965 96# Set to 'yes' to allow the PAM stack to change the user name during
97# calls to authentication
98#PermitPAMUserChange no
99
382d31f1 100#AllowAgentForwarding yes
da07627e 101#AllowTcpForwarding yes
102#GatewayPorts no
0f988400 103X11Forwarding yes
5b105785 104#X11DisplayOffset 10
105#X11UseLocalhost yes
106#PrintMotd yes
107#PrintLastLog yes
ec629a6d 108#TCPKeepAlive yes
5b105785 109#UseLogin no
120de672 110#UsePrivilegeSeparation yes
e8800bf1 111#PermitUserEnvironment no
351aa434 112#Compression delayed
da07627e 113#ClientAliveInterval 0
114#ClientAliveCountMax 3
115#UseDNS yes
116#PidFile /var/run/sshd.pid
5b105785 117#MaxStartups 10
bac30dae 118#PermitTunnel no
760fc321 119#ChrootDirectory none
bac30dae 120
5b105785 121# no default banner path
760fc321 122#Banner none
5b105785 123
20ba2feb 124# override default of no subsystems
125Subsystem sftp /usr/libexec/sftp-server
126
bac30dae 127# the following are HPN related configuration options
760fc321 128# tcp receive buffer polling. disable in non autotuning kernels
129#TcpRcvBufPoll yes
20ba2feb 130
bac30dae 131# allow the use of the none cipher
132#NoneEnabled no
133
134# disable hpn performance boosts.
135#HPNDisabled no
136
760fc321 137# buffer size for hpn to non-hpn connections
bac30dae 138#HPNBufferSize 2048
139
20ba2feb 140
141# Example of overriding settings on a per-user basis
142#Match User anoncvs
143# X11Forwarding no
144# AllowTcpForwarding no
145# ForceCommand cvs server
This page took 0.082055 seconds and 5 git commands to generate.