]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config
add GssapiCredentialsPath option for sshd_config as requested in
[gssapi-openssh.git] / openssh / sshd_config
CommitLineData
30460aeb 1# $OpenBSD: sshd_config,v 1.74 2006/07/19 13:07:10 dtucker Exp $
75be3237 2
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
3c0ef626 5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
75be3237 8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
3c0ef626 12
75be3237 13#Port 22
3c0ef626 14#Protocol 2,1
dfddba3d 15#AddressFamily any
3c0ef626 16#ListenAddress 0.0.0.0
17#ListenAddress ::
18
19# HostKey for protocol version 1
75be3237 20#HostKey /etc/ssh/ssh_host_key
3c0ef626 21# HostKeys for protocol version 2
75be3237 22#HostKey /etc/ssh/ssh_host_rsa_key
23#HostKey /etc/ssh/ssh_host_dsa_key
3c0ef626 24
25# Lifetime and size of ephemeral version 1 server key
7cac2b65 26#KeyRegenerationInterval 1h
75be3237 27#ServerKeyBits 768
3c0ef626 28
29# Logging
2ce0bfe4 30# obsoletes QuietMode and FascistLogging
75be3237 31#SyslogFacility AUTH
32#LogLevel INFO
3c0ef626 33
34# Authentication:
35
7cac2b65 36#LoginGraceTime 2m
75be3237 37#PermitRootLogin yes
38#StrictModes yes
7e82606e 39#MaxAuthTries 6
3c0ef626 40
75be3237 41#RSAAuthentication yes
42#PubkeyAuthentication yes
43#AuthorizedKeysFile .ssh/authorized_keys
3c0ef626 44
75be3237 45# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
46#RhostsRSAAuthentication no
3c0ef626 47# similar for protocol version 2
75be3237 48#HostbasedAuthentication no
49# Change to yes if you don't trust ~/.ssh/known_hosts for
50# RhostsRSAAuthentication and HostbasedAuthentication
51#IgnoreUserKnownHosts no
7cac2b65 52# Don't read the user's ~/.rhosts and ~/.shosts files
53#IgnoreRhosts yes
3c0ef626 54
55# To disable tunneled clear text passwords, change to no here!
75be3237 56#PasswordAuthentication yes
57#PermitEmptyPasswords no
3c0ef626 58
75be3237 59# Change to no to disable s/key passwords
60#ChallengeResponseAuthentication yes
3c0ef626 61
75be3237 62# Kerberos options
3c0ef626 63#KerberosAuthentication no
64#KerberosOrLocalPasswd yes
75be3237 65#KerberosTicketCleanup yes
540d72c3 66#KerberosGetAFSToken no
75be3237 67
75be3237 68# Session hooks: if allowed, specify the commands to execute
69#AllowSessionHooks yes
70#SessionHookStartupCmd /bin/true
71#SessionHookShutdownCmd /bin/true
3c0ef626 72
7cac2b65 73# GSSAPI options
74#GSSAPIAuthentication yes
94b7f692 75#GSSAPICleanupCredentials yes
f713db99 76#GSSAPIStrictAcceptorCheck yes
77#GSSAPIKeyExchange yes
7cac2b65 78
7e82606e 79# Set this to 'yes' to enable PAM authentication, account processing,
80# and session processing. If this is enabled, PAM authentication will
30460aeb 81# be allowed through the ChallengeResponseAuthentication and
82# PasswordAuthentication. Depending on your PAM configuration,
83# PAM authentication via ChallengeResponseAuthentication may bypass
84# the setting of "PermitRootLogin without-password".
85# If you just want the PAM account and session checks to run without
86# PAM authentication, then enable this but set PasswordAuthentication
87# and ChallengeResponseAuthentication to 'no'.
540d72c3 88#UsePAM no
75be3237 89
7cac2b65 90#AllowTcpForwarding yes
91#GatewayPorts no
75be3237 92#X11Forwarding no
93#X11DisplayOffset 10
94#X11UseLocalhost yes
95#PrintMotd yes
96#PrintLastLog yes
540d72c3 97#TCPKeepAlive yes
3c0ef626 98#UseLogin no
75be3237 99#UsePrivilegeSeparation yes
100#PermitUserEnvironment no
2ce0bfe4 101#Compression delayed
7cac2b65 102#ClientAliveInterval 0
103#ClientAliveCountMax 3
104#UseDNS yes
105#PidFile /var/run/sshd.pid
75be3237 106#MaxStartups 10
08822d99 107#PermitTunnel no
7cac2b65 108
f713db99 109# no default banner path
110#Banner /some/path
111
112# override default of no subsystems
113Subsystem sftp /usr/libexec/sftp-server
114
a7213e65 115# the following are HPN related configuration options
116# tcp receive buffer polling. enable in autotuning kernels
117#TcpRcvBufPoll no
f713db99 118
a7213e65 119# allow the use of the none cipher
120#NoneEnabled no
121
122# disable hpn performance boosts.
123#HPNDisabled no
124
125# buffer size for hpn to non-hn connections
126#HPNBufferSize 2048
30460aeb 127
a7213e65 128
30460aeb 129# Example of overriding settings on a per-user basis
130#Match User anoncvs
131# X11Forwarding no
132# AllowTcpForwarding no
133# ForceCommand cvs server
This page took 2.841131 seconds and 5 git commands to generate.