]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config
Move ssh_gssapi_support_oids() to correct position in file to avoid diff.
[gssapi-openssh.git] / openssh / sshd_config
CommitLineData
fa0f0f45 1# $OpenBSD: sshd_config,v 1.75 2007/03/19 01:01:29 djm Exp $
75be3237 2
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
3c0ef626 5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
75be3237 8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
3c0ef626 12
75be3237 13#Port 22
dfddba3d 14#AddressFamily any
3c0ef626 15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
fa0f0f45 18# Disable legacy (protocol version 1) support in the server for new
19# installations. In future the default will change to require explicit
20# activation of protocol 1
21Protocol 2
22
3c0ef626 23# HostKey for protocol version 1
75be3237 24#HostKey /etc/ssh/ssh_host_key
3c0ef626 25# HostKeys for protocol version 2
75be3237 26#HostKey /etc/ssh/ssh_host_rsa_key
27#HostKey /etc/ssh/ssh_host_dsa_key
3c0ef626 28
29# Lifetime and size of ephemeral version 1 server key
7cac2b65 30#KeyRegenerationInterval 1h
75be3237 31#ServerKeyBits 768
3c0ef626 32
33# Logging
2ce0bfe4 34# obsoletes QuietMode and FascistLogging
75be3237 35#SyslogFacility AUTH
36#LogLevel INFO
3c0ef626 37
38# Authentication:
39
7cac2b65 40#LoginGraceTime 2m
75be3237 41#PermitRootLogin yes
42#StrictModes yes
7e82606e 43#MaxAuthTries 6
3c0ef626 44
75be3237 45#RSAAuthentication yes
46#PubkeyAuthentication yes
47#AuthorizedKeysFile .ssh/authorized_keys
3c0ef626 48
75be3237 49# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
50#RhostsRSAAuthentication no
3c0ef626 51# similar for protocol version 2
75be3237 52#HostbasedAuthentication no
53# Change to yes if you don't trust ~/.ssh/known_hosts for
54# RhostsRSAAuthentication and HostbasedAuthentication
55#IgnoreUserKnownHosts no
7cac2b65 56# Don't read the user's ~/.rhosts and ~/.shosts files
57#IgnoreRhosts yes
3c0ef626 58
59# To disable tunneled clear text passwords, change to no here!
75be3237 60#PasswordAuthentication yes
61#PermitEmptyPasswords no
3c0ef626 62
75be3237 63# Change to no to disable s/key passwords
64#ChallengeResponseAuthentication yes
3c0ef626 65
75be3237 66# Kerberos options
3c0ef626 67#KerberosAuthentication no
68#KerberosOrLocalPasswd yes
75be3237 69#KerberosTicketCleanup yes
540d72c3 70#KerberosGetAFSToken no
75be3237 71
75be3237 72# Session hooks: if allowed, specify the commands to execute
73#AllowSessionHooks yes
74#SessionHookStartupCmd /bin/true
75#SessionHookShutdownCmd /bin/true
3c0ef626 76
7cac2b65 77# GSSAPI options
78#GSSAPIAuthentication yes
94b7f692 79#GSSAPICleanupCredentials yes
f713db99 80#GSSAPIStrictAcceptorCheck yes
81#GSSAPIKeyExchange yes
7cac2b65 82
7e82606e 83# Set this to 'yes' to enable PAM authentication, account processing,
84# and session processing. If this is enabled, PAM authentication will
30460aeb 85# be allowed through the ChallengeResponseAuthentication and
86# PasswordAuthentication. Depending on your PAM configuration,
87# PAM authentication via ChallengeResponseAuthentication may bypass
88# the setting of "PermitRootLogin without-password".
89# If you just want the PAM account and session checks to run without
90# PAM authentication, then enable this but set PasswordAuthentication
91# and ChallengeResponseAuthentication to 'no'.
540d72c3 92#UsePAM no
75be3237 93
7cac2b65 94#AllowTcpForwarding yes
95#GatewayPorts no
75be3237 96#X11Forwarding no
97#X11DisplayOffset 10
98#X11UseLocalhost yes
99#PrintMotd yes
100#PrintLastLog yes
540d72c3 101#TCPKeepAlive yes
3c0ef626 102#UseLogin no
75be3237 103#UsePrivilegeSeparation yes
104#PermitUserEnvironment no
2ce0bfe4 105#Compression delayed
7cac2b65 106#ClientAliveInterval 0
107#ClientAliveCountMax 3
108#UseDNS yes
109#PidFile /var/run/sshd.pid
75be3237 110#MaxStartups 10
08822d99 111#PermitTunnel no
7cac2b65 112
f713db99 113# no default banner path
114#Banner /some/path
115
116# override default of no subsystems
117Subsystem sftp /usr/libexec/sftp-server
118
4834571d 119
a7213e65 120# the following are HPN related configuration options
121# tcp receive buffer polling. enable in autotuning kernels
122#TcpRcvBufPoll no
f713db99 123
a7213e65 124# allow the use of the none cipher
125#NoneEnabled no
126
127# disable hpn performance boosts.
128#HPNDisabled no
129
130# buffer size for hpn to non-hn connections
131#HPNBufferSize 2048
30460aeb 132
a7213e65 133
30460aeb 134# Example of overriding settings on a per-user basis
135#Match User anoncvs
136# X11Forwarding no
137# AllowTcpForwarding no
138# ForceCommand cvs server
This page took 0.092979 seconds and 5 git commands to generate.