]> andersk Git - gssapi-openssh.git/blame_incremental - openssh/sshd_config
use globus_gss_assist_map_and_authorize() if it's available instead of
[gssapi-openssh.git] / openssh / sshd_config
... / ...
CommitLineData
1# $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
2
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
14#Protocol 2,1
15#AddressFamily any
16#ListenAddress 0.0.0.0
17#ListenAddress ::
18
19# HostKey for protocol version 1
20#HostKey /etc/ssh/ssh_host_key
21# HostKeys for protocol version 2
22#HostKey /etc/ssh/ssh_host_rsa_key
23#HostKey /etc/ssh/ssh_host_dsa_key
24
25# Lifetime and size of ephemeral version 1 server key
26#KeyRegenerationInterval 1h
27#ServerKeyBits 768
28
29# Logging
30# obsoletes QuietMode and FascistLogging
31#SyslogFacility AUTH
32#LogLevel INFO
33
34# Authentication:
35
36#LoginGraceTime 2m
37#PermitRootLogin yes
38#StrictModes yes
39#MaxAuthTries 6
40
41#RSAAuthentication yes
42#PubkeyAuthentication yes
43#AuthorizedKeysFile .ssh/authorized_keys
44
45# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
46#RhostsRSAAuthentication no
47# similar for protocol version 2
48#HostbasedAuthentication no
49# Change to yes if you don't trust ~/.ssh/known_hosts for
50# RhostsRSAAuthentication and HostbasedAuthentication
51#IgnoreUserKnownHosts no
52# Don't read the user's ~/.rhosts and ~/.shosts files
53#IgnoreRhosts yes
54
55# To disable tunneled clear text passwords, change to no here!
56#PasswordAuthentication yes
57#PermitEmptyPasswords no
58
59# Change to no to disable s/key passwords
60#ChallengeResponseAuthentication yes
61
62# Kerberos options
63#KerberosAuthentication no
64#KerberosOrLocalPasswd yes
65#KerberosTicketCleanup yes
66#KerberosGetAFSToken no
67
68# Session hooks: if allowed, specify the commands to execute
69#AllowSessionHooks yes
70#SessionHookStartupCmd /bin/true
71#SessionHookShutdownCmd /bin/true
72
73# GSSAPI options
74#GSSAPIAuthentication yes
75#GSSAPICleanupCredentials yes
76
77# Set this to 'yes' to enable PAM authentication, account processing,
78# and session processing. If this is enabled, PAM authentication will
79# be allowed through the ChallengeResponseAuthentication mechanism.
80# Depending on your PAM configuration, this may bypass the setting of
81# PasswordAuthentication, PermitEmptyPasswords, and
82# "PermitRootLogin without-password". If you just want the PAM account and
83# session checks to run without PAM authentication, then enable this but set
84# ChallengeResponseAuthentication=no
85#UsePAM no
86
87#AllowTcpForwarding yes
88#GatewayPorts no
89#X11Forwarding no
90#X11DisplayOffset 10
91#X11UseLocalhost yes
92#PrintMotd yes
93#PrintLastLog yes
94#TCPKeepAlive yes
95#UseLogin no
96#UsePrivilegeSeparation yes
97#PermitUserEnvironment no
98#Compression delayed
99#ClientAliveInterval 0
100#ClientAliveCountMax 3
101#UseDNS yes
102#PidFile /var/run/sshd.pid
103#MaxStartups 10
104#PermitTunnel no
105
106# no default banner path
107#Banner /some/path
108
109# override default of no subsystems
110Subsystem sftp /usr/libexec/sftp-server
This page took 0.060666 seconds and 5 git commands to generate.