]> andersk Git - gssapi-openssh.git/blame_incremental - openssh/sshd_config
Move ssh_gssapi_support_oids() to correct position in file to avoid diff.
[gssapi-openssh.git] / openssh / sshd_config
... / ...
CommitLineData
1# $OpenBSD: sshd_config,v 1.75 2007/03/19 01:01:29 djm Exp $
2
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
14#AddressFamily any
15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
18# Disable legacy (protocol version 1) support in the server for new
19# installations. In future the default will change to require explicit
20# activation of protocol 1
21Protocol 2
22
23# HostKey for protocol version 1
24#HostKey /etc/ssh/ssh_host_key
25# HostKeys for protocol version 2
26#HostKey /etc/ssh/ssh_host_rsa_key
27#HostKey /etc/ssh/ssh_host_dsa_key
28
29# Lifetime and size of ephemeral version 1 server key
30#KeyRegenerationInterval 1h
31#ServerKeyBits 768
32
33# Logging
34# obsoletes QuietMode and FascistLogging
35#SyslogFacility AUTH
36#LogLevel INFO
37
38# Authentication:
39
40#LoginGraceTime 2m
41#PermitRootLogin yes
42#StrictModes yes
43#MaxAuthTries 6
44
45#RSAAuthentication yes
46#PubkeyAuthentication yes
47#AuthorizedKeysFile .ssh/authorized_keys
48
49# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
50#RhostsRSAAuthentication no
51# similar for protocol version 2
52#HostbasedAuthentication no
53# Change to yes if you don't trust ~/.ssh/known_hosts for
54# RhostsRSAAuthentication and HostbasedAuthentication
55#IgnoreUserKnownHosts no
56# Don't read the user's ~/.rhosts and ~/.shosts files
57#IgnoreRhosts yes
58
59# To disable tunneled clear text passwords, change to no here!
60#PasswordAuthentication yes
61#PermitEmptyPasswords no
62
63# Change to no to disable s/key passwords
64#ChallengeResponseAuthentication yes
65
66# Kerberos options
67#KerberosAuthentication no
68#KerberosOrLocalPasswd yes
69#KerberosTicketCleanup yes
70#KerberosGetAFSToken no
71
72# Session hooks: if allowed, specify the commands to execute
73#AllowSessionHooks yes
74#SessionHookStartupCmd /bin/true
75#SessionHookShutdownCmd /bin/true
76
77# GSSAPI options
78#GSSAPIAuthentication yes
79#GSSAPICleanupCredentials yes
80#GSSAPIStrictAcceptorCheck yes
81#GSSAPIKeyExchange yes
82
83# Set this to 'yes' to enable PAM authentication, account processing,
84# and session processing. If this is enabled, PAM authentication will
85# be allowed through the ChallengeResponseAuthentication and
86# PasswordAuthentication. Depending on your PAM configuration,
87# PAM authentication via ChallengeResponseAuthentication may bypass
88# the setting of "PermitRootLogin without-password".
89# If you just want the PAM account and session checks to run without
90# PAM authentication, then enable this but set PasswordAuthentication
91# and ChallengeResponseAuthentication to 'no'.
92#UsePAM no
93
94#AllowTcpForwarding yes
95#GatewayPorts no
96#X11Forwarding no
97#X11DisplayOffset 10
98#X11UseLocalhost yes
99#PrintMotd yes
100#PrintLastLog yes
101#TCPKeepAlive yes
102#UseLogin no
103#UsePrivilegeSeparation yes
104#PermitUserEnvironment no
105#Compression delayed
106#ClientAliveInterval 0
107#ClientAliveCountMax 3
108#UseDNS yes
109#PidFile /var/run/sshd.pid
110#MaxStartups 10
111#PermitTunnel no
112
113# no default banner path
114#Banner /some/path
115
116# override default of no subsystems
117Subsystem sftp /usr/libexec/sftp-server
118
119
120# the following are HPN related configuration options
121# tcp receive buffer polling. enable in autotuning kernels
122#TcpRcvBufPoll no
123
124# allow the use of the none cipher
125#NoneEnabled no
126
127# disable hpn performance boosts.
128#HPNDisabled no
129
130# buffer size for hpn to non-hn connections
131#HPNBufferSize 2048
132
133
134# Example of overriding settings on a per-user basis
135#Match User anoncvs
136# X11Forwarding no
137# AllowTcpForwarding no
138# ForceCommand cvs server
This page took 0.160208 seconds and 5 git commands to generate.