]> andersk Git - gssapi-openssh.git/blame_incremental - setup/sshd_config.in
PermitPAMUserChange added
[gssapi-openssh.git] / setup / sshd_config.in
... / ...
CommitLineData
1# $OpenBSD: sshd_config,v 1.80 2008/07/02 02:24:18 djm Exp $
2
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
14#AddressFamily any
15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
18# Disable legacy (protocol version 1) support in the server for new
19# installations. In future the default will change to require explicit
20# activation of protocol 1
21Protocol 2
22
23# HostKey for protocol version 1
24#HostKey /etc/ssh/ssh_host_key
25# HostKeys for protocol version 2
26#HostKey /etc/ssh/ssh_host_rsa_key
27#HostKey /etc/ssh/ssh_host_dsa_key
28
29# Lifetime and size of ephemeral version 1 server key
30#KeyRegenerationInterval 1h
31#ServerKeyBits 1024
32
33# Logging
34# obsoletes QuietMode and FascistLogging
35#SyslogFacility AUTH
36#LogLevel INFO
37
38# Authentication:
39
40#LoginGraceTime 2m
41#PermitRootLogin yes
42#StrictModes yes
43#MaxAuthTries 6
44#MaxSessions 10
45
46#RSAAuthentication yes
47#PubkeyAuthentication yes
48#AuthorizedKeysFile .ssh/authorized_keys
49
50# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
51#RhostsRSAAuthentication no
52# similar for protocol version 2
53#HostbasedAuthentication no
54# Change to yes if you don't trust ~/.ssh/known_hosts for
55# RhostsRSAAuthentication and HostbasedAuthentication
56#IgnoreUserKnownHosts no
57# Don't read the user's ~/.rhosts and ~/.shosts files
58#IgnoreRhosts yes
59
60# To disable tunneled clear text passwords, change to no here!
61#PasswordAuthentication yes
62#PermitEmptyPasswords no
63
64# Change to no to disable s/key passwords
65#ChallengeResponseAuthentication yes
66
67# Kerberos options
68#KerberosAuthentication no
69#KerberosOrLocalPasswd yes
70#KerberosTicketCleanup yes
71#KerberosGetAFSToken no
72
73# Session hooks: if allowed, specify the commands to execute
74#AllowSessionHooks yes
75#SessionHookStartupCmd /bin/true
76#SessionHookShutdownCmd /bin/true
77
78# GSSAPI options
79#GSSAPIAuthentication yes
80#GSSAPIDelegateCredentials yes
81#GSSAPICleanupCredentials yes
82#GSSAPIStrictAcceptorCheck yes
83#GSSAPIKeyExchange yes
84
85# Set this to 'yes' to enable PAM authentication, account processing,
86# and session processing. If this is enabled, PAM authentication will
87# be allowed through the ChallengeResponseAuthentication and
88# PasswordAuthentication. Depending on your PAM configuration,
89# PAM authentication via ChallengeResponseAuthentication may bypass
90# the setting of "PermitRootLogin without-password".
91# If you just want the PAM account and session checks to run without
92# PAM authentication, then enable this but set PasswordAuthentication
93# and ChallengeResponseAuthentication to 'no'.
94#UsePAM yes
95
96# Set to 'yes' to allow the PAM stack to change the user name during
97# calls to authentication
98#PermitPAMUserChange no
99
100#AllowAgentForwarding yes
101#AllowTcpForwarding yes
102#GatewayPorts no
103X11Forwarding yes
104#X11DisplayOffset 10
105#X11UseLocalhost yes
106#PrintMotd yes
107#PrintLastLog yes
108#TCPKeepAlive yes
109#UseLogin no
110#UsePrivilegeSeparation yes
111#PermitUserEnvironment no
112#Compression delayed
113#ClientAliveInterval 0
114#ClientAliveCountMax 3
115#UseDNS yes
116#PidFile /var/run/sshd.pid
117#MaxStartups 10
118#PermitTunnel no
119#ChrootDirectory none
120
121# no default banner path
122#Banner none
123
124# override default of no subsystems
125Subsystem sftp /usr/libexec/sftp-server
126
127# the following are HPN related configuration options
128# tcp receive buffer polling. disable in non autotuning kernels
129#TcpRcvBufPoll yes
130
131# allow the use of the none cipher
132#NoneEnabled no
133
134# disable hpn performance boosts.
135#HPNDisabled no
136
137# buffer size for hpn to non-hpn connections
138#HPNBufferSize 2048
139
140
141# Example of overriding settings on a per-user basis
142#Match User anoncvs
143# X11Forwarding no
144# AllowTcpForwarding no
145# ForceCommand cvs server
This page took 1.332337 seconds and 5 git commands to generate.