]> andersk Git - openssh.git/blame - sshd_config
- pyr@cvs.openbsd.org 2008/05/07 05:49:37
[openssh.git] / sshd_config
CommitLineData
db49deeb 1# $OpenBSD: sshd_config,v 1.77 2008/02/08 23:24:07 djm Exp $
b2d818e6 2
54e5539d 3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
8efc0c15 5
70e2f2f3 6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
d9959c61 8# The strategy used for options in the default sshd_config shipped with
ac10636f 9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
31b41ceb 14#AddressFamily any
adc83ebf 15#ListenAddress 0.0.0.0
48e671d5 16#ListenAddress ::
a98da4aa 17
e93309c3 18# Disable legacy (protocol version 1) support in the server for new
19# installations. In future the default will change to require explicit
20# activation of protocol 1
21Protocol 2
22
a98da4aa 23# HostKey for protocol version 1
2a8a6488 24#HostKey /etc/ssh/ssh_host_key
a98da4aa 25# HostKeys for protocol version 2
2a8a6488 26#HostKey /etc/ssh/ssh_host_rsa_key
27#HostKey /etc/ssh/ssh_host_dsa_key
a98da4aa 28
29# Lifetime and size of ephemeral version 1 server key
4db4d313 30#KeyRegenerationInterval 1h
ac10636f 31#ServerKeyBits 768
dd092f97 32
5f4fdfae 33# Logging
05ad7fe0 34# obsoletes QuietMode and FascistLogging
ac10636f 35#SyslogFacility AUTH
36#LogLevel INFO
272b7f60 37
a98da4aa 38# Authentication:
39
4db4d313 40#LoginGraceTime 2m
ac10636f 41#PermitRootLogin yes
42#StrictModes yes
af4bd935 43#MaxAuthTries 6
a98da4aa 44
ac10636f 45#RSAAuthentication yes
46#PubkeyAuthentication yes
47#AuthorizedKeysFile .ssh/authorized_keys
a98da4aa 48
2a8a6488 49# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
ac10636f 50#RhostsRSAAuthentication no
8002af61 51# similar for protocol version 2
ac10636f 52#HostbasedAuthentication no
53# Change to yes if you don't trust ~/.ssh/known_hosts for
54# RhostsRSAAuthentication and HostbasedAuthentication
55#IgnoreUserKnownHosts no
0598d99d 56# Don't read the user's ~/.rhosts and ~/.shosts files
57#IgnoreRhosts yes
8efc0c15 58
59# To disable tunneled clear text passwords, change to no here!
ac10636f 60#PasswordAuthentication yes
61#PermitEmptyPasswords no
10f72868 62
ac10636f 63# Change to no to disable s/key passwords
64#ChallengeResponseAuthentication yes
8efc0c15 65
ac10636f 66# Kerberos options
eadc806d 67#KerberosAuthentication no
8efc0c15 68#KerberosOrLocalPasswd yes
ac10636f 69#KerberosTicketCleanup yes
a1e30b47 70#KerberosGetAFSToken no
ac10636f 71
7364bd04 72# GSSAPI options
73#GSSAPIAuthentication no
e377c083 74#GSSAPICleanupCredentials yes
7364bd04 75
73e81988 76# Set this to 'yes' to enable PAM authentication, account processing,
77# and session processing. If this is enabled, PAM authentication will
05059810 78# be allowed through the ChallengeResponseAuthentication and
79# PasswordAuthentication. Depending on your PAM configuration,
80# PAM authentication via ChallengeResponseAuthentication may bypass
81# the setting of "PermitRootLogin without-password".
82# If you just want the PAM account and session checks to run without
83# PAM authentication, then enable this but set PasswordAuthentication
84# and ChallengeResponseAuthentication to 'no'.
1b4ba39b 85#UsePAM no
5f4fdfae 86
4db4d313 87#AllowTcpForwarding yes
88#GatewayPorts no
ac10636f 89#X11Forwarding no
90#X11DisplayOffset 10
e6e573bd 91#X11UseLocalhost yes
ac10636f 92#PrintMotd yes
93#PrintLastLog yes
6bb49a16 94#TCPKeepAlive yes
10fa00c8 95#UseLogin no
2ee1b704 96#UsePrivilegeSeparation yes
f00bab84 97#PermitUserEnvironment no
07200973 98#Compression delayed
4db4d313 99#ClientAliveInterval 0
100#ClientAliveCountMax 3
101#UseDNS yes
102#PidFile /var/run/sshd.pid
ac10636f 103#MaxStartups 10
d20f3c9e 104#PermitTunnel no
db49deeb 105#ChrootDirectory none
4db4d313 106
ac10636f 107# no default banner path
ba8cfba6 108#Banner none
7bbcc167 109
ac10636f 110# override default of no subsystems
7bbcc167 111Subsystem sftp /usr/libexec/sftp-server
e7259e8d 112
113# Example of overriding settings on a per-user basis
114#Match User anoncvs
115# X11Forwarding no
116# AllowTcpForwarding no
117# ForceCommand cvs server
This page took 0.313114 seconds and 5 git commands to generate.