]> andersk Git - openssh.git/blame - sshd_config
- djm@cvs.openbsd.org 2010/01/30 02:54:53
[openssh.git] / sshd_config
CommitLineData
21af5fc4 1# $OpenBSD: sshd_config,v 1.81 2009/10/08 14:03:41 markus Exp $
b2d818e6 2
54e5539d 3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
8efc0c15 5
70e2f2f3 6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
d9959c61 8# The strategy used for options in the default sshd_config shipped with
ac10636f 9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
31b41ceb 14#AddressFamily any
adc83ebf 15#ListenAddress 0.0.0.0
48e671d5 16#ListenAddress ::
a98da4aa 17
21af5fc4 18# The default requires explicit activation of protocol 1
19#Protocol 2
e93309c3 20
a98da4aa 21# HostKey for protocol version 1
2a8a6488 22#HostKey /etc/ssh/ssh_host_key
a98da4aa 23# HostKeys for protocol version 2
2a8a6488 24#HostKey /etc/ssh/ssh_host_rsa_key
25#HostKey /etc/ssh/ssh_host_dsa_key
a98da4aa 26
27# Lifetime and size of ephemeral version 1 server key
4db4d313 28#KeyRegenerationInterval 1h
39ceddb7 29#ServerKeyBits 1024
dd092f97 30
5f4fdfae 31# Logging
05ad7fe0 32# obsoletes QuietMode and FascistLogging
ac10636f 33#SyslogFacility AUTH
34#LogLevel INFO
272b7f60 35
a98da4aa 36# Authentication:
37
4db4d313 38#LoginGraceTime 2m
ac10636f 39#PermitRootLogin yes
40#StrictModes yes
af4bd935 41#MaxAuthTries 6
c6dca55e 42#MaxSessions 10
a98da4aa 43
ac10636f 44#RSAAuthentication yes
45#PubkeyAuthentication yes
46#AuthorizedKeysFile .ssh/authorized_keys
a98da4aa 47
2a8a6488 48# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
ac10636f 49#RhostsRSAAuthentication no
8002af61 50# similar for protocol version 2
ac10636f 51#HostbasedAuthentication no
52# Change to yes if you don't trust ~/.ssh/known_hosts for
53# RhostsRSAAuthentication and HostbasedAuthentication
54#IgnoreUserKnownHosts no
0598d99d 55# Don't read the user's ~/.rhosts and ~/.shosts files
56#IgnoreRhosts yes
8efc0c15 57
58# To disable tunneled clear text passwords, change to no here!
ac10636f 59#PasswordAuthentication yes
60#PermitEmptyPasswords no
10f72868 61
ac10636f 62# Change to no to disable s/key passwords
63#ChallengeResponseAuthentication yes
8efc0c15 64
ac10636f 65# Kerberos options
eadc806d 66#KerberosAuthentication no
8efc0c15 67#KerberosOrLocalPasswd yes
ac10636f 68#KerberosTicketCleanup yes
a1e30b47 69#KerberosGetAFSToken no
ac10636f 70
7364bd04 71# GSSAPI options
72#GSSAPIAuthentication no
e377c083 73#GSSAPICleanupCredentials yes
7364bd04 74
73e81988 75# Set this to 'yes' to enable PAM authentication, account processing,
76# and session processing. If this is enabled, PAM authentication will
05059810 77# be allowed through the ChallengeResponseAuthentication and
78# PasswordAuthentication. Depending on your PAM configuration,
79# PAM authentication via ChallengeResponseAuthentication may bypass
80# the setting of "PermitRootLogin without-password".
81# If you just want the PAM account and session checks to run without
82# PAM authentication, then enable this but set PasswordAuthentication
83# and ChallengeResponseAuthentication to 'no'.
1b4ba39b 84#UsePAM no
5f4fdfae 85
5c7e2b47 86#AllowAgentForwarding yes
4db4d313 87#AllowTcpForwarding yes
88#GatewayPorts no
ac10636f 89#X11Forwarding no
90#X11DisplayOffset 10
e6e573bd 91#X11UseLocalhost yes
ac10636f 92#PrintMotd yes
93#PrintLastLog yes
6bb49a16 94#TCPKeepAlive yes
10fa00c8 95#UseLogin no
2ee1b704 96#UsePrivilegeSeparation yes
f00bab84 97#PermitUserEnvironment no
07200973 98#Compression delayed
4db4d313 99#ClientAliveInterval 0
100#ClientAliveCountMax 3
101#UseDNS yes
102#PidFile /var/run/sshd.pid
ac10636f 103#MaxStartups 10
d20f3c9e 104#PermitTunnel no
db49deeb 105#ChrootDirectory none
4db4d313 106
ac10636f 107# no default banner path
ba8cfba6 108#Banner none
7bbcc167 109
ac10636f 110# override default of no subsystems
7bbcc167 111Subsystem sftp /usr/libexec/sftp-server
e7259e8d 112
113# Example of overriding settings on a per-user basis
114#Match User anoncvs
115# X11Forwarding no
116# AllowTcpForwarding no
117# ForceCommand cvs server
This page took 0.343482 seconds and 5 git commands to generate.