]>
Commit | Line | Data |
---|---|---|
1 | # $OpenBSD: sshd_config,v 1.77 2008/02/08 23:24:07 djm Exp $ | |
2 | ||
3 | # This is the sshd server system-wide configuration file. See | |
4 | # sshd_config(5) for more information. | |
5 | ||
6 | # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin | |
7 | ||
8 | # The strategy used for options in the default sshd_config shipped with | |
9 | # OpenSSH is to specify options with their default value where | |
10 | # possible, but leave them commented. Uncommented options change a | |
11 | # default value. | |
12 | ||
13 | #Port 22 | |
14 | #AddressFamily any | |
15 | #ListenAddress 0.0.0.0 | |
16 | #ListenAddress :: | |
17 | ||
18 | # Disable legacy (protocol version 1) support in the server for new | |
19 | # installations. In future the default will change to require explicit | |
20 | # activation of protocol 1 | |
21 | Protocol 2 | |
22 | ||
23 | # HostKey for protocol version 1 | |
24 | #HostKey /etc/ssh/ssh_host_key | |
25 | # HostKeys for protocol version 2 | |
26 | #HostKey /etc/ssh/ssh_host_rsa_key | |
27 | #HostKey /etc/ssh/ssh_host_dsa_key | |
28 | ||
29 | # Lifetime and size of ephemeral version 1 server key | |
30 | #KeyRegenerationInterval 1h | |
31 | #ServerKeyBits 768 | |
32 | ||
33 | # Logging | |
34 | # obsoletes QuietMode and FascistLogging | |
35 | #SyslogFacility AUTH | |
36 | #LogLevel INFO | |
37 | ||
38 | # Authentication: | |
39 | ||
40 | #LoginGraceTime 2m | |
41 | #PermitRootLogin yes | |
42 | #StrictModes yes | |
43 | #MaxAuthTries 6 | |
44 | ||
45 | #RSAAuthentication yes | |
46 | #PubkeyAuthentication yes | |
47 | #AuthorizedKeysFile .ssh/authorized_keys | |
48 | ||
49 | # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts | |
50 | #RhostsRSAAuthentication no | |
51 | # similar for protocol version 2 | |
52 | #HostbasedAuthentication no | |
53 | # Change to yes if you don't trust ~/.ssh/known_hosts for | |
54 | # RhostsRSAAuthentication and HostbasedAuthentication | |
55 | #IgnoreUserKnownHosts no | |
56 | # Don't read the user's ~/.rhosts and ~/.shosts files | |
57 | #IgnoreRhosts yes | |
58 | ||
59 | # To disable tunneled clear text passwords, change to no here! | |
60 | #PasswordAuthentication yes | |
61 | #PermitEmptyPasswords no | |
62 | ||
63 | # Change to no to disable s/key passwords | |
64 | #ChallengeResponseAuthentication yes | |
65 | ||
66 | # Kerberos options | |
67 | #KerberosAuthentication no | |
68 | #KerberosOrLocalPasswd yes | |
69 | #KerberosTicketCleanup yes | |
70 | #KerberosGetAFSToken no | |
71 | ||
72 | # GSSAPI options | |
73 | #GSSAPIAuthentication no | |
74 | #GSSAPICleanupCredentials yes | |
75 | ||
76 | # Set this to 'yes' to enable PAM authentication, account processing, | |
77 | # and session processing. If this is enabled, PAM authentication will | |
78 | # be allowed through the ChallengeResponseAuthentication and | |
79 | # PasswordAuthentication. Depending on your PAM configuration, | |
80 | # PAM authentication via ChallengeResponseAuthentication may bypass | |
81 | # the setting of "PermitRootLogin without-password". | |
82 | # If you just want the PAM account and session checks to run without | |
83 | # PAM authentication, then enable this but set PasswordAuthentication | |
84 | # and ChallengeResponseAuthentication to 'no'. | |
85 | #UsePAM no | |
86 | ||
87 | #AllowTcpForwarding yes | |
88 | #GatewayPorts no | |
89 | #X11Forwarding no | |
90 | #X11DisplayOffset 10 | |
91 | #X11UseLocalhost yes | |
92 | #PrintMotd yes | |
93 | #PrintLastLog yes | |
94 | #TCPKeepAlive yes | |
95 | #UseLogin no | |
96 | #UsePrivilegeSeparation yes | |
97 | #PermitUserEnvironment no | |
98 | #Compression delayed | |
99 | #ClientAliveInterval 0 | |
100 | #ClientAliveCountMax 3 | |
101 | #UseDNS yes | |
102 | #PidFile /var/run/sshd.pid | |
103 | #MaxStartups 10 | |
104 | #PermitTunnel no | |
105 | #ChrootDirectory none | |
106 | ||
107 | # no default banner path | |
108 | #Banner none | |
109 | ||
110 | # override default of no subsystems | |
111 | Subsystem sftp /usr/libexec/sftp-server | |
112 | ||
113 | # Example of overriding settings on a per-user basis | |
114 | #Match User anoncvs | |
115 | # X11Forwarding no | |
116 | # AllowTcpForwarding no | |
117 | # ForceCommand cvs server |