]> andersk Git - openssh.git/blame_incremental - sshd_config
- djm@cvs.openbsd.org 2010/01/30 02:54:53
[openssh.git] / sshd_config
... / ...
CommitLineData
1# $OpenBSD: sshd_config,v 1.81 2009/10/08 14:03:41 markus Exp $
2
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented. Uncommented options change a
11# default value.
12
13#Port 22
14#AddressFamily any
15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
18# The default requires explicit activation of protocol 1
19#Protocol 2
20
21# HostKey for protocol version 1
22#HostKey /etc/ssh/ssh_host_key
23# HostKeys for protocol version 2
24#HostKey /etc/ssh/ssh_host_rsa_key
25#HostKey /etc/ssh/ssh_host_dsa_key
26
27# Lifetime and size of ephemeral version 1 server key
28#KeyRegenerationInterval 1h
29#ServerKeyBits 1024
30
31# Logging
32# obsoletes QuietMode and FascistLogging
33#SyslogFacility AUTH
34#LogLevel INFO
35
36# Authentication:
37
38#LoginGraceTime 2m
39#PermitRootLogin yes
40#StrictModes yes
41#MaxAuthTries 6
42#MaxSessions 10
43
44#RSAAuthentication yes
45#PubkeyAuthentication yes
46#AuthorizedKeysFile .ssh/authorized_keys
47
48# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
49#RhostsRSAAuthentication no
50# similar for protocol version 2
51#HostbasedAuthentication no
52# Change to yes if you don't trust ~/.ssh/known_hosts for
53# RhostsRSAAuthentication and HostbasedAuthentication
54#IgnoreUserKnownHosts no
55# Don't read the user's ~/.rhosts and ~/.shosts files
56#IgnoreRhosts yes
57
58# To disable tunneled clear text passwords, change to no here!
59#PasswordAuthentication yes
60#PermitEmptyPasswords no
61
62# Change to no to disable s/key passwords
63#ChallengeResponseAuthentication yes
64
65# Kerberos options
66#KerberosAuthentication no
67#KerberosOrLocalPasswd yes
68#KerberosTicketCleanup yes
69#KerberosGetAFSToken no
70
71# GSSAPI options
72#GSSAPIAuthentication no
73#GSSAPICleanupCredentials yes
74
75# Set this to 'yes' to enable PAM authentication, account processing,
76# and session processing. If this is enabled, PAM authentication will
77# be allowed through the ChallengeResponseAuthentication and
78# PasswordAuthentication. Depending on your PAM configuration,
79# PAM authentication via ChallengeResponseAuthentication may bypass
80# the setting of "PermitRootLogin without-password".
81# If you just want the PAM account and session checks to run without
82# PAM authentication, then enable this but set PasswordAuthentication
83# and ChallengeResponseAuthentication to 'no'.
84#UsePAM no
85
86#AllowAgentForwarding yes
87#AllowTcpForwarding yes
88#GatewayPorts no
89#X11Forwarding no
90#X11DisplayOffset 10
91#X11UseLocalhost yes
92#PrintMotd yes
93#PrintLastLog yes
94#TCPKeepAlive yes
95#UseLogin no
96#UsePrivilegeSeparation yes
97#PermitUserEnvironment no
98#Compression delayed
99#ClientAliveInterval 0
100#ClientAliveCountMax 3
101#UseDNS yes
102#PidFile /var/run/sshd.pid
103#MaxStartups 10
104#PermitTunnel no
105#ChrootDirectory none
106
107# no default banner path
108#Banner none
109
110# override default of no subsystems
111Subsystem sftp /usr/libexec/sftp-server
112
113# Example of overriding settings on a per-user basis
114#Match User anoncvs
115# X11Forwarding no
116# AllowTcpForwarding no
117# ForceCommand cvs server
This page took 0.078507 seconds and 5 git commands to generate.