1 # $OpenBSD: sshd_config,v 1.41 2001/06/22 21:55:50 markus Exp $
3 # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
5 # This is the sshd server system-wide configuration file. See sshd(8)
6 # for more information.
10 #ListenAddress 0.0.0.0
13 # HostKey for protocol version 1
14 HostKey /etc/ssh_host_key
15 # HostKeys for protocol version 2
16 HostKey /etc/ssh_host_rsa_key
17 HostKey /etc/ssh_host_dsa_key
19 # Lifetime and size of ephemeral version 1 server key
20 KeyRegenerationInterval 3600
26 #obsoletes QuietMode and FascistLogging
35 PubkeyAuthentication yes
36 #AuthorizedKeysFile %h/.ssh/authorized_keys
38 # rhosts authentication should not be used
39 RhostsAuthentication no
40 # Don't read the user's ~/.rhosts and ~/.shosts files
42 # For this to work you will also need host keys in /etc/ssh_known_hosts
43 RhostsRSAAuthentication no
44 # similar for protocol version 2
45 HostbasedAuthentication no
46 # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
47 #IgnoreUserKnownHosts yes
49 # To disable tunneled clear text passwords, change to no here!
50 PasswordAuthentication yes
51 PermitEmptyPasswords no
53 # Uncomment to disable s/key passwords
54 #ChallengeResponseAuthentication no
56 # Uncomment to enable PAM keyboard-interactive authentication
57 # Warning: enabling this may bypass the setting of 'PasswordAuthentication'
58 #PAMAuthenticationViaKbdInt yes
60 # To change Kerberos options
61 #KerberosAuthentication no
62 #KerberosOrLocalPasswd yes
64 #KerberosTicketCleanup no
66 # Kerberos TGT Passing does only work with the AFS kaserver
67 #KerberosTgtPassing yes
78 #Banner /etc/issue.net
79 #ReverseMappingCheck yes
81 Subsystem sftp /usr/libexec/sftp-server