version 1.1, 2014/01/23 09:25:35
|
version 1.2, 2014/09/15 19:06:54
|
Line 0
|
Line 1
|
|
# $OpenBSD: sshd_config,v 1.82 2010/09/06 17:10:19 naddy Exp $ |
|
# $FreeBSD: src/crypto/openssh/sshd_config,v 1.55 2011/05/04 07:34:44 des Exp $ |
|
|
|
# This is the sshd server system-wide configuration file. See |
|
# sshd_config(5) for more information. |
|
|
|
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin |
|
|
|
# The strategy used for options in the default sshd_config shipped with |
|
# OpenSSH is to specify options with their default value where |
|
# possible, but leave them commented. Uncommented options change a |
|
# default value. |
|
|
|
# Note that some of FreeBSD's defaults differ from OpenBSD's, and |
|
# FreeBSD has a few additional options. |
|
|
|
#VersionAddendum FreeBSD-20110503 |
|
|
|
#Port 22 |
|
#AddressFamily any |
|
#ListenAddress 0.0.0.0 |
|
#ListenAddress :: |
|
|
|
# The default requires explicit activation of protocol 1 |
|
#Protocol 2 |
|
|
|
# HostKey for protocol version 1 |
|
#HostKey /etc/ssh/ssh_host_key |
|
# HostKeys for protocol version 2 |
|
#HostKey /etc/ssh/ssh_host_rsa_key |
|
#HostKey /etc/ssh/ssh_host_dsa_key |
|
#HostKey /etc/ssh/ssh_host_ecdsa_key |
|
|
|
# Lifetime and size of ephemeral version 1 server key |
|
#KeyRegenerationInterval 1h |
|
#ServerKeyBits 1024 |
|
|
|
# Logging |
|
# obsoletes QuietMode and FascistLogging |
|
#SyslogFacility AUTH |
|
#LogLevel INFO |
|
|
|
# Authentication: |
|
|
|
#LoginGraceTime 2m |
|
PermitRootLogin yes |
|
#StrictModes yes |
|
#MaxAuthTries 6 |
|
#MaxSessions 10 |
|
|
|
#RSAAuthentication yes |
|
#PubkeyAuthentication yes |
|
#AuthorizedKeysFile .ssh/authorized_keys |
|
|
|
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts |
|
#RhostsRSAAuthentication no |
|
# similar for protocol version 2 |
|
#HostbasedAuthentication no |
|
# Change to yes if you don't trust ~/.ssh/known_hosts for |
|
# RhostsRSAAuthentication and HostbasedAuthentication |
|
#IgnoreUserKnownHosts no |
|
# Don't read the user's ~/.rhosts and ~/.shosts files |
|
#IgnoreRhosts yes |
|
|
|
# Change to yes to enable built-in password authentication. |
|
PasswordAuthentication yes |
|
#PermitEmptyPasswords no |
|
|
|
# Change to no to disable PAM authentication |
|
#ChallengeResponseAuthentication yes |
|
|
|
# Kerberos options |
|
#KerberosAuthentication no |
|
#KerberosOrLocalPasswd yes |
|
#KerberosTicketCleanup yes |
|
#KerberosGetAFSToken no |
|
|
|
# GSSAPI options |
|
#GSSAPIAuthentication no |
|
#GSSAPICleanupCredentials yes |
|
|
|
# Set this to 'no' to disable PAM authentication, account processing, |
|
# and session processing. If this is enabled, PAM authentication will |
|
# be allowed through the ChallengeResponseAuthentication and |
|
# PasswordAuthentication. Depending on your PAM configuration, |
|
# PAM authentication via ChallengeResponseAuthentication may bypass |
|
# the setting of "PermitRootLogin without-password". |
|
# If you just want the PAM account and session checks to run without |
|
# PAM authentication, then enable this but set PasswordAuthentication |
|
# and ChallengeResponseAuthentication to 'no'. |
|
#UsePAM yes |
|
|
|
#AllowAgentForwarding yes |
|
#AllowTcpForwarding yes |
|
#GatewayPorts no |
|
#X11Forwarding yes |
|
#X11DisplayOffset 10 |
|
#X11UseLocalhost yes |
|
#PrintMotd yes |
|
#PrintLastLog yes |
|
#TCPKeepAlive yes |
|
#UseLogin no |
|
#UsePrivilegeSeparation yes |
|
#PermitUserEnvironment no |
|
#Compression delayed |
|
ClientAliveInterval 5 |
|
ClientAliveCountMax 3 |
|
UseDNS no |
|
#PidFile /var/run/sshd.pid |
|
#MaxStartups 10 |
|
#PermitTunnel no |
|
#ChrootDirectory none |
|
|
|
# no default banner path |
|
#Banner none |
|
|
|
# override default of no subsystems |
|
Subsystem sftp /usr/libexec/sftp-server |
|
|
|
# Example of overriding settings on a per-user basis |
|
#Match User anoncvs |
|
# X11Forwarding no |
|
# AllowTcpForwarding no |
|
# ForceCommand cvs server |