]> git.pld-linux.org Git - packages/openssh.git/blame - opensshd.conf
This commit was manufactured by cvs2git to create branch 'RA-branch'.
[packages/openssh.git] / opensshd.conf
CommitLineData
b9c8a300 1# This is the sshd server system-wide configuration file. See
2# sshd_config(5) for more information.
3
4# The strategy used for options in the default sshd_config shipped with
5# OpenSSH is to specify options with their default value where
6# possible, but leave them commented. Uncommented options change a
7# default value.
8
9Port 22
10Protocol 1,2
11#ListenAddress 0.0.0.0
12#ListenAddress ::
13
14# HostKey for protocol version 1
15#HostKey /etc/ssh/ssh_host_key
16# HostKeys for protocol version 2
17#HostKey /etc/ssh/ssh_host_rsa_key
18#HostKey /etc/ssh/ssh_host_dsa_key
19
20# Lifetime and size of ephemeral version 1 server key
21KeyRegenerationInterval 3600
22ServerKeyBits 768
23
24# Logging
25#obsoletes QuietMode and FascistLogging
26SyslogFacility AUTH
27LogLevel INFO
28
29# Authentication:
30
31LoginGraceTime 600
32PermitRootLogin no
33StrictModes yes
34
35RSAAuthentication yes
36#PubkeyAuthentication yes
37#AuthorizedKeysFile .ssh/authorized_keys
38
39# Don't read the user's ~/.rhosts and ~/.shosts files
40IgnoreRhosts yes
41# For this to work you will also need host keys in /etc/ssh_known_hosts
42RhostsRSAAuthentication no
43# similar for protocol version 2
44#HostbasedAuthentication no
45# Change to yes if you don't trust ~/.ssh/known_hosts for
46# RhostsRSAAuthentication and HostbasedAuthentication
47#IgnoreUserKnownHosts no
48
49# To disable tunneled clear text passwords, change to no here!
50PasswordAuthentication yes
51PermitEmptyPasswords no
52
53# Change to no to disable s/key passwords
54#ChallengeResponseAuthentication yes
55
56# Kerberos options
57#KerberosAuthentication no
58#KerberosOrLocalPasswd yes
59#KerberosTicketCleanup yes
60
61#AFSTokenPassing no
62
63# Kerberos TGT Passing only works with the AFS kaserver
64#KerberosTgtPassing no
65
66# Set this to 'yes' to enable PAM authentication (via challenge-response)
67# and session processing. Depending on your PAM configuration, this may
68# bypass the setting of 'PasswordAuthentication'
69UsePAM yes
70
71# Set this to 'yes' to enable support for chrooted user environment.
72# You must create such environment before you can use this feature.
73#UseChroot yes
74
75X11Forwarding no
76X11DisplayOffset 10
77X11UseLocalhost yes
78PrintMotd yes
79#PrintLastLog yes
80KeepAlive yes
81UseLogin no
82
83# enabling this can cause some problems with for example pam_limit
84UsePrivilegeSeparation no
85
86#Compression yes
87
88#MaxStartups 10
89# no default banner path
90#Banner /some/path
91#VerifyReverseMapping no
92
93# override default of no subsystems
94#Subsystem sftp /usr/lib/openssh/sftp-server
15e753e7 95
96# Security advisory:
97# http://securitytracker.com/alerts/2004/Sep/1011143.html
98AllowTcpForwarding no
This page took 0.037447 seconds and 4 git commands to generate.