]> git.pld-linux.org Git - packages/openssh.git/blame_incremental - opensshd.conf
- outdated
[packages/openssh.git] / opensshd.conf
... / ...
CommitLineData
1# This is the sshd server system-wide configuration file. See
2# sshd_config(5) for more information.
3
4# The strategy used for options in the default sshd_config shipped with
5# OpenSSH is to specify options with their default value where
6# possible, but leave them commented. Uncommented options change a
7# default value.
8
9Port 22
10Protocol 2
11#Protocol 2,1
12#ListenAddress 0.0.0.0
13#ListenAddress ::
14
15# HostKey for protocol version 1
16#HostKey /etc/ssh/ssh_host_key
17# HostKeys for protocol version 2
18#HostKey /etc/ssh/ssh_host_rsa_key
19#HostKey /etc/ssh/ssh_host_dsa_key
20
21# Lifetime and size of ephemeral version 1 server key
22KeyRegenerationInterval 3600
23ServerKeyBits 768
24
25# Logging
26#obsoletes QuietMode and FascistLogging
27SyslogFacility AUTH
28LogLevel INFO
29
30# Authentication:
31
32LoginGraceTime 600
33PermitRootLogin no
34StrictModes yes
35
36RSAAuthentication yes
37#PubkeyAuthentication yes
38#AuthorizedKeysFile .ssh/authorized_keys
39
40# Don't read the user's ~/.rhosts and ~/.shosts files
41IgnoreRhosts yes
42# For this to work you will also need host keys in /etc/ssh_known_hosts
43RhostsRSAAuthentication no
44# similar for protocol version 2
45#HostbasedAuthentication no
46# Change to yes if you don't trust ~/.ssh/known_hosts for
47# RhostsRSAAuthentication and HostbasedAuthentication
48#IgnoreUserKnownHosts no
49
50# To disable tunneled clear text passwords, change to no here!
51PasswordAuthentication yes
52PermitEmptyPasswords no
53
54# Change to no to disable s/key passwords
55#ChallengeResponseAuthentication yes
56
57# Kerberos options
58#KerberosAuthentication no
59#KerberosOrLocalPasswd yes
60#KerberosTicketCleanup yes
61
62#AFSTokenPassing no
63
64# Kerberos TGT Passing only works with the AFS kaserver
65#KerberosTgtPassing no
66
67# Set this to 'yes' to enable PAM authentication (via challenge-response)
68# and session processing. Depending on your PAM configuration, this may
69# bypass the setting of 'PasswordAuthentication'
70UsePAM yes
71
72# Set this to 'yes' to enable support for chrooted user environment.
73# You must create such environment before you can use this feature.
74#UseChroot yes
75
76X11Forwarding no
77X11DisplayOffset 10
78X11UseLocalhost yes
79PrintMotd yes
80#PrintLastLog yes
81KeepAlive yes
82UseLogin no
83
84# enabling this can cause some problems with for example pam_limit
85UsePrivilegeSeparation no
86
87#Compression yes
88
89#MaxStartups 10
90# no default banner path
91#Banner /some/path
92#VerifyReverseMapping no
93
94# override default of no subsystems
95Subsystem sftp /usr/lib/openssh/sftp-server
96
97# Security advisory:
98# http://securitytracker.com/alerts/2004/Sep/1011143.html
99AllowTcpForwarding no
This page took 0.191914 seconds and 4 git commands to generate.