]> git.pld-linux.org Git - packages/openssh.git/blame - openssh-config.patch
- enable hpn, rel 4
[packages/openssh.git] / openssh-config.patch
CommitLineData
2f55b62d
JR
1--- openssh-4.6p1/sshd_config~ 2007-10-13 01:37:17.000000000 +0200
2+++ openssh-4.6p1/sshd_config 2007-10-13 01:47:12.000000000 +0200
2f55b62d
JR
3@@ -34,6 +35,7 @@
4
5 #LoginGraceTime 2m
6 #PermitRootLogin yes
7+PermitRootLogin no
8 #StrictModes yes
9 #MaxAuthTries 6
10
11@@ -50,10 +51,13 @@
12 #IgnoreUserKnownHosts no
13 # Don't read the user's ~/.rhosts and ~/.shosts files
14 #IgnoreRhosts yes
15+IgnoreRhosts yes
16
17 # To disable tunneled clear text passwords, change to no here!
18 #PasswordAuthentication yes
19 #PermitEmptyPasswords no
20+PasswordAuthentication yes
21+PermitEmptyPasswords no
22
23 # Change to no to disable s/key passwords
24 #ChallengeResponseAuthentication yes
25@@ -66,6 +67,8 @@
26 # GSSAPI options
27 #GSSAPIAuthentication no
28 #GSSAPICleanupCredentials yes
29+GSSAPIAuthentication yes
30+GSSAPICleanupCredentials yes
31
32 # Set this to 'yes' to enable PAM authentication, account processing,
33 # and session processing. If this is enabled, PAM authentication will
34@@ -78,8 +79,16 @@
35 # PAM authentication, then enable this but set PasswordAuthentication
36 # and ChallengeResponseAuthentication to 'no'.
37 #UsePAM no
38+UsePAM yes
39+
40+# Set this to 'yes' to enable support for chrooted user environment.
41+# You must create such environment before you can use this feature.
42+#UseChroot yes
43
44 #AllowTcpForwarding yes
45+# Security advisory:
46+# http://securitytracker.com/alerts/2004/Sep/1011143.html
47+AllowTcpForwarding no
48 #GatewayPorts no
49 #X11Forwarding no
50 #X11DisplayOffset 10
51@@ -106,6 +109,9 @@
52 # no default banner path
53 #Banner /some/path
54
55+# Accept locale-related environment variables
56+AcceptEnv LANG LC_*
57+
58 # override default of no subsystems
59 Subsystem sftp /usr/libexec/sftp-server
60
61--- openssh-4.6p1/ssh_config~ 2006-06-13 05:01:10.000000000 +0200
62+++ openssh-4.6p1/ssh_config 2007-10-13 02:00:16.000000000 +0200
63@@ -20,12 +20,15 @@
64 # Host *
65 # ForwardAgent no
66 # ForwardX11 no
67+# ForwardX11Trusted yes
68 # RhostsRSAAuthentication no
69 # RSAAuthentication yes
70 # PasswordAuthentication yes
71 # HostbasedAuthentication no
72 # GSSAPIAuthentication no
73 # GSSAPIDelegateCredentials no
74+# GSSAPIKeyExchange no
75+# GSSAPITrustDNS no
76 # BatchMode no
77 # CheckHostIP yes
78 # AddressFamily any
79@@ -42,3 +45,19 @@
80 # Tunnel no
81 # TunnelDevice any:any
82 # PermitLocalCommand no
83+
84+Host *
85+ GSSAPIAuthentication yes
86+ GSSAPIDelegateCredentials no
87+ ForwardAgent no
88+ ForwardX11 no
89+# If this option is set to yes then remote X11 clients will have full access
90+# to the original X11 display. As virtually no X11 client supports the untrusted
91+# mode correctly we set this to yes.
92+ ForwardX11Trusted yes
93+ StrictHostKeyChecking no
94+ ServerAliveInterval 60
95+ ServerAliveCountMax 10
96+ TCPKeepAlive no
97+# Send locale-related environment variables
98+ SendEnv LANG LC_*
This page took 0.052914 seconds and 4 git commands to generate.