Advertisement
Guest User

Untitled

a guest
Aug 31st, 2010
197
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.21 KB | None | 0 0
  1. # $OpenBSD: sshd_config,v 1.81 2009/10/08 14:03:41 markus Exp $
  2.  
  3. # This is the sshd server system-wide configuration file. See
  4. # sshd_config(5) for more information.
  5.  
  6. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
  7.  
  8. # The strategy used for options in the default sshd_config shipped with
  9. # OpenSSH is to specify options with their default value where
  10. # possible, but leave them commented. Uncommented options change a
  11. # default value.
  12.  
  13. #Port 22
  14. #AddressFamily any
  15. ListenAddress 0.0.0.0
  16. #ListenAddress ::
  17.  
  18. # The default requires explicit activation of protocol 1
  19. #Protocol 2
  20.  
  21. # HostKey for protocol version 1
  22. #HostKey /etc/ssh/ssh_host_key
  23. # HostKeys for protocol version 2
  24. #HostKey /etc/ssh/ssh_host_rsa_key
  25. #HostKey /etc/ssh/ssh_host_dsa_key
  26.  
  27. # Lifetime and size of ephemeral version 1 server key
  28. #KeyRegenerationInterval 1h
  29. #ServerKeyBits 1024
  30.  
  31. # Logging
  32. # obsoletes QuietMode and FascistLogging
  33. #SyslogFacility AUTH
  34. #LogLevel INFO
  35.  
  36. # Authentication:
  37.  
  38. #LoginGraceTime 2m
  39. #PermitRootLogin yes
  40. #StrictModes yes
  41. #MaxAuthTries 6
  42. #MaxSessions 10
  43.  
  44. #RSAAuthentication yes
  45. #PubkeyAuthentication yes
  46. #AuthorizedKeysFile .ssh/authorized_keys
  47.  
  48. # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
  49. #RhostsRSAAuthentication no
  50. # similar for protocol version 2
  51. #HostbasedAuthentication no
  52. # Change to yes if you don't trust ~/.ssh/known_hosts for
  53. # RhostsRSAAuthentication and HostbasedAuthentication
  54. #IgnoreUserKnownHosts no
  55. # Don't read the user's ~/.rhosts and ~/.shosts files
  56. #IgnoreRhosts yes
  57.  
  58. # To disable tunneled clear text passwords, change to no here!
  59. #PasswordAuthentication yes
  60. #PermitEmptyPasswords no
  61.  
  62. # Change to no to disable s/key passwords
  63. ChallengeResponseAuthentication no
  64.  
  65. # Kerberos options
  66. #KerberosAuthentication no
  67. #KerberosOrLocalPasswd yes
  68. #KerberosTicketCleanup yes
  69. #KerberosGetAFSToken no
  70.  
  71. # GSSAPI options
  72. #GSSAPIAuthentication no
  73. #GSSAPICleanupCredentials yes
  74.  
  75. # Set this to 'yes' to enable PAM authentication, account processing,
  76. # and session processing. If this is enabled, PAM authentication will
  77. # be allowed through the ChallengeResponseAuthentication and
  78. # PasswordAuthentication. Depending on your PAM configuration,
  79. # PAM authentication via ChallengeResponseAuthentication may bypass
  80. # the setting of "PermitRootLogin without-password".
  81. # If you just want the PAM account and session checks to run without
  82. # PAM authentication, then enable this but set PasswordAuthentication
  83. # and ChallengeResponseAuthentication to 'no'.
  84. UsePAM yes
  85.  
  86. #AllowAgentForwarding yes
  87. #AllowTcpForwarding yes
  88. #GatewayPorts no
  89. #X11Forwarding no
  90. #X11DisplayOffset 10
  91. #X11UseLocalhost yes
  92. #PrintMotd yes
  93. #PrintLastLog yes
  94. #TCPKeepAlive yes
  95. #UseLogin no
  96. #UsePrivilegeSeparation yes
  97. #PermitUserEnvironment no
  98. #Compression delayed
  99. #ClientAliveInterval 0
  100. #ClientAliveCountMax 3
  101. #UseDNS yes
  102. #PidFile /var/run/sshd.pid
  103. #MaxStartups 10
  104. #PermitTunnel no
  105. #ChrootDirectory none
  106.  
  107. # no default banner path
  108. #Banner none
  109.  
  110. # override default of no subsystems
  111. Subsystem sftp /usr/lib/ssh/sftp-server
  112.  
  113. # Example of overriding settings on a per-user basis
  114. #Match User anoncvs
  115. # X11Forwarding no
  116. # AllowTcpForwarding no
  117. # ForceCommand cvs server
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement