Advertisement
Guest User

Untitled

a guest
Jul 7th, 2011
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.48 KB | None | 0 0
  1. # $OpenBSD: sshd_config,v 1.59 2004/09/25 11:17:16 markus Exp $
  2.  
  3. # This is the sshd server system-wide configuration file. See
  4. # sshd_config(5) for more information.
  5.  
  6. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
  7.  
  8. # The strategy used for options in the default sshd_config shipped with
  9. # OpenSSH is to specify options with their default value where
  10. # possible, but leave them commented. Uncommented options change a
  11. # default value.
  12.  
  13. Port 2222
  14. AllowGroups sshlogin
  15. #Protocol 2,1
  16. #ListenAddress 0.0.0.0
  17. #ListenAddress ::
  18.  
  19. # HostKey for protocol version 1
  20. #HostKey /etc/ssh/ssh_host_key
  21. # HostKeys for protocol version 2
  22. #HostKey /etc/ssh/ssh_host_rsa_key
  23. #HostKey /etc/ssh/ssh_host_dsa_key
  24.  
  25. # Lifetime and size of ephemeral version 1 server key
  26. #KeyRegenerationInterval 3600
  27. #ServerKeyBits 768
  28.  
  29. # Logging
  30. #obsoletes QuietMode and FascistLogging
  31. #SyslogFacility AUTH
  32. #LogLevel INFO
  33.  
  34. # Authentication:
  35.  
  36. #LoginGraceTime 120
  37. PermitRootLogin no
  38. #StrictModes yes
  39.  
  40. #RSAAuthentication yes
  41. #PubkeyAuthentication yes
  42. #AuthorizedKeysFile .ssh/authorized_keys
  43.  
  44. # rhosts authentication should not be used
  45. #RhostsAuthentication no
  46. # Don't read the user's ~/.rhosts and ~/.shosts files
  47. #IgnoreRhosts yes
  48. # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
  49. #RhostsRSAAuthentication no
  50. # similar for protocol version 2
  51. #HostbasedAuthentication no
  52. # Change to yes if you don't trust ~/.ssh/known_hosts for
  53. # RhostsRSAAuthentication and HostbasedAuthentication
  54. #IgnoreUserKnownHosts no
  55.  
  56. # To disable tunneled clear text passwords, change to no here!
  57. #PasswordAuthentication yes
  58. #PermitEmptyPasswords no
  59.  
  60. # Change to no to disable s/key passwords
  61. #ChallengeResponseAuthentication yes
  62.  
  63. # Kerberos options
  64. #KerberosAuthentication no
  65. #KerberosOrLocalPasswd yes
  66. #KerberosTicketCleanup yes
  67.  
  68. #AFSTokenPassing no
  69.  
  70. # Kerberos TGT Passing only works with the AFS kaserver
  71. #KerberosTgtPassing no
  72.  
  73. # Set this to 'yes' to enable PAM keyboard-interactive authentication
  74. # Warning: enabling this may bypass the setting of 'PasswordAuthentication'
  75. #PAMAuthenticationViaKbdInt no
  76.  
  77. #X11Forwarding no
  78. #X11DisplayOffset 10
  79. #X11UseLocalhost yes
  80. #PrintMotd yes
  81. #PrintLastLog yes
  82. #KeepAlive yes
  83. #UseLogin no
  84. #UsePrivilegeSeparation yes
  85. #PermitUserEnvironment no
  86. #Compression yes
  87.  
  88. #MaxStartups 10
  89. # no default banner path
  90. #Banner /some/path
  91. #VerifyReverseMapping no
  92.  
  93. # override default of no subsystems
  94. Subsystem sftp /usr/libexec/sftp-server
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement