Guest User

sshd_config dsm 6 beta 2

a guest
Jan 22nd, 2016
356
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.69 KB | None | 0 0
  1. Ciphers aes128-ctr,[email protected],aes192-ctr,aes256-ctr,[email protected],[email protected]
  2. KexAlgorithms [email protected],diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521
  3. # $OpenBSD: sshd_config,v 1.93 2014/01/10 05:59:19 djm Exp $
  4.  
  5. # This is the sshd server system-wide configuration file. See
  6. # sshd_config(5) for more information.
  7.  
  8. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
  9.  
  10. # The strategy used for options in the default sshd_config shipped with
  11. # OpenSSH is to specify options with their default value where
  12. # possible, but leave them commented. Uncommented options override the
  13. # default value.
  14.  
  15. #Port 22
  16. #AddressFamily any
  17. #ListenAddress 0.0.0.0
  18. #ListenAddress ::
  19.  
  20. # The default requires explicit activation of protocol 1
  21. #Protocol 2
  22.  
  23. # HostKey for protocol version 1
  24. #HostKey /etc/ssh/ssh_host_key
  25. # HostKeys for protocol version 2
  26. #HostKey /etc/ssh/ssh_host_rsa_key
  27. #HostKey /etc/ssh/ssh_host_dsa_key
  28. #HostKey /etc/ssh/ssh_host_ecdsa_key
  29. #HostKey /etc/ssh/ssh_host_ed25519_key
  30.  
  31. # Lifetime and size of ephemeral version 1 server key
  32. #KeyRegenerationInterval 1h
  33. #ServerKeyBits 1024
  34.  
  35. # Ciphers and keying
  36. #RekeyLimit default none
  37.  
  38. # Logging
  39. # obsoletes QuietMode and FascistLogging
  40. #SyslogFacility AUTH
  41. #LogLevel INFO
  42.  
  43. # Authentication:
  44.  
  45. #LoginGraceTime 2m
  46. #PermitRootLogin yes
  47. #StrictModes yes
  48. #MaxAuthTries 6
  49. #MaxSessions 10
  50.  
  51. #RSAAuthentication yes
  52. #PubkeyAuthentication yes
  53.  
  54. # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
  55. # but this is overridden so installations will only check .ssh/authorized_keys
  56. #AuthorizedKeysFile .ssh/authorized_keys
  57.  
  58. #AuthorizedPrincipalsFile none
  59.  
  60. #AuthorizedKeysCommand none
  61. #AuthorizedKeysCommandUser nobody
  62.  
  63. # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
  64. #RhostsRSAAuthentication no
  65. # similar for protocol version 2
  66. #HostbasedAuthentication no
  67. # Change to yes if you don't trust ~/.ssh/known_hosts for
  68. # RhostsRSAAuthentication and HostbasedAuthentication
  69. #IgnoreUserKnownHosts no
  70. # Don't read the user's ~/.rhosts and ~/.shosts files
  71. #IgnoreRhosts yes
  72.  
  73. # To disable tunneled clear text passwords, change to no here!
  74. #PasswordAuthentication yes
  75. #PermitEmptyPasswords no
  76.  
  77. # Change to no to disable s/key passwords
  78. ChallengeResponseAuthentication no
  79.  
  80. # Kerberos options
  81. #KerberosAuthentication no
  82. #KerberosOrLocalPasswd yes
  83. #KerberosTicketCleanup yes
  84. #KerberosGetAFSToken no
  85.  
  86. # GSSAPI options
  87. #GSSAPIAuthentication no
  88. #GSSAPICleanupCredentials yes
  89.  
  90. # Set this to 'yes' to enable PAM authentication, account processing,
  91. # and session processing. If this is enabled, PAM authentication will
  92. # be allowed through the ChallengeResponseAuthentication and
  93. # PasswordAuthentication. Depending on your PAM configuration,
  94. # PAM authentication via ChallengeResponseAuthentication may bypass
  95. # the setting of "PermitRootLogin without-password".
  96. # If you just want the PAM account and session checks to run without
  97. # PAM authentication, then enable this but set PasswordAuthentication
  98. # and ChallengeResponseAuthentication to 'no'.
  99. UsePAM yes
  100.  
  101. #AllowAgentForwarding yes
  102. AllowTcpForwarding no
  103. #GatewayPorts no
  104. #X11Forwarding no
  105. #X11DisplayOffset 10
  106. #X11UseLocalhost yes
  107. #PermitTTY yes
  108. #PrintMotd yes
  109. #PrintLastLog yes
  110. #TCPKeepAlive yes
  111. #UseLogin no
  112. UsePrivilegeSeparation sandbox # Default for new installations.
  113. #PermitUserEnvironment no
  114. #Compression delayed
  115. #ClientAliveInterval 0
  116. #ClientAliveCountMax 3
  117. UseDNS no
  118. #PidFile /var/run/sshd.pid
  119. #MaxStartups 10:30:100
  120. #PermitTunnel no
  121. ChrootDirectory none
  122. #VersionAddendum none
  123.  
  124. # no default banner path
  125. #Banner none
  126.  
  127. # override default of no subsystems
  128. #Subsystem sftp /usr/libexec/sftp-server
  129. Subsystem sftp internal-sftp -f DAEMON -u 000
  130.  
  131. # the following are HPN related configuration options
  132. # tcp receive buffer polling. disable in non autotuning kernels
  133. #TcpRcvBufPoll yes
  134.  
  135. # disable hpn performance boosts
  136. #HPNDisabled no
  137.  
  138. # buffer size for hpn to non-hpn connections
  139. #HPNBufferSize 2048
  140.  
  141.  
  142. # allow the use of the none cipher
  143. #NoneEnabled no
  144.  
  145. # Example of overriding settings on a per-user basis
  146. #Match User anoncvs
  147. # X11Forwarding no
  148. # AllowTcpForwarding no
  149. # PermitTTY no
  150. # ForceCommand cvs server
  151. Match User root
  152. AllowTcpForwarding yes
  153. Match User admin
  154. AllowTcpForwarding yes
  155. Match User anonymous
  156. AllowTcpForwarding no
  157. GatewayPorts no
Advertisement
Add Comment
Please, Sign In to add comment