SHARE
TWEET

iLSLeCeWE

a guest Feb 23rd, 2020 112 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #
  2. # Copyright 2015 Google Inc. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. #     http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. #
  16. # Package generated configuration file
  17. # See the sshd_config(5) manpage for details
  18. #
  19.  
  20. # What ports, IPs and protocols we listen for
  21. Port 22
  22. # Use these options to restrict which interfaces/protocols sshd will bind to
  23. #ListenAddress ::
  24. #ListenAddress 0.0.0.0
  25. Protocol 2
  26. # HostKeys for protocol version 2
  27. #HostKey /etc/ssh/ssh_host_rsa_key
  28. #HostKey /etc/ssh/ssh_host_dsa_key
  29. #Privilege Separation is turned on for security
  30. #UsePrivilegeSeparation yes
  31.  
  32. # Lifetime and size of ephemeral version 1 server key
  33. #KeyRegenerationInterval 3600
  34. #ServerKeyBits 768
  35.  
  36. # Logging
  37. #SyslogFacility AUTH
  38. #LogLevel INFO
  39.  
  40. # Authentication:
  41. #LoginGraceTime 120
  42. PermitRootLogin yes
  43. StrictModes no
  44.  
  45. #RSAAuthentication yes
  46. #PubkeyAuthentication yes
  47. #AuthorizedKeysFile     %h/.ssh/authorized_keys
  48.  
  49. # Don't read the user's ~/.rhosts and ~/.shosts files
  50. #IgnoreRhosts yes
  51. # For this to work you will also need host keys in /etc/ssh_known_hosts
  52. #RhostsRSAAuthentication no
  53. # similar for protocol version 2
  54. #HostbasedAuthentication no
  55. # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
  56. #IgnoreUserKnownHosts yes
  57.  
  58. # To enable empty passwords, change to yes (NOT RECOMMENDED)
  59. PermitEmptyPasswords no
  60.  
  61. # Change to yes to enable challenge-response passwords (beware issues with
  62. # some PAM modules and threads)
  63. ChallengeResponseAuthentication no
  64.  
  65. # Change to no to disable tunnelled clear text passwords
  66. PasswordAuthentication yes
  67.  
  68. # Kerberos options
  69. #KerberosAuthentication no
  70. #KerberosGetAFSToken no
  71. #KerberosOrLocalPasswd yes
  72. #KerberosTicketCleanup yes
  73.  
  74. # GSSAPI options
  75. #GSSAPIAuthentication no
  76. #GSSAPICleanupCredentials yes
  77.  
  78. X11Forwarding yes
  79. X11DisplayOffset 10
  80. PrintMotd no
  81. PrintLastLog no
  82. TCPKeepAlive yes
  83. #UseLogin no
  84.  
  85. #MaxStartups 10:30:60
  86. #Banner /etc/issue.net
  87.  
  88. # Allow client to pass locale environment variables
  89. AcceptEnv LANG LC_* DEVSHELL_PROJECT_ID GOOGLE_CLOUD_PROJECT
  90.  
  91. Subsystem sftp /usr/lib/openssh/sftp-server
  92.  
  93. # Set this to 'yes' to enable PAM authentication, account processing,
  94. # and session processing. If this is enabled, PAM authentication will
  95. # be allowed through the ChallengeResponseAuthentication and
  96. # PasswordAuthentication.  Depending on your PAM configuration,
  97. # PAM authentication via ChallengeResponseAuthentication may bypass
  98. # the setting of "PermitRootLogin without-password".
  99. # If you just want the PAM account and session checks to run without
  100. # PAM authentication, then enable this but set PasswordAuthentication
  101. # and ChallengeResponseAuthentication to 'no'.
  102. UsePAM yes
  103.  
  104. # Make sure to include "hmac-md5" MAC format.
  105. MACs hmac-md5,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top