Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ## ssh into server "mimi" fails with either key or password login
- -sh-3.2$ ssh mimi
- Permission denied (publickey).
- ## here is the verbose ssh output of the login attempt
- OpenSSH_5.5p1, OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008
- debug1: Reading configuration data /var/lib/amanda/.ssh/config
- debug1: Applying options for mimi
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: Applying options for *
- debug2: ssh_connect: needpriv 0
- debug1: Connecting to 64.106.217.201 [64.106.217.201] port 22.
- debug1: Connection established.
- debug3: Not a RSA1 key file /var/lib/amanda/.ssh/id_rsa.
- debug2: key_type_from_name: unknown key type '-----BEGIN'
- debug3: key_read: missing keytype
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug2: key_type_from_name: unknown key type '-----END'
- debug3: key_read: missing keytype
- debug1: identity file /var/lib/amanda/.ssh/id_rsa type 1
- debug1: identity file /var/lib/amanda/.ssh/id_rsa-cert type -1
- debug1: identity file /var/lib/amanda/.ssh/id_dsa type -1
- debug1: identity file /var/lib/amanda/.ssh/id_dsa-cert type -1
- debug1: Remote protocol version 2.0, remote software version OpenSSH_5.8
- debug1: match: OpenSSH_5.8 pat OpenSSH*
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_5.5
- debug2: fd 3 setting O_NONBLOCK
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: found hmac-md5
- debug1: kex: server->client aes128-ctr hmac-md5 none
- debug2: mac_setup: found hmac-md5
- debug1: kex: client->server aes128-ctr hmac-md5 none
- debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
- debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
- debug2: dh_gen_key: priv key bits set: 124/256
- debug2: bits set: 475/1024
- debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
- debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
- debug3: check_host_in_hostfile: host 64.106.217.201 filename /var/lib/amanda/.ssh/known_hosts
- debug3: check_host_in_hostfile: host 64.106.217.201 filename /var/lib/amanda/.ssh/known_hosts
- debug3: check_host_in_hostfile: match line 50
- debug1: Host '64.106.217.201' is known and matches the RSA host key.
- debug1: Found key in /var/lib/amanda/.ssh/known_hosts:50
- debug2: bits set: 520/1024
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /var/lib/amanda/.ssh/id_rsa (0x5555557cf830)
- debug2: key: /var/lib/amanda/.ssh/id_dsa ((nil))
- debug1: Authentications that can continue: publickey
- debug3: start over, passed a different list publickey
- debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
- debug3: authmethod_lookup publickey
- debug3: remaining preferred: keyboard-interactive,password
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering public key: /var/lib/amanda/.ssh/id_rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Authentications that can continue: publickey
- debug1: Trying private key: /var/lib/amanda/.ssh/id_dsa
- debug3: no such identity: /var/lib/amanda/.ssh/id_dsa
- debug2: we did not send a packet, disable method
- debug1: No more authentication methods to try.
- Permission denied (publickey).
- ## ssh into server "woofy" works with same key as above
- -sh-3.2$ ssh woofy
- Last login: Fri May 27 11:08:29 2011 from ec2-50-19-73-101.compute-1.amazonaws.com
- [amandabackup@woofy:~] $
- ## here is the verbose ssh output of that login
- OpenSSH_5.5p1, OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008
- debug1: Reading configuration data /var/lib/amanda/.ssh/config
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: Applying options for *
- debug2: ssh_connect: needpriv 0
- debug1: Connecting to woofy [64.106.217.202] port 22.
- debug1: Connection established.
- debug3: Not a RSA1 key file /var/lib/amanda/.ssh/id_rsa.
- debug2: key_type_from_name: unknown key type '-----BEGIN'
- debug3: key_read: missing keytype
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug3: key_read: missing whitespace
- debug2: key_type_from_name: unknown key type '-----END'
- debug3: key_read: missing keytype
- debug1: identity file /var/lib/amanda/.ssh/id_rsa type 1
- debug1: identity file /var/lib/amanda/.ssh/id_rsa-cert type -1
- debug1: identity file /var/lib/amanda/.ssh/id_dsa type -1
- debug1: identity file /var/lib/amanda/.ssh/id_dsa-cert type -1
- debug1: Remote protocol version 2.0, remote software version OpenSSH_5.8
- debug1: match: OpenSSH_5.8 pat OpenSSH*
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_5.5
- debug2: fd 3 setting O_NONBLOCK
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: found hmac-md5
- debug1: kex: server->client aes128-ctr hmac-md5 none
- debug2: mac_setup: found hmac-md5
- debug1: kex: client->server aes128-ctr hmac-md5 none
- debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
- debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
- debug2: dh_gen_key: priv key bits set: 113/256
- debug2: bits set: 521/1024
- debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
- debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
- debug3: check_host_in_hostfile: host woofy filename /var/lib/amanda/.ssh/known_hosts
- debug3: check_host_in_hostfile: host woofy filename /var/lib/amanda/.ssh/known_hosts
- debug3: check_host_in_hostfile: match line 25
- debug3: check_host_in_hostfile: host 64.106.217.202 filename /var/lib/amanda/.ssh/known_hosts
- debug3: check_host_in_hostfile: host 64.106.217.202 filename /var/lib/amanda/.ssh/known_hosts
- debug3: check_host_in_hostfile: match line 25
- debug1: Host 'woofy' is known and matches the RSA host key.
- debug1: Found key in /var/lib/amanda/.ssh/known_hosts:25
- debug2: bits set: 498/1024
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /var/lib/amanda/.ssh/id_rsa (0x5555557cf8a0)
- debug2: key: /var/lib/amanda/.ssh/id_dsa ((nil))
- debug1: Authentications that can continue: publickey
- debug3: start over, passed a different list publickey
- debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
- debug3: authmethod_lookup publickey
- debug3: remaining preferred: keyboard-interactive,password
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering public key: /var/lib/amanda/.ssh/id_rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 65:e2:7e:26:8d:cc:a2:15:7d:8c:76:2f:61:56:55:6f
- debug3: sign_and_send_pubkey
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- debug2: fd 6 setting O_NONBLOCK
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- debug2: callback start
- debug2: client_session2_setup: id 0
- debug2: channel 0: request pty-req confirm 1
- debug1: Sending environment.
- debug3: Ignored env HOSTNAME
- debug3: Ignored env SHELL
- debug3: Ignored env TERM
- debug3: Ignored env HISTSIZE
- debug3: Ignored env USER
- debug3: Ignored env LS_COLORS
- debug3: Ignored env EC2_HOME
- debug3: Ignored env MAIL
- debug3: Ignored env PATH
- debug3: Ignored env INPUTRC
- debug3: Ignored env PWD
- debug3: Ignored env JAVA_HOME
- debug3: Ignored env SSH_ASKPASS
- debug3: Ignored env SHLVL
- debug3: Ignored env HOME
- debug3: Ignored env LOGNAME
- debug3: Ignored env CVS_RSH
- debug3: Ignored env PKG_CONFIG_PATH
- debug3: Ignored env LESSOPEN
- debug3: Ignored env G_BROKEN_FILENAMES
- debug3: Ignored env _
- debug2: channel 0: request shell confirm 1
- debug2: fd 3 setting TCP_NODELAY
- debug2: callback done
- debug2: channel 0: open confirm rwindow 0 rmax 32768
- debug2: channel_input_status_confirm: type 99 id 0
- debug2: PTY allocation request accepted on channel 0
- debug2: channel 0: rcvd adjust 2097152
- debug2: channel_input_status_confirm: type 99 id 0
- debug2: shell request accepted on channel 0
- debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
- debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
- debug2: channel 0: rcvd eow
- debug2: channel 0: close_read
- debug2: channel 0: input open -> closed
- debug2: channel 0: rcvd eof
- debug2: channel 0: output open -> drain
- debug2: channel 0: rcvd close
- debug3: channel 0: will not send data after close
- debug1: channel 0: forcing write
- debug3: channel 0: will not send data after close
- debug2: channel 0: obuf empty
- debug2: channel 0: close_write
- debug2: channel 0: output drain -> closed
- debug2: channel 0: almost dead
- debug2: channel 0: gc: notify user
- debug2: channel 0: gc: user detached
- debug2: channel 0: send close
- debug2: channel 0: is dead
- debug2: channel 0: garbage collecting
- debug1: channel 0: free: client-session, nchannels 1
- debug3: channel 0: status: The following connections are open:
- #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
- debug3: channel 0: close_fds r -1 w -1 e 6
- debug1: fd 2 clearing O_NONBLOCK
- Connection to woofy closed.
- Transferred: sent 3112, received 2904 bytes, in 2.9 seconds
- Bytes per second: sent 1070.6, received 999.1
- debug1: Exit status 0
- ## this is the sshd_config file from server "mimi" (ssh login fail from above)
- # $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
- # This is the sshd server system-wide configuration file. See
- # sshd_config(5) for more information.
- # This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
- # The strategy used for options in the default sshd_config shipped with
- # OpenSSH is to specify options with their default value where
- # possible, but leave them commented. Uncommented options change a
- # default value.
- #Port 22
- #Protocol 2,1
- Protocol 2
- #AddressFamily any
- #ListenAddress 0.0.0.0
- #ListenAddress ::
- # HostKey for protocol version 1
- #HostKey /etc/ssh/ssh_host_key
- # HostKeys for protocol version 2
- #HostKey /etc/ssh/ssh_host_rsa_key
- #HostKey /etc/ssh/ssh_host_dsa_key
- # Lifetime and size of ephemeral version 1 server key
- #KeyRegenerationInterval 1h
- #ServerKeyBits 768
- # Logging
- # obsoletes QuietMode and FascistLogging
- #SyslogFacility AUTH
- SyslogFacility AUTHPRIV
- #LogLevel INFO
- # Authentication:
- #LoginGraceTime 2m
- PermitRootLogin no
- #StrictModes yes
- #MaxAuthTries 6
- #RSAAuthentication yes
- #PubkeyAuthentication yes
- #AuthorizedKeysFile .ssh/authorized_keys
- # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
- #RhostsRSAAuthentication no
- # similar for protocol version 2
- #HostbasedAuthentication no
- # Change to yes if you don't trust ~/.ssh/known_hosts for
- # RhostsRSAAuthentication and HostbasedAuthentication
- #IgnoreUserKnownHosts no
- # Don't read the user's ~/.rhosts and ~/.shosts files
- #IgnoreRhosts yes
- # To disable tunneled clear text passwords, change to no here!
- #PasswordAuthentication yes
- #PermitEmptyPasswords no
- PasswordAuthentication no
- # Change to no to disable s/key passwords
- #ChallengeResponseAuthentication yes
- ChallengeResponseAuthentication no
- # Kerberos options
- #KerberosAuthentication no
- #KerberosOrLocalPasswd yes
- #KerberosTicketCleanup yes
- #KerberosGetAFSToken no
- # GSSAPI options
- #GSSAPIAuthentication no
- GSSAPIAuthentication no
- #GSSAPICleanupCredentials yes
- GSSAPICleanupCredentials no
- # Set this to 'yes' to enable PAM authentication, account processing,
- # and session processing. If this is enabled, PAM authentication will
- # be allowed through the ChallengeResponseAuthentication mechanism.
- # Depending on your PAM configuration, this may bypass the setting of
- # PasswordAuthentication, PermitEmptyPasswords, and
- # "PermitRootLogin without-password". If you just want the PAM account and
- # session checks to run without PAM authentication, then enable this but set
- # ChallengeResponseAuthentication=no
- #UsePAM no
- UsePAM yes
- # Accept locale-related environment variables
- AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
- AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
- AcceptEnv LC_IDENTIFICATION LC_ALL
- #AllowTcpForwarding yes
- #GatewayPorts no
- #X11Forwarding no
- X11Forwarding no
- #X11DisplayOffset 10
- #X11UseLocalhost yes
- #PrintMotd yes
- #PrintLastLog yes
- #TCPKeepAlive yes
- #UseLogin no
- UsePrivilegeSeparation no
- #PermitUserEnvironment no
- #Compression delayed
- #ClientAliveInterval 0
- #ClientAliveCountMax 3
- #ShowPatchLevel no
- #UseDNS yes
- #PidFile /var/run/sshd.pid
- #MaxStartups 10
- #PermitTunnel no
- # no default banner path
- #Banner /some/path
- # override default of no subsystems
- Subsystem sftp /usr/libexec/openssh/sftp-server
Add Comment
Please, Sign In to add comment