Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Protocol 2
- ChallengeResponseAuthentication yes
- ClientAliveInterval 120
- ClientAliveCountMax 2
- AuthenticationMethods publickey,password publickey,keyboard-interactive
- AllowUsers newuser root
- PermitEmptyPasswords no
- #----------- SFTP ENABLEMENT ----------
- Subsystem sftp internal-sftp
- Match user newuser
- ChrootDirectory /home/newuser
- PasswordAuthentication yes
- X11Forwarding no
- AllowTcpForwarding no
- ForceCommand internal-sftp
- systemctl status sshd.service
- ● sshd.service - OpenSSH server daemon
- Loaded: loaded (/usr/lib/systemd/system/sshd.service; enabled; vendor preset: enabled)
- Active: activating (auto-restart) (Result: exit-code) since Thu 2018-01-18 22:44:22 EST; 36s ago
- Docs: man:sshd(8)
- man:sshd_config(5)
- Process: 13015 ExecStart=/usr/sbin/sshd -D $OPTIONS (code=exited, status=255)
- Main PID: 13015 (code=exited, status=255)
- Jan 18 22:44:22 myserver.com systemd[1]: Failed to start OpenSSH server daemon.
- Jan 18 22:44:22 myserver.com systemd[1]: Unit sshd.service entered failed state.
- Jan 18 22:44:22 myserver.com systemd[1]: sshd.service failed.
- OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017
Add Comment
Please, Sign In to add comment