Guest User

Untitled

a guest
Dec 18th, 2017
335
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.82 KB | None | 0 0
  1. # Package generated configuration file
  2. # See the sshd_config(5) manpage for details
  3.  
  4. # What ports, IPs and protocols we listen for
  5. Port 22
  6. # Use these options to restrict which interfaces/protocols sshd will bind to
  7. #ListenAddress ::
  8. #ListenAddress 0.0.0.0
  9. Protocol 2
  10. # HostKeys for protocol version 2
  11. HostKey /etc/ssh/ssh_host_rsa_key
  12. #HostKey /etc/ssh/ssh_host_dsa_key
  13. #HostKey /etc/ssh/ssh_host_ecdsa_key
  14. HostKey /etc/ssh/ssh_host_ed25519_key
  15. #Privilege Separation is turned on for security
  16. UsePrivilegeSeparation yes
  17.  
  18. # Lifetime and size of ephemeral version 1 server key
  19. KeyRegenerationInterval 3600
  20. ServerKeyBits 1024
  21.  
  22. # Logging
  23. SyslogFacility AUTH
  24. LogLevel INFO
  25.  
  26. # Authentication:
  27. LoginGraceTime 120
  28. #PermitRootLogin without-password
  29. PermitRootLogin yes
  30. StrictModes yes
  31.  
  32. RSAAuthentication yes
  33. PubkeyAuthentication yes
  34. #AuthorizedKeysFile %h/.ssh/authorized_keys
  35.  
  36. # Don't read the user's ~/.rhosts and ~/.shosts files
  37. IgnoreRhosts yes
  38. # For this to work you will also need host keys in /etc/ssh_known_hosts
  39. RhostsRSAAuthentication no
  40. # similar for protocol version 2
  41. HostbasedAuthentication no
  42. # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
  43. #IgnoreUserKnownHosts yes
  44.  
  45. # To enable empty passwords, change to yes (NOT RECOMMENDED)
  46. PermitEmptyPasswords no
  47.  
  48. # Change to yes to enable challenge-response passwords (beware issues with
  49. # some PAM modules and threads)
  50. ChallengeResponseAuthentication no
  51.  
  52. # Change to no to disable tunnelled clear text passwords
  53. PasswordAuthentication yes
  54.  
  55. # Kerberos options
  56. #KerberosAuthentication no
  57. #KerberosGetAFSToken no
  58. #KerberosOrLocalPasswd yes
  59. #KerberosTicketCleanup yes
  60.  
  61. # GSSAPI options
  62. #GSSAPIAuthentication no
  63. #GSSAPICleanupCredentials yes
  64.  
  65. X11Forwarding yes
  66. X11DisplayOffset 10
  67. PrintMotd no
  68. PrintLastLog yes
  69. TCPKeepAlive yes
  70. #UseLogin no
  71.  
  72. #MaxStartups 10:30:60
  73. #Banner /etc/issue.net
  74.  
  75. # Allow client to pass locale environment variables
  76. AcceptEnv LANG LC_*
  77.  
  78. Subsystem sftp /usr/lib/openssh/sftp-server
  79.  
  80. # Set this to 'yes' to enable PAM authentication, account processing,
  81. # and session processing. If this is enabled, PAM authentication will
  82. # be allowed through the ChallengeResponseAuthentication and
  83. # PasswordAuthentication. Depending on your PAM configuration,
  84. # PAM authentication via ChallengeResponseAuthentication may bypass
  85. # the setting of "PermitRootLogin without-password".
  86. # If you just want the PAM account and session checks to run without
  87. # PAM authentication, then enable this but set PasswordAuthentication
  88. # and ChallengeResponseAuthentication to 'no'.
  89. UsePAM yes
  90. Ciphers aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr
  91. MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
  92. KexAlgorithms diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
Add Comment
Please, Sign In to add comment