Advertisement
Guest User

Untitled

a guest
Jan 17th, 2018
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.10 KB | None | 0 0
  1. -- L'unité (unit) ssh.service a terminé son arrêt.
  2. janv. 18 02:16:46 debian systemd[1]: ssh.service: Start request repeated too qui
  3. janv. 18 02:16:46 debian systemd[1]: Failed to start OpenBSD Secure Shell server
  4. -- Subject: L'unité (unit) ssh.service a échoué
  5. -- Defined-By: systemd
  6. -- Support: https://www.debian.org/support
  7. --
  8. -- L'unité (unit) ssh.service a échoué, avec le résultat failed.
  9. janv. 18 02:16:46 debian systemd[1]: ssh.service: Unit entered failed state.
  10. janv. 18 02:16:46 debian systemd[1]: ssh.service: Failed with result 'exit-code'
  11. janv. 18 02:17:01 debian CRON[1828]: pam_unix(cron:session): session opened for
  12. # $OpenBSD: sshd_config,v 1.100 2016/08/15 12:32:04 naddy Exp $
  13.  
  14. # This is the sshd server system-wide configuration file. See
  15. # sshd_config(5) for more information.
  16.  
  17. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
  18.  
  19. # The strategy used for options in the default sshd_config shipped with
  20. # OpenSSH is to specify options with their default value where
  21. # possible, but leave them commented. Uncommented options override the
  22. # default value.
  23.  
  24. Port 22
  25. #AddressFamily any
  26. #ListenAddress 0.0.0.0
  27. #ListenAddress ::
  28.  
  29. #HostKey /etc/ssh/ssh_host_rsa_key
  30. #HostKey /etc/ssh/ssh_host_ecdsa_key
  31. #HostKey /etc/ssh/ssh_host_ed25519_key
  32.  
  33. # Ciphers and keying
  34. #RekeyLimit default none
  35.  
  36. # Logging
  37. #SyslogFacility AUTH
  38. #LogLevel INFO
  39.  
  40. # Authentication:
  41.  
  42. #LoginGraceTime 2m
  43. #PermitRootLogin no
  44. #StrictModes yes
  45. #MaxAuthTries 6
  46. #MaxSessions 10
  47.  
  48. #PubkeyAuthentication yes
  49.  
  50. # Expect .ssh/authorized_keys2 to be disregarded by default in future.
  51. #AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
  52.  
  53. #AuthorizedPrincipalsFile none
  54.  
  55. #AuthorizedKeysCommand none
  56. #AuthorizedKeysCommandUser nobody
  57.  
  58. # For this to work
  59. you will also need host keys in /etc/ssh/ssh_known_hosts
  60. #HostbasedAuthentication no
  61. # Change to yes if you don't trust ~/.ssh/known_hosts for
  62. # HostbasedAuthentication
  63. #IgnoreUserKnownHosts no
  64. # Don't read the user's ~/.rhosts and ~/.shosts files
  65. #IgnoreRhosts yes
  66.  
  67. # To disable tunneled clear text passwords, change to no here!
  68. #PasswordAuthentication yes
  69. #PermitEmptyPasswords no
  70.  
  71. # Change to yes to enable challenge-response passwords (beware issues with
  72. # some PAM modules and threads)
  73. ChallengeResponseAuthentication no
  74.  
  75. # Kerberos options
  76. #KerberosAuthentication no
  77. #KerberosOrLocalPasswd yes
  78. #KerberosTicketCleanup yes
  79. #KerberosGetAFSToken no
  80.  
  81. # GSSAPI options
  82. #GSSAPIAuthentication no
  83. #GSSAPICleanupCredentials yes
  84. #GSSAPIStrictAcceptorCheck yes
  85. #GSSAPIKeyExchange no
  86.  
  87. # Set this to 'yes' to enable PAM authentication, account processing,
  88. # and session processing. If this is enabled, PAM authentication will
  89. # be allowed through the ChallengeResponseAuthentication and
  90. # PasswordAuthentication. Depending on your PAM configuration,
  91. # PAM authentication via ChallengeResponseAuthentication may bypass
  92. # the setting of "PermitRootLogin without-password".
  93. # If you just want the PAM account and session checks to run without
  94. # PAM authentication, then enable this but set PasswordAuthentication
  95. # and ChallengeResponseAuthentication to 'no'.
  96. UsePAM yes
  97.  
  98. #AllowAgentForwarding yes
  99. #AllowTcpForwarding yes
  100. #GatewayPorts no
  101. X11Forwarding yes
  102. #X11DisplayOffset 10
  103. #X11UseLocalhost yes
  104. #PermitTTY yes
  105. PrintMotd no
  106. #PrintLastLog yes
  107. #TCPKeepAlive yes
  108. #UseLogin no
  109. #UsePrivilegeSeparation sandbox
  110. #PermitUserEnvironment no
  111. #Compression delayed
  112. #ClientAliveInterval 0
  113. #ClientAliveCountMax 3
  114. #UseDNS no
  115. #PidFile /var/run/sshd.pid
  116. #MaxStartups 10:30:100
  117. #PermitTunnel no
  118. #ChrootDirectory none
  119. #VersionAddendum none
  120.  
  121. # no default banner path
  122. #Banner none
  123.  
  124. # Allow client to pass locale environment variables
  125. AcceptEnv LANG LC_*
  126.  
  127. # override default of no subsystems
  128. Subsystem sftp /usr/lib/openssh/sftp-server
  129.  
  130. # Example of overriding settings on a per-user basis
  131. #Match User anoncvs
  132. # X11Forwarding no
  133. # AllowTcpForwarding no
  134. # PermitTTY no
  135. # ForceCommand cvs server
  136.  
  137. AllowUsers silk44sftp
  138. Match user silk44sftp
  139. ChrootDirectory /home/silk44sftp/
  140. ForceCommand internal-sftp
  141. AllowTCPForwarding no
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement