sshd_config revision 1.9 1 # $NetBSD: sshd_config,v 1.9 2012/12/12 17:42:40 christos Exp $
2 # $OpenBSD: sshd_config,v 1.87 2012/07/10 02:19:15 djm Exp $
3
4 # This is the sshd server system-wide configuration file. See
5 # sshd_config(5) for more information.
6
7 # The strategy used for options in the default sshd_config shipped with
8 # OpenSSH is to specify options with their default value where
9 # possible, but leave them commented. Uncommented options override the
10 # default value.
11
12 #Port 22
13 #AddressFamily any
14 #ListenAddress 0.0.0.0
15 #ListenAddress ::
16
17 # The default requires explicit activation of protocol 1
18 #Protocol 2
19
20 # HostKey for protocol version 1
21 #HostKey /etc/ssh/ssh_host_key
22 # HostKeys for protocol version 2
23 #HostKey /etc/ssh/ssh_host_rsa_key
24 #HostKey /etc/ssh/ssh_host_dsa_key
25 #HostKey /etc/ssh/ssh_host_ecdsa_key
26
27 # Lifetime and size of ephemeral version 1 server key
28 #KeyRegenerationInterval 1h
29 #ServerKeyBits 1024
30
31 # Logging
32 # obsoletes QuietMode and FascistLogging
33 #SyslogFacility AUTH
34 #LogLevel INFO
35
36 # Authentication:
37
38 LoginGraceTime 600
39 #PermitRootLogin no
40 #StrictModes yes
41 #MaxAuthTries 6
42 #MaxSessions 10
43
44 #RSAAuthentication yes
45 #PubkeyAuthentication yes
46
47 # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
48 # but this is overridden so installations will only check .ssh/authorized_keys
49 AuthorizedKeysFile .ssh/authorized_keys
50
51 #AuthorizedPrincipalsFile none
52
53 # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
54 #RhostsRSAAuthentication no
55 # similar for protocol version 2
56 #HostbasedAuthentication no
57 # Change to yes if you don't trust ~/.ssh/known_hosts for
58 # RhostsRSAAuthentication and HostbasedAuthentication
59 #IgnoreUserKnownHosts no
60 # Don't read the user's ~/.rhosts and ~/.shosts files
61 #IgnoreRhosts yes
62
63 # To disable password authentication, set this and UsePam to no
64 #PasswordAuthentication yes
65 #PermitEmptyPasswords no
66
67 # Change to no to disable s/key passwords
68 #ChallengeResponseAuthentication yes
69
70 # Kerberos options
71 #KerberosAuthentication no
72 #KerberosOrLocalPasswd yes
73 #KerberosTicketCleanup yes
74 #KerberosGetAFSToken no
75
76 # GSSAPI options
77 #GSSAPIAuthentication no
78 #GSSAPICleanupCredentials yes
79
80 #AllowAgentForwarding yes
81 #AllowTcpForwarding yes
82 #GatewayPorts no
83 #X11Forwarding no
84 # If you use xorg from pkgsrc then uncomment the following line.
85 #XAuthLocation /usr/pkg/bin/xauth
86 #X11DisplayOffset 10
87 #X11UseLocalhost yes
88 #PrintMotd yes
89 #PrintLastLog yes
90 #TCPKeepAlive yes
91 #UseLogin no
92 UsePrivilegeSeparation sandbox
93 UsePam yes
94 #PermitUserEnvironment no
95 #Compression delayed
96 #ClientAliveInterval 0
97 #ClientAliveCountMax 3
98 #UseDNS yes
99 #PidFile /var/run/sshd.pid
100 #MaxStartups 10
101 #PermitTunnel no
102 #ChrootDirectory none
103 #VersionAddendum none
104
105 # no default banner path
106 #Banner none
107
108 # here are the new patched ldap related tokens
109 # entries in your LDAP must have posixAccount & ldapPublicKey objectclass
110 #UseLPK yes
111 #LpkLdapConf /etc/ldap.conf
112 #LpkServers ldap://10.1.7.1/ ldap://10.1.7.2/
113 #LpkUserDN ou=users,dc=phear,dc=org
114 #LpkGroupDN ou=groups,dc=phear,dc=org
115 #LpkBindDN cn=Manager,dc=phear,dc=org
116 #LpkBindPw secret
117 #LpkServerGroup mail
118 #LpkFilter (hostAccess=master.phear.org)
119 #LpkForceTLS no
120 #LpkSearchTimelimit 3
121 #LpkBindTimelimit 3
122 #LpkPubKeyAttr sshPublicKey
123
124 # override default of no subsystems
125 Subsystem sftp /usr/libexec/sftp-server
126
127 # the following are HPN related configuration options
128 # tcp receive buffer polling. disable in non autotuning kernels
129 #TcpRcvBufPoll yes
130
131 # allow the use of the none cipher
132 #NoneEnabled no
133
134 # disable hpn performance boosts.
135 #HPNDisabled no
136
137 # buffer size for hpn to non-hpn connections
138 #HPNBufferSize 2048
139
140
141 # Example of overriding settings on a per-user basis
142 #Match User anoncvs
143 # X11Forwarding no
144 # AllowTcpForwarding no
145 # ForceCommand cvs server
146