sshd_config revision 126277
1126277Sdes# $OpenBSD: sshd_config,v 1.68 2003/12/29 16:39:50 millert Exp $ 299051Sdes# $FreeBSD: head/crypto/openssh/sshd_config 126277 2004-02-26 10:52:33Z des $ 357429Smarkm 498684Sdes# This is the sshd server system-wide configuration file. See 598684Sdes# sshd_config(5) for more information. 676262Sgreen 798941Sdes# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin 898941Sdes 992559Sdes# The strategy used for options in the default sshd_config shipped with 1092559Sdes# OpenSSH is to specify options with their default value where 1192559Sdes# possible, but leave them commented. Uncommented options change a 1292559Sdes# default value. 1392559Sdes 1499051Sdes# Note that some of FreeBSD's defaults differ from OpenBSD's, and 1599051Sdes# FreeBSD has a few additional options. 1699051Sdes 17124211Sdes#VersionAddendum FreeBSD-20040106 1899051Sdes 1992559Sdes#Port 22 20126271Sdes#Protocol 2 2157429Smarkm#ListenAddress 0.0.0.0 2257429Smarkm#ListenAddress :: 2369591Sgreen 2492559Sdes# HostKey for protocol version 1 2592559Sdes#HostKey /etc/ssh/ssh_host_key 2692559Sdes# HostKeys for protocol version 2 2792559Sdes#HostKey /etc/ssh/ssh_host_dsa_key 2857429Smarkm 2992559Sdes# Lifetime and size of ephemeral version 1 server key 30124211Sdes#KeyRegenerationInterval 1h 3192559Sdes#ServerKeyBits 768 3292559Sdes 3357429Smarkm# Logging 3457429Smarkm#obsoletes QuietMode and FascistLogging 3592559Sdes#SyslogFacility AUTH 3692559Sdes#LogLevel INFO 3757429Smarkm 3892559Sdes# Authentication: 3992559Sdes 40124211Sdes#LoginGraceTime 2m 4199051Sdes#PermitRootLogin no 4292559Sdes#StrictModes yes 4392559Sdes 4492559Sdes#RSAAuthentication yes 4592559Sdes#PubkeyAuthentication yes 4692559Sdes#AuthorizedKeysFile .ssh/authorized_keys 4792559Sdes 4892559Sdes# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts 4992559Sdes#RhostsRSAAuthentication no 5076262Sgreen# similar for protocol version 2 5192559Sdes#HostbasedAuthentication no 5292559Sdes# Change to yes if you don't trust ~/.ssh/known_hosts for 5392559Sdes# RhostsRSAAuthentication and HostbasedAuthentication 5492559Sdes#IgnoreUserKnownHosts no 55124211Sdes# Don't read the user's ~/.rhosts and ~/.shosts files 56124211Sdes#IgnoreRhosts yes 5757429Smarkm 58126009Sdes# Change to yes to enable built-in password authentication. 59126009Sdes#PasswordAuthentication no 6092559Sdes#PermitEmptyPasswords no 6176262Sgreen 6299315Sdes# Change to no to disable PAM authentication 6395456Sdes#ChallengeResponseAuthentication yes 6457429Smarkm 6592559Sdes# Kerberos options 6698684Sdes#KerberosAuthentication no 6757429Smarkm#KerberosOrLocalPasswd yes 6892559Sdes#KerberosTicketCleanup yes 69126277Sdes#KerberosGetAFSToken no 7057429Smarkm 71124211Sdes# GSSAPI options 72124211Sdes#GSSAPIAuthentication no 73126277Sdes#GSSAPICleanupCredentials yes 7457429Smarkm 75124211Sdes# Set this to 'yes' to enable PAM authentication (via challenge-response) 76124211Sdes# and session processing. Depending on your PAM configuration, this may 77126277Sdes# bypass the setting of 'PasswordAuthentication' and 'PermitEmptyPasswords' 78126277Sdes#UsePAM no 7992559Sdes 80124211Sdes#AllowTcpForwarding yes 81124211Sdes#GatewayPorts no 8299051Sdes#X11Forwarding yes 8392559Sdes#X11DisplayOffset 10 8492559Sdes#X11UseLocalhost yes 8592559Sdes#PrintMotd yes 8692559Sdes#PrintLastLog yes 87126277Sdes#TCPKeepAlive yes 8857429Smarkm#UseLogin no 8998941Sdes#UsePrivilegeSeparation yes 90106130Sdes#PermitUserEnvironment no 9198684Sdes#Compression yes 92124211Sdes#ClientAliveInterval 0 93124211Sdes#ClientAliveCountMax 3 94124211Sdes#UseDNS yes 95124211Sdes#PidFile /var/run/sshd.pid 96124211Sdes#MaxStartups 10 9765674Skris 9892559Sdes# no default banner path 9992559Sdes#Banner /some/path 10076262Sgreen 10192559Sdes# override default of no subsystems 10276262SgreenSubsystem sftp /usr/libexec/sftp-server 103