sshd_config revision 248465
1#	$OpenBSD: sshd_config,v 1.87 2012/07/10 02:19:15 djm Exp $
2#	$FreeBSD: head/crypto/openssh/sshd_config 248465 2013-03-18 10:50:50Z des $
3
4# This is the sshd server system-wide configuration file.  See
5# sshd_config(5) for more information.
6
7# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
8
9# The strategy used for options in the default sshd_config shipped with
10# OpenSSH is to specify options with their default value where
11# possible, but leave them commented.  Uncommented options override the
12# default value.
13
14# Note that some of FreeBSD's defaults differ from OpenBSD's, and
15# FreeBSD has a few additional options.
16
17#Port 22
18#AddressFamily any
19#ListenAddress 0.0.0.0
20#ListenAddress ::
21
22# The default requires explicit activation of protocol 1
23#Protocol 2
24
25# HostKey for protocol version 1
26#HostKey /etc/ssh/ssh_host_key
27# HostKeys for protocol version 2
28#HostKey /etc/ssh/ssh_host_rsa_key
29#HostKey /etc/ssh/ssh_host_dsa_key
30#HostKey /etc/ssh/ssh_host_ecdsa_key
31
32# Lifetime and size of ephemeral version 1 server key
33#KeyRegenerationInterval 1h
34#ServerKeyBits 1024
35
36# Logging
37# obsoletes QuietMode and FascistLogging
38#SyslogFacility AUTH
39#LogLevel INFO
40
41# Authentication:
42
43#LoginGraceTime 2m
44#PermitRootLogin no
45#StrictModes yes
46#MaxAuthTries 6
47#MaxSessions 10
48
49#RSAAuthentication yes
50#PubkeyAuthentication yes
51
52# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
53#AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
54
55#AuthorizedPrincipalsFile none
56
57# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
58#RhostsRSAAuthentication no
59# similar for protocol version 2
60#HostbasedAuthentication no
61# Change to yes if you don't trust ~/.ssh/known_hosts for
62# RhostsRSAAuthentication and HostbasedAuthentication
63#IgnoreUserKnownHosts no
64# Don't read the user's ~/.rhosts and ~/.shosts files
65#IgnoreRhosts yes
66
67# Change to yes to enable built-in password authentication.
68#PasswordAuthentication no
69#PermitEmptyPasswords no
70
71# Change to no to disable PAM authentication
72#ChallengeResponseAuthentication yes
73
74# Kerberos options
75#KerberosAuthentication no
76#KerberosOrLocalPasswd yes
77#KerberosTicketCleanup yes
78#KerberosGetAFSToken no
79
80# GSSAPI options
81#GSSAPIAuthentication no
82#GSSAPICleanupCredentials yes
83
84# Set this to 'no' to disable PAM authentication, account processing,
85# and session processing. If this is enabled, PAM authentication will 
86# be allowed through the ChallengeResponseAuthentication and
87# PasswordAuthentication.  Depending on your PAM configuration,
88# PAM authentication via ChallengeResponseAuthentication may bypass
89# the setting of "PermitRootLogin without-password".
90# If you just want the PAM account and session checks to run without
91# PAM authentication, then enable this but set PasswordAuthentication
92# and ChallengeResponseAuthentication to 'no'.
93#UsePAM yes
94
95#AllowAgentForwarding yes
96#AllowTcpForwarding yes
97#GatewayPorts no
98#X11Forwarding yes
99#X11DisplayOffset 10
100#X11UseLocalhost yes
101#PrintMotd yes
102#PrintLastLog yes
103#TCPKeepAlive yes
104#UseLogin no
105#UsePrivilegeSeparation sandbox
106#PermitUserEnvironment no
107#Compression delayed
108#ClientAliveInterval 0
109#ClientAliveCountMax 3
110#UseDNS yes
111#PidFile /var/run/sshd.pid
112#MaxStartups 10
113#PermitTunnel no
114#ChrootDirectory none
115#VersionAddendum FreeBSD-20120901
116
117# no default banner path
118#Banner none
119
120# override default of no subsystems
121Subsystem	sftp	/usr/libexec/sftp-server
122
123# Disable HPN tuning improvements.
124#HPNDisabled no
125
126# Buffer size for HPN to non-HPN connections.
127#HPNBufferSize 2048
128
129# TCP receive socket buffer polling for HPN.  Disable on non autotuning kernels.
130#TcpRcvBufPoll yes
131
132# Allow the use of the NONE cipher.
133#NoneEnabled no
134
135# Example of overriding settings on a per-user basis
136#Match User anoncvs
137#	X11Forwarding no
138#	AllowTcpForwarding no
139#	ForceCommand cvs server
140