sshd_config revision 76262
1#	$OpenBSD: sshd_config,v 1.38 2001/04/15 21:41:29 deraadt Exp $
2#	$FreeBSD: head/crypto/openssh/sshd_config 76262 2001-05-04 04:14:23Z green $
3
4# This is the sshd server system-wide configuration file.  See sshd(8)
5# for more information.
6
7Port 22
8#Protocol 2,1
9#ListenAddress 0.0.0.0
10#ListenAddress ::
11HostKey /etc/ssh_host_key
12HostKey /etc/ssh_host_rsa_key
13HostKey /etc/ssh_host_dsa_key
14ServerKeyBits 768
15LoginGraceTime 120
16KeyRegenerationInterval 3600
17PermitRootLogin no
18# ConnectionsPerPeriod has been deprecated completely
19
20# After 10 unauthenticated connections, refuse 30% of the new ones, and
21# refuse any more than 60 total.
22MaxStartups 10:30:60
23# Don't read ~/.rhosts and ~/.shosts files
24IgnoreRhosts yes
25# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
26#IgnoreUserKnownHosts yes
27StrictModes yes
28X11Forwarding yes
29X11DisplayOffset 10
30PrintMotd yes
31#PrintLastLog no
32KeepAlive yes
33
34# Logging
35SyslogFacility AUTH
36LogLevel INFO
37#obsoletes QuietMode and FascistLogging
38
39RhostsAuthentication no
40#
41# For this to work you will also need host keys in /etc/ssh_known_hosts
42RhostsRSAAuthentication no
43# similar for protocol version 2
44HostbasedAuthentication no
45#
46RSAAuthentication yes
47
48# To disable tunneled clear text passwords, change to no here!
49PasswordAuthentication yes
50PermitEmptyPasswords no
51
52# Uncomment to disable s/key passwords 
53#ChallengeResponseAuthentication no
54
55# To change Kerberos options
56#KerberosAuthentication no
57#KerberosOrLocalPasswd yes
58#AFSTokenPassing no
59#KerberosTicketCleanup no
60
61# Kerberos TGT Passing does only work with the AFS kaserver
62#KerberosTgtPassing yes
63
64CheckMail yes
65#UseLogin no
66
67#MaxStartups 10:30:60
68#Banner /etc/issue.net
69#ReverseMappingCheck yes
70
71Subsystem	sftp	/usr/libexec/sftp-server
72