=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/sshd_config,v retrieving revision 1.38.2.3 retrieving revision 1.39 diff -u -r1.38.2.3 -r1.39 --- src/usr.bin/ssh/sshd_config 2002/06/02 22:56:11 1.38.2.3 +++ src/usr.bin/ssh/sshd_config 2001/05/20 17:20:36 1.39 @@ -1,85 +1,69 @@ -# $OpenBSD: sshd_config,v 1.38.2.3 2002/06/02 22:56:11 miod Exp $ +# $OpenBSD: sshd_config,v 1.39 2001/05/20 17:20:36 markus Exp $ # This is the sshd server system-wide configuration file. See sshd(8) # for more information. -# The strategy used for options in the default sshd_config shipped with -# OpenSSH is to specify options with their default value where -# possible, but leave them commented. Uncommented options change a -# default value. - -#Port 22 +Port 22 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress :: +HostKey /etc/ssh_host_key +HostKey /etc/ssh_host_rsa_key +HostKey /etc/ssh_host_dsa_key +ServerKeyBits 768 +LoginGraceTime 600 +KeyRegenerationInterval 3600 +PermitRootLogin yes +# +# Don't read ~/.rhosts and ~/.shosts files +IgnoreRhosts yes +# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication +#IgnoreUserKnownHosts yes +StrictModes yes +X11Forwarding no +X11DisplayOffset 10 +PrintMotd yes +#PrintLastLog no +KeepAlive yes -# HostKey for protocol version 1 -#HostKey /etc/ssh_host_key -# HostKeys for protocol version 2 -#HostKey /etc/ssh_host_rsa_key -#HostKey /etc/ssh_host_dsa_key - -# Lifetime and size of ephemeral version 1 server key -#KeyRegenerationInterval 3600 -#ServerKeyBits 768 - # Logging +SyslogFacility AUTH +LogLevel INFO #obsoletes QuietMode and FascistLogging -#SyslogFacility AUTH -#LogLevel INFO -# Authentication: - -#LoginGraceTime 600 -#PermitRootLogin yes -#StrictModes yes - -#RSAAuthentication yes -#PubkeyAuthentication yes -#AuthorizedKeysFile .ssh/authorized_keys - -# rhosts authentication should not be used -#RhostsAuthentication no -# Don't read the user's ~/.rhosts and ~/.shosts files -#IgnoreRhosts yes +RhostsAuthentication no +# # For this to work you will also need host keys in /etc/ssh_known_hosts -#RhostsRSAAuthentication no +RhostsRSAAuthentication no # similar for protocol version 2 -#HostbasedAuthentication no -# Change to yes if you don't trust ~/.ssh/known_hosts for -# RhostsRSAAuthentication and HostbasedAuthentication -#IgnoreUserKnownHosts no +HostbasedAuthentication no +# +RSAAuthentication yes +PubkeyAuthentication yes +#AuthorizedKeysFile %h/.ssh/authorized_keys +#AuthorizedKeysFile2 %h/.ssh/authorized_keys2 # To disable tunneled clear text passwords, change to no here! -#PasswordAuthentication yes -#PermitEmptyPasswords no +PasswordAuthentication yes +PermitEmptyPasswords no -# Change to no to disable s/key passwords -#ChallengeResponseAuthentication yes +# Uncomment to disable s/key passwords +#ChallengeResponseAuthentication no -# Kerberos options +# To change Kerberos options #KerberosAuthentication no #KerberosOrLocalPasswd yes -#KerberosTicketCleanup yes - #AFSTokenPassing no +#KerberosTicketCleanup no -# Kerberos TGT Passing only works with the AFS kaserver -#KerberosTgtPassing no +# Kerberos TGT Passing does only work with the AFS kaserver +#KerberosTgtPassing yes -#X11Forwarding no -#X11DisplayOffset 10 -#X11UseLocalhost yes -#PrintMotd yes -#PrintLastLog yes -#KeepAlive yes +#CheckMail yes #UseLogin no -#UsePrivilegeSeparation no -#MaxStartups 10 -# no default banner path -#Banner /some/path -#VerifyReverseMapping no +#MaxStartups 10:30:60 +#Banner /etc/issue.net +#ReverseMappingCheck yes -# override default of no subsystems Subsystem sftp /usr/libexec/sftp-server