Annotation of src/usr.bin/ssh/sshd_config, Revision 1.42.2.6
1.42.2.6! miod 1: # $OpenBSD: sshd_config,v 1.59 2002/09/25 11:17:16 markus Exp $
1.27 niklas 2:
1.42.2.5 miod 3: # This is the sshd server system-wide configuration file. See
4: # sshd_config(5) for more information.
1.1 deraadt 5:
1.42.2.1 jason 6: # The strategy used for options in the default sshd_config shipped with
7: # OpenSSH is to specify options with their default value where
8: # possible, but leave them commented. Uncommented options change a
9: # default value.
10:
11: #Port 22
1.38 deraadt 12: #Protocol 2,1
1.15 markus 13: #ListenAddress 0.0.0.0
14: #ListenAddress ::
1.40 markus 15:
16: # HostKey for protocol version 1
1.42.2.2 brad 17: #HostKey /etc/ssh_host_key
1.40 markus 18: # HostKeys for protocol version 2
1.42.2.2 brad 19: #HostKey /etc/ssh_host_rsa_key
20: #HostKey /etc/ssh_host_dsa_key
1.40 markus 21:
22: # Lifetime and size of ephemeral version 1 server key
1.42.2.1 jason 23: #KeyRegenerationInterval 3600
24: #ServerKeyBits 768
1.13 markus 25:
26: # Logging
27: #obsoletes QuietMode and FascistLogging
1.42.2.1 jason 28: #SyslogFacility AUTH
29: #LogLevel INFO
1.13 markus 30:
1.40 markus 31: # Authentication:
32:
1.42.2.6! miod 33: #LoginGraceTime 120
1.42.2.1 jason 34: #PermitRootLogin yes
35: #StrictModes yes
36:
37: #RSAAuthentication yes
38: #PubkeyAuthentication yes
39: #AuthorizedKeysFile .ssh/authorized_keys
1.40 markus 40:
41: # rhosts authentication should not be used
1.42.2.1 jason 42: #RhostsAuthentication no
1.40 markus 43: # Don't read the user's ~/.rhosts and ~/.shosts files
1.42.2.1 jason 44: #IgnoreRhosts yes
1.42.2.2 brad 45: # For this to work you will also need host keys in /etc/ssh_known_hosts
1.42.2.1 jason 46: #RhostsRSAAuthentication no
1.36 markus 47: # similar for protocol version 2
1.42.2.1 jason 48: #HostbasedAuthentication no
49: # Change to yes if you don't trust ~/.ssh/known_hosts for
50: # RhostsRSAAuthentication and HostbasedAuthentication
51: #IgnoreUserKnownHosts no
1.6 deraadt 52:
53: # To disable tunneled clear text passwords, change to no here!
1.42.2.1 jason 54: #PasswordAuthentication yes
55: #PermitEmptyPasswords no
1.30 markus 56:
1.42.2.1 jason 57: # Change to no to disable s/key passwords
58: #ChallengeResponseAuthentication yes
1.6 deraadt 59:
1.42.2.1 jason 60: # Kerberos options
1.42.2.3 miod 61: #KerberosAuthentication no
1.1 deraadt 62: #KerberosOrLocalPasswd yes
1.42.2.1 jason 63: #KerberosTicketCleanup yes
64:
1.42.2.3 miod 65: #AFSTokenPassing no
1.1 deraadt 66:
1.42.2.1 jason 67: # Kerberos TGT Passing only works with the AFS kaserver
68: #KerberosTgtPassing no
1.1 deraadt 69:
1.42.2.1 jason 70: #X11Forwarding no
71: #X11DisplayOffset 10
72: #X11UseLocalhost yes
73: #PrintMotd yes
74: #PrintLastLog yes
75: #KeepAlive yes
1.6 deraadt 76: #UseLogin no
1.42.2.4 miod 77: #UsePrivilegeSeparation yes
1.42.2.6! miod 78: #PermitUserEnvironment no
1.42.2.4 miod 79: #Compression yes
1.17 jakob 80:
1.42.2.1 jason 81: #MaxStartups 10
82: # no default banner path
83: #Banner /some/path
84: #VerifyReverseMapping no
1.32 deraadt 85:
1.42.2.1 jason 86: # override default of no subsystems
1.32 deraadt 87: Subsystem sftp /usr/libexec/sftp-server