Home | History | Annotate | Download | only in openssh
      1 #	$OpenBSD: sshd_config,v 1.101 2017/03/14 07:19:07 djm Exp $
      2 
      3 # This is the sshd server system-wide configuration file.  See
      4 # sshd_config(5) for more information.
      5 
      6 # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
      7 
      8 # The strategy used for options in the default sshd_config shipped with
      9 # OpenSSH is to specify options with their default value where
     10 # possible, but leave them commented.  Uncommented options override the
     11 # default value.
     12 
     13 #Port 22
     14 #AddressFamily any
     15 #ListenAddress 0.0.0.0
     16 #ListenAddress ::
     17 
     18 #HostKey /etc/ssh/ssh_host_rsa_key
     19 #HostKey /etc/ssh/ssh_host_dsa_key
     20 #HostKey /etc/ssh/ssh_host_ecdsa_key
     21 #HostKey /etc/ssh/ssh_host_ed25519_key
     22 
     23 # Ciphers and keying
     24 #RekeyLimit default none
     25 
     26 # Logging
     27 #SyslogFacility AUTH
     28 #LogLevel INFO
     29 
     30 # Authentication:
     31 
     32 #LoginGraceTime 2m
     33 #PermitRootLogin prohibit-password
     34 #StrictModes yes
     35 #MaxAuthTries 6
     36 #MaxSessions 10
     37 
     38 #PubkeyAuthentication yes
     39 
     40 # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
     41 # but this is overridden so installations will only check .ssh/authorized_keys
     42 AuthorizedKeysFile	.ssh/authorized_keys
     43 
     44 #AuthorizedPrincipalsFile none
     45 
     46 #AuthorizedKeysCommand none
     47 #AuthorizedKeysCommandUser nobody
     48 
     49 # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
     50 #HostbasedAuthentication no
     51 # Change to yes if you don't trust ~/.ssh/known_hosts for
     52 # HostbasedAuthentication
     53 #IgnoreUserKnownHosts no
     54 # Don't read the user's ~/.rhosts and ~/.shosts files
     55 #IgnoreRhosts yes
     56 
     57 # To disable tunneled clear text passwords, change to no here!
     58 #PasswordAuthentication yes
     59 #PermitEmptyPasswords no
     60 
     61 # Change to no to disable s/key passwords
     62 #ChallengeResponseAuthentication yes
     63 
     64 # Kerberos options
     65 #KerberosAuthentication no
     66 #KerberosOrLocalPasswd yes
     67 #KerberosTicketCleanup yes
     68 #KerberosGetAFSToken no
     69 
     70 # GSSAPI options
     71 #GSSAPIAuthentication no
     72 #GSSAPICleanupCredentials yes
     73 
     74 # Set this to 'yes' to enable PAM authentication, account processing,
     75 # and session processing. If this is enabled, PAM authentication will
     76 # be allowed through the ChallengeResponseAuthentication and
     77 # PasswordAuthentication.  Depending on your PAM configuration,
     78 # PAM authentication via ChallengeResponseAuthentication may bypass
     79 # the setting of "PermitRootLogin without-password".
     80 # If you just want the PAM account and session checks to run without
     81 # PAM authentication, then enable this but set PasswordAuthentication
     82 # and ChallengeResponseAuthentication to 'no'.
     83 #UsePAM no
     84 
     85 #AllowAgentForwarding yes
     86 #AllowTcpForwarding yes
     87 #GatewayPorts no
     88 #X11Forwarding no
     89 #X11DisplayOffset 10
     90 #X11UseLocalhost yes
     91 #PermitTTY yes
     92 #PrintMotd yes
     93 #PrintLastLog yes
     94 #TCPKeepAlive yes
     95 #UseLogin no
     96 #PermitUserEnvironment no
     97 #Compression delayed
     98 #ClientAliveInterval 0
     99 #ClientAliveCountMax 3
    100 #UseDNS no
    101 #PidFile /var/run/sshd.pid
    102 #MaxStartups 10:30:100
    103 #PermitTunnel no
    104 #ChrootDirectory none
    105 #VersionAddendum none
    106 
    107 # no default banner path
    108 #Banner none
    109 
    110 # override default of no subsystems
    111 Subsystem	sftp	/usr/libexec/sftp-server
    112 
    113 # Example of overriding settings on a per-user basis
    114 #Match User anoncvs
    115 #	X11Forwarding no
    116 #	AllowTcpForwarding no
    117 #	PermitTTY no
    118 #	ForceCommand cvs server
    119