sshd_config 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. # Server SSHD config
  2. Port 4242
  3. #AddressFamily any
  4. #ListenAddress 0.0.0.0
  5. #ListenAddress ::
  6. #HostKey /etc/ssh/ssh_host_rsa_key
  7. #HostKey /etc/ssh/ssh_host_ecdsa_key
  8. #HostKey /etc/ssh/ssh_host_ed25519_key
  9. # Ciphers and keying
  10. #RekeyLimit default none
  11. # Logging
  12. #SyslogFacility AUTH
  13. #LogLevel INFO
  14. # Authentication:
  15. LoginGraceTime 30
  16. PermitRootLogin no
  17. #StrictModes yes
  18. #MaxAuthTries 6
  19. #MaxSessions 10
  20. PubkeyAuthentication yes
  21. # Expect .ssh/authorized_keys2 to be disregarded by default in future.
  22. #AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
  23. #AuthorizedPrincipalsFile none
  24. #AuthorizedKeysCommand none
  25. #AuthorizedKeysCommandUser nobody
  26. # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
  27. #HostbasedAuthentication no
  28. # Change to yes if you don't trust ~/.ssh/known_hosts for
  29. # HostbasedAuthentication
  30. #IgnoreUserKnownHosts no
  31. # Don't read the user's ~/.rhosts and ~/.shosts files
  32. #IgnoreRhosts yes
  33. # To disable tunneled clear text passwords, change to no here!
  34. PasswordAuthentication no
  35. #PermitEmptyPasswords no
  36. # Change to yes to enable challenge-response passwords (beware issues with
  37. # some PAM modules and threads)
  38. ChallengeResponseAuthentication no
  39. # Kerberos options
  40. #KerberosAuthentication no
  41. #KerberosOrLocalPasswd yes
  42. #KerberosTicketCleanup yes
  43. #KerberosGetAFSToken no
  44. # GSSAPI options
  45. #GSSAPIAuthentication no
  46. #GSSAPICleanupCredentials yes
  47. #GSSAPIStrictAcceptorCheck yes
  48. #GSSAPIKeyExchange no
  49. # Set this to 'yes' to enable PAM authentication, account processing,
  50. # and session processing. If this is enabled, PAM authentication will
  51. # be allowed through the ChallengeResponseAuthentication and
  52. # PasswordAuthentication. Depending on your PAM configuration,
  53. # PAM authentication via ChallengeResponseAuthentication may bypass
  54. # the setting of "PermitRootLogin without-password".
  55. # If you just want the PAM account and session checks to run without
  56. # PAM authentication, then enable this but set PasswordAuthentication
  57. # and ChallengeResponseAuthentication to 'no'.
  58. UsePAM yes
  59. #AllowAgentForwarding yes
  60. #AllowTcpForwarding yes
  61. #GatewayPorts no
  62. X11Forwarding yes
  63. #X11DisplayOffset 10
  64. #X11UseLocalhost yes
  65. #PermitTTY yes
  66. PrintMotd no
  67. #PrintLastLog yes
  68. #TCPKeepAlive yes
  69. #UseLogin no
  70. #UsePrivilegeSeparation sandbox
  71. #PermitUserEnvironment no
  72. #Compression delayed
  73. #ClientAliveInterval 0
  74. #ClientAliveCountMax 3
  75. #UseDNS no
  76. #PidFile /var/run/sshd.pid
  77. #MaxStartups 10:30:100
  78. #PermitTunnel no
  79. #ChrootDirectory none
  80. #VersionAddendum none
  81. # no default banner path
  82. #Banner none
  83. # Allow client to pass locale environment variables
  84. AcceptEnv LANG LC_*
  85. # override default of no subsystems
  86. Subsystem sftp /usr/lib/openssh/sftp-server
  87. # Example of overriding settings on a per-user basis
  88. #Match User anoncvs
  89. # X11Forwarding no
  90. # AllowTcpForwarding no
  91. # PermitTTY no
  92. # ForceCommand cvs server