|
Lines 1-96
Link Here
|
| 1 |
# $OpenBSD: sshd_config,v 1.66 2003/09/29 20:19:57 markus Exp $ |
1 |
Port 4242 |
| 2 |
|
2 |
ListenAddress 127.0.0.1 |
| 3 |
# This is the sshd server system-wide configuration file. See |
3 |
#ListenAddress ::1 |
| 4 |
# sshd_config(5) for more information. |
4 |
PidFile /home/dtucker/openssh/openssh-regress//pidfile |
| 5 |
|
5 |
AuthorizedKeysFile /home/dtucker/openssh/openssh-regress//authorized_keys_dtucker |
| 6 |
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin |
6 |
KeepAlive no |
| 7 |
|
7 |
LogLevel VERBOSE |
| 8 |
# The strategy used for options in the default sshd_config shipped with |
8 |
HostKey /home/dtucker/openssh/openssh-regress//host.rsa |
| 9 |
# OpenSSH is to specify options with their default value where |
9 |
HostKey /home/dtucker/openssh/openssh-regress//host.rsa1 |
| 10 |
# possible, but leave them commented. Uncommented options change a |
|
|
| 11 |
# default value. |
| 12 |
|
| 13 |
#Port 22 |
| 14 |
#Protocol 2,1 |
| 15 |
#ListenAddress 0.0.0.0 |
| 16 |
#ListenAddress :: |
| 17 |
|
| 18 |
# HostKey for protocol version 1 |
| 19 |
#HostKey /etc/ssh/ssh_host_key |
| 20 |
# HostKeys for protocol version 2 |
| 21 |
#HostKey /etc/ssh/ssh_host_rsa_key |
| 22 |
#HostKey /etc/ssh/ssh_host_dsa_key |
| 23 |
|
| 24 |
# Lifetime and size of ephemeral version 1 server key |
| 25 |
#KeyRegenerationInterval 1h |
| 26 |
#ServerKeyBits 768 |
| 27 |
|
| 28 |
# Logging |
| 29 |
#obsoletes QuietMode and FascistLogging |
| 30 |
#SyslogFacility AUTH |
| 31 |
#LogLevel INFO |
| 32 |
|
| 33 |
# Authentication: |
| 34 |
|
| 35 |
#LoginGraceTime 2m |
| 36 |
#PermitRootLogin yes |
| 37 |
#StrictModes yes |
| 38 |
|
| 39 |
#RSAAuthentication yes |
| 40 |
#PubkeyAuthentication yes |
| 41 |
#AuthorizedKeysFile .ssh/authorized_keys |
| 42 |
|
| 43 |
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts |
| 44 |
#RhostsRSAAuthentication no |
| 45 |
# similar for protocol version 2 |
| 46 |
#HostbasedAuthentication no |
| 47 |
# Change to yes if you don't trust ~/.ssh/known_hosts for |
| 48 |
# RhostsRSAAuthentication and HostbasedAuthentication |
| 49 |
#IgnoreUserKnownHosts no |
| 50 |
# Don't read the user's ~/.rhosts and ~/.shosts files |
| 51 |
#IgnoreRhosts yes |
| 52 |
|
| 53 |
# To disable tunneled clear text passwords, change to no here! |
| 54 |
#PasswordAuthentication yes |
| 55 |
#PermitEmptyPasswords no |
| 56 |
|
| 57 |
# Change to no to disable s/key passwords |
| 58 |
#ChallengeResponseAuthentication yes |
| 59 |
|
| 60 |
# Kerberos options |
| 61 |
#KerberosAuthentication no |
| 62 |
#KerberosOrLocalPasswd yes |
| 63 |
#KerberosTicketCleanup yes |
| 64 |
|
| 65 |
# GSSAPI options |
| 66 |
#GSSAPIAuthentication no |
| 67 |
#GSSAPICleanupCredentials yes |
| 68 |
|
| 69 |
# Set this to 'yes' to enable PAM authentication (via challenge-response) |
| 70 |
# and session processing. Depending on your PAM configuration, this may |
| 71 |
# bypass the setting of 'PasswordAuthentication' |
| 72 |
#UsePAM no |
| 73 |
|
| 74 |
#AllowTcpForwarding yes |
| 75 |
#GatewayPorts no |
| 76 |
#X11Forwarding no |
| 77 |
#X11DisplayOffset 10 |
| 78 |
#X11UseLocalhost yes |
| 79 |
#PrintMotd yes |
| 80 |
#PrintLastLog yes |
| 81 |
#KeepAlive yes |
| 82 |
#UseLogin no |
| 83 |
#UsePrivilegeSeparation yes |
| 84 |
#PermitUserEnvironment no |
| 85 |
#Compression yes |
| 86 |
#ClientAliveInterval 0 |
| 87 |
#ClientAliveCountMax 3 |
| 88 |
#UseDNS yes |
| 89 |
#PidFile /var/run/sshd.pid |
| 90 |
#MaxStartups 10 |
| 91 |
|
| 92 |
# no default banner path |
| 93 |
#Banner /some/path |
| 94 |
|
| 95 |
# override default of no subsystems |
| 96 |
Subsystem sftp /usr/libexec/sftp-server |