-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathsshd_config
91 lines (72 loc) · 1.9 KB
/
sshd_config
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
# This is ssh server systemwide configuration file.
#
# /etc/sshd_config
#Port 22
ListenAddress 0.0.0.0
#HostKey /etc/ssh_host_key
#RandomSeed /etc/ssh_random_seed
#PidFile /etc/sshd.pid
#ServerKeyBits 768
LoginGraceTime 180
#KeyRegenerationInterval 3600
#umask
#KeepAlive yes
#CheckMail yes
#IdleTimeout time
X11Forwarding yes
#X11DisplayOffset
#XAuthLocation
# Check permissions of important files/dirs:
StrictModes yes
####### logging #####
# Minimal logging?
#QuietMode no
#FascistLogging no
SyslogFacility DAEMON
#SyslogFacility AUTH
#SilentDeny
# Avoid double banner:
PrintMotd no
########## Trust ########
# .rhosts, .shosts ignored?
# /etc/hosts.equiv and /etc/shosts.equiv are still used
IgnoreRhosts no
#IgnoreRootRhosts
# authentication using rhosts or /etc/hosts.equiv
RhostsAuthentication no
# authentication using rhosts + RSA host auth
# The host must be known (ssh_known_hosts) and be in .[sr]hosts
RhostsRSAAuthentication yes
# Allow login with pure RSA public/private keys?
# (will circumvent UNIX login)
RSAAuthentication no
########## login ########
#ForcedEmptyPasswdChange no
#ForcedPasswdChange yes
#KerberosAuthentication
#KerberosOrLocalPasswd
#KerberosTgtPassing
#TISAuthentication
#AccountExpireWarningDays
#PasswordExpireWarningDays
# Allow login with UNIX password?
PasswordAuthentication yes
# Should logins be allowed with empty passwords?
PermitEmptyPasswords no
#yes, no, nopwd (disables password-authenticated root logins)
PermitRootLogin yes
######## Access control #######
# Allow access from two trusted admin hosts
#AllowHosts 176.17.17.12 176.17.17.11
# AllowHosts *.our.com friend.other.com
# DenyHosts lowsecurity.theirs.com *.evil.org evil.org 195.*
# Restrict user groups
#AllowGroups
#DenyGroups
# Restrict users
#AllowUsers
#DenyUsers jim bill@host1
# Which clients can access .shosts here?
#AllowSHosts
#DenySHosts
#EOF