sshd_config revision 294666
1#	$OpenBSD: sshd_config,v 1.93 2014/01/10 05:59:19 djm Exp $
2
3# This is the sshd server system-wide configuration file.  See
4# sshd_config(5) for more information.
5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
10# possible, but leave them commented.  Uncommented options override the
11# default value.
12
13# Note that some of FreeBSD's defaults differ from OpenBSD's, and
14# FreeBSD has a few additional options.
15
16#Port 22
17#AddressFamily any
18#ListenAddress 0.0.0.0
19#ListenAddress ::
20
21# The default requires explicit activation of protocol 1
22#Protocol 2
23
24# HostKey for protocol version 1
25#HostKey /etc/ssh/ssh_host_key
26# HostKeys for protocol version 2
27#HostKey /etc/ssh/ssh_host_rsa_key
28#HostKey /etc/ssh/ssh_host_dsa_key
29#HostKey /etc/ssh/ssh_host_ecdsa_key
30#HostKey /etc/ssh/ssh_host_ed25519_key
31
32# Lifetime and size of ephemeral version 1 server key
33#KeyRegenerationInterval 1h
34#ServerKeyBits 1024
35
36# Ciphers and keying
37#RekeyLimit default none
38
39# Logging
40# obsoletes QuietMode and FascistLogging
41#SyslogFacility AUTH
42#LogLevel INFO
43
44# Authentication:
45
46#LoginGraceTime 2m
47#PermitRootLogin no
48#StrictModes yes
49#MaxAuthTries 6
50#MaxSessions 10
51
52#RSAAuthentication yes
53#PubkeyAuthentication yes
54
55# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
56#AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
57
58#AuthorizedPrincipalsFile none
59
60#AuthorizedKeysCommand none
61#AuthorizedKeysCommandUser nobody
62
63# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
64#RhostsRSAAuthentication no
65# similar for protocol version 2
66#HostbasedAuthentication no
67# Change to yes if you don't trust ~/.ssh/known_hosts for
68# RhostsRSAAuthentication and HostbasedAuthentication
69#IgnoreUserKnownHosts no
70# Don't read the user's ~/.rhosts and ~/.shosts files
71#IgnoreRhosts yes
72
73# Change to yes to enable built-in password authentication.
74#PasswordAuthentication no
75#PermitEmptyPasswords no
76
77# Change to no to disable PAM authentication
78#ChallengeResponseAuthentication yes
79
80# Kerberos options
81#KerberosAuthentication no
82#KerberosOrLocalPasswd yes
83#KerberosTicketCleanup yes
84#KerberosGetAFSToken no
85
86# GSSAPI options
87#GSSAPIAuthentication no
88#GSSAPICleanupCredentials yes
89
90# Set this to 'no' to disable PAM authentication, account processing,
91# and session processing. If this is enabled, PAM authentication will
92# be allowed through the ChallengeResponseAuthentication and
93# PasswordAuthentication.  Depending on your PAM configuration,
94# PAM authentication via ChallengeResponseAuthentication may bypass
95# the setting of "PermitRootLogin without-password".
96# If you just want the PAM account and session checks to run without
97# PAM authentication, then enable this but set PasswordAuthentication
98# and ChallengeResponseAuthentication to 'no'.
99#UsePAM yes
100
101#AllowAgentForwarding yes
102#AllowTcpForwarding yes
103#GatewayPorts no
104#X11Forwarding yes
105#X11DisplayOffset 10
106#X11UseLocalhost yes
107#PermitTTY yes
108#PrintMotd yes
109#PrintLastLog yes
110#TCPKeepAlive yes
111#UseLogin no
112#UsePrivilegeSeparation sandbox
113#PermitUserEnvironment no
114#Compression delayed
115#ClientAliveInterval 0
116#ClientAliveCountMax 3
117#UseDNS yes
118#PidFile /var/run/sshd.pid
119#MaxStartups 10:30:100
120#PermitTunnel no
121#ChrootDirectory none
122#VersionAddendum FreeBSD-20140420
123
124# no default banner path
125#Banner none
126
127# override default of no subsystems
128Subsystem	sftp	/usr/libexec/sftp-server
129
130# Change to yes to disable HPN tuning improvements.
131#HPNDisabled no
132
133# Buffer size for HPN to non-HPN connections.
134#HPNBufferSize 2048
135
136# TCP receive socket buffer polling for HPN.  Disable on non autotuning kernels.
137#TcpRcvBufPoll yes
138
139# Allow the use of the NONE cipher.
140#NoneEnabled no
141
142# Example of overriding settings on a per-user basis
143#Match User anoncvs
144#	X11Forwarding no
145#	AllowTcpForwarding no
146#	PermitTTY no
147#	ForceCommand cvs server
148